Search results for: urban space security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9125

Search results for: urban space security

8555 Neoliberal Settler City: Socio-Spatial Segregation, Livelihood of Artists/Craftsmen in Delhi

Authors: Sophy Joseph

Abstract:

The study uses the concept of ‘Settler city’ to understand the nature of peripheralization that a neoliberal city initiates. The settler city designs powerless communities without inherent rights, title and sovereignty. Kathputli Colony, home to generations of artists/craftsmen, who have kept heritage of arts/crafts alive, has undergone eviction of its population from urban space. The proposed study, ‘Neoliberal Settler City: Socio-spatial segregation and livelihood of artists/craftsmen in Delhi’ would problematize the settler city as a colonial technology. The colonial regime has ‘erased’ the ‘unwanted’ as primitive and swept them to peripheries in the city. This study would also highlight how structural change in political economy has undermined their crafts/arts by depriving them from practicing/performing it with dignity in urban space. The interconnections between citizenship and In-Situ Private Public Partnership in Kathputli rehabilitation has become part of academic exercise. However, a comprehensive study connecting inherent characteristics of neoliberal settler city, trajectory of political economy of unorganized workers - artists/craftsmen and legal containment and exclusion leading to dispossession and marginalization of communities from the city site, is relevant to contextualize the trauma of spatial segregation. This study would deal with political, cultural, social and economic dominant behavior of the structure in the state formation, accumulation of property and design of urban space, fueled by segregation of marginalized/unorganized communities and disowning the ‘footloose proletariat’, the migrant workforce. The methodology of study involves qualitative research amongst communities and the field work-oral testimonies and personal accounts- becomes the primary material to theorize the realities. The secondary materials in the forms of archival materials about historical evolution of Delhi as a planned city from various archives, would be used. As the study also adopt ‘narrative approach’ in qualitative study, the life experiences of craftsmen/artists as performers and emotional trauma of losing their livelihood and space forms an important record to understand the instability and insecurity that marginalization and development attributes on urban poor. The study attempts to prove that though there was a change in political tradition from colonialism to constitutional democracy, new state still follows the policy of segregation and dispossession of the communities. It is this dispossession from the space, deprivation of livelihood and non-consultative process in rehabilitation that reflects the neoliberal approach of the state and also critical findings in the study. This study would entail critical spatial lens analyzing ethnographic and sociological data, representational practices and development debates to understand ‘urban otherization’ against craftsmen/artists. This seeks to develop a conceptual framework for understanding the resistance of communities against primitivity attached with them and to decolonize the city. This would help to contextualize the demand for declaring Kathputli Colony as ‘heritage artists village’. The conceptualization and contextualization would help to argue for right to city of the communities, collective rights to property, services and self-determination. The aspirations of the communities also help to draw normative orientation towards decolonization. It is important to study this site as part of the framework, ‘inclusive cities’ because cities are rarely noted as important sites of ‘community struggles’.

Keywords: neoliberal settler city, socio-spatial segregation, the livelihood of artists/craftsmen, dispossession of indigenous communities, urban planning and cultural uprooting

Procedia PDF Downloads 116
8554 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 336
8553 Developing a Structured Example Space for Finding the Collision Points of Functions and Their Inverse

Authors: M. Saeed, A. Shahidzadeh

Abstract:

Interaction between teachers and learners requires applying a set of samples (examples) which helps to create coordination between the goals and methods. The main result and achievement and application of samples (examples) are that they can bring the teacher and learner to a shared understanding of the concept. mathematical concepts, and also one of the challenging issues in the discussion of the function is to find the collision points of functions of and, regarding that the example space of teachers is different in this issue, this paper aims to present an example space including several problems of the secondary school with the help of intuition and drawing various graphs of functions of and for more familiarity of teachers.

Keywords: inverse function, educational example, Mathematic example, example space

Procedia PDF Downloads 163
8552 Exploring the Dark Side of IT Security: Delphi Study on Business’ Influencing Factors

Authors: Tizian Matschak, Ilja Nastjuk, Stephan Kühnel, Simon Trang

Abstract:

We argue that besides well-known primary effects of information security controls (ISCs), namely confidentiality, integrity, and availability, ISCs can also have secondary effects. For example, while IT can add business value through impacts on business processes, ISCs can be a barrier and distort the relationship between IT and organizational value through the impact on business processes. By applying the Delphi method with 28 experts, we derived 27 business process influence dimensions of ISCs. Defining and understanding these mechanisms can change the common understanding of the cost-benefit valuation of IT security investments and support managers' effective and efficient decision-making.

Keywords: business process dimensions, dark side of information security, Delphi study, IT security controls

Procedia PDF Downloads 99
8551 An Analysis of Transition in Building Form from Abolition of Diagonal Plane Control by Street Width: Focusing on Site Plan and Urban Block

Authors: Joohyun Park, Jin Baek

Abstract:

The purpose of this study is to Analyze the role and effect arise from Diagonal Plane Control by Street Width (DPCSW) in Architecture in Seoul, and to predict the aspect of transition about the relationship among buildings and Urban morphology After the abolition. To find the tendency of building shape regulation, This study review Building Acts concerned with form making (the building to land Ratio, building designated line, wall designated line, building height limit (DPCSW) and etc.) and simulate the shape of urban blocks made by Acts in drawings. The review results show DPCSW is not only limitation about height, but also making the building setback from road and make the Road broader. And it makes the typical shape of the urban block that buildings are moving away from surrounding road After the Abolition of DPCSW; it is expected by the legislature that domestic real estate’s market would be promoted by increased total floor areas in each building. Some substitution from the legislature is announced, but it just deals with Building Maximum unit by Block unit except the regulation about arrangement in urban Figure and Ground. In conclusion, refrain from the uncontrolled development of city, It is important to make regulation about not only height factors but limitation line in land. Furthermore, through revising District Unit Plan, It is positively necessary to reset the relationship between buildings for the making the city space better.

Keywords: diagonal plane control by street width, building maximum height, district unit plan, building acts, urban block type, morphology, building shape

Procedia PDF Downloads 293
8550 Urban Laboratory for Community Involvement in Urban Design Process

Authors: Anja Jutraz, Tadeja Zupancic

Abstract:

This article explores urban laboratory, which presents a combination of different physical and digital methods and tools for public participation in urban design. The city consists of built and unbuilt environments, which can be defined as a community of people, who live there. Communities should have the option to express opinions and decide about the future of their city, from the early stages of the design process onwards. In this paper, we presented the possibility of involving community into renewal of Banska Štiavnica in Slovakia (more exactly the old mining shaft and lake Michal Štolna) and the methods to promote the community building. As a case study we presented the eTHNo project, Education about Technical, Historical and Natural opportunities of Michal Štolna. Moreover, we discussed the possibility of using virtual digital tools for public participation in urban design, where we especially focused on Virtual Urban Laboratory, VuLab.

Keywords: community building, digital tools, public participation, urban design

Procedia PDF Downloads 557
8549 The Change of Urban Land Use/Cover Using Object Based Approach for Southern Bali

Authors: I. Gusti A. A. Rai Asmiwyati, Robert J. Corner, Ashraf M. Dewan

Abstract:

Change on land use/cover (LULC) dominantly affects spatial structure and function. It can have such impacts by disrupting social culture practice and disturbing physical elements. Thus, it has become essential to understand of the dynamics in time and space of LULC as it can be used as a critical input for developing sustainable LULC. This study was an attempt to map and monitor the LULC change in Bali Indonesia from 2003 to 2013. Using object based classification to improve the accuracy, and change detection, multi temporal land use/cover data were extracted from a set of ASTER satellite image. The overall accuracies of the classification maps of 2003 and 2013 were 86.99% and 80.36%, respectively. Built up area and paddy field were the dominant type of land use/cover in both years. Patch increase dominantly in 2003 illustrated the rapid paddy field fragmentation and the huge occurring transformation. This approach is new for the case of diverse urban features of Bali that has been growing fast and increased the classification accuracy than the manual pixel based classification.

Keywords: land use/cover, urban, Bali, ASTER

Procedia PDF Downloads 530
8548 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 279
8547 Obtaining High-Dimensional Configuration Space for Robotic Systems Operating in a Common Environment

Authors: U. Yerlikaya, R. T. Balkan

Abstract:

In this research, a method is developed to obtain high-dimensional configuration space for path planning problems. In typical cases, the path planning problems are solved directly in the 3-dimensional (D) workspace. However, this method is inefficient in handling the robots with various geometrical and mechanical restrictions. To overcome these difficulties, path planning may be formalized and solved in a new space which is called configuration space. The number of dimensions of the configuration space comes from the degree of freedoms of the system of interest. The method can be applied in two ways. In the first way, the point clouds of all the bodies of the system and interaction of them are used. The second way is performed via using the clearance function of simulation software where the minimum distances between surfaces of bodies are simultaneously measured. A double-turret system is held in the scope of this study. The 4-D configuration space of a double-turret system is obtained in these two ways. As a result, the difference between these two methods is around 1%, depending on the density of the point cloud. The disparity between the two forms steadily decreases as the point cloud density increases. At the end of the study, in order to verify 4-D configuration space obtained, 4-D path planning problem was realized as 2-D + 2-D and a sample path planning is carried out with using A* algorithm. Then, the accuracy of the configuration space is proved using the obtained paths on the simulation model of the double-turret system.

Keywords: A* algorithm, autonomous turrets, high-dimensional C-space, manifold C-space, point clouds

Procedia PDF Downloads 129
8546 Between Riots and Protests: A Structural Approach to Urban Environmental Uprisings in China

Authors: Zi Zhu

Abstract:

The last decade has witnessed increasing urban environmental uprisings in China, as thousands of citizens swarmed into streets to express their deep concerns about the environmental threat and public health through various collective actions. The prevalent western approaches to collective actions, which usually treat urban riots and social movements as distinct phenomenon, have plagued an adequate analysis of the urban environmental uprisings in China. The increasing urban environmental contention can neither be categorized into riots nor social movements, as they carry the features of both: at first sight, they are spontaneous, disorganized and disruptive with an absence of observable mobilization process; however, unlike riots in the west, these collective actions conveyed explicit demand in a mostly non-destructive way rather than a pure expression of frustration. This article proposes a different approach to urban environmental uprisings in China which concerns the diminishing boundaries between riots and social movements and points to the underlying structural causes to the unique forms of urban environmental contention. Taking the urban anti-PX protests as examples, this article analyzes the societal and political structural environment faced by the Chinese environmental protesters and its influence on the origin and development of their contention.

Keywords: urban environmental uprisings, China, anti-PX protests, opportunity structure

Procedia PDF Downloads 272
8545 Accuracy of Autonomy Navigation of Unmanned Aircraft Systems through Imagery

Authors: Sidney A. Lima, Hermann J. H. Kux, Elcio H. Shiguemori

Abstract:

The Unmanned Aircraft Systems (UAS) usually navigate through the Global Navigation Satellite System (GNSS) associated with an Inertial Navigation System (INS). However, GNSS can have its accuracy degraded at any time or even turn off the signal of GNSS. In addition, there is the possibility of malicious interferences, known as jamming. Therefore, the image navigation system can solve the autonomy problem, because if the GNSS is disabled or degraded, the image navigation system would continue to provide coordinate information for the INS, allowing the autonomy of the system. This work aims to evaluate the accuracy of the positioning though photogrammetry concepts. The methodology uses orthophotos and Digital Surface Models (DSM) as a reference to represent the object space and photograph obtained during the flight to represent the image space. For the calculation of the coordinates of the perspective center and camera attitudes, it is necessary to know the coordinates of homologous points in the object space (orthophoto coordinates and DSM altitude) and image space (column and line of the photograph). So if it is possible to automatically identify in real time the homologous points the coordinates and attitudes can be calculated whit their respective accuracies. With the methodology applied in this work, it is possible to verify maximum errors in the order of 0.5 m in the positioning and 0.6º in the attitude of the camera, so the navigation through the image can reach values equal to or higher than the GNSS receivers without differential correction. Therefore, navigating through the image is a good alternative to enable autonomous navigation.

Keywords: autonomy, navigation, security, photogrammetry, remote sensing, spatial resection, UAS

Procedia PDF Downloads 170
8544 The Penetration of Urban Mobility Multi-Modality Enablers in a Vehicle-Dependent City

Authors: Lama Yaseen, Nourah Al-Hosain

Abstract:

A Multi-modal system in urban mobility is an essential framework for an optimized urban transport network. Many cities are still heavily dependent on vehicle transportation, dominantly using conventional fuel-based cars for daily travel. With the reliance on motorized vehicles in large cities such as Riyadh, the capital city of Saudi Arabia, traffic congestion is eminent, which ultimately results in an increase in road emissions and loss of time. Saudi Arabia plans to undergo a massive transformation in mobility infrastructure and urban greening projects, including introducing public transport and other massive urban greening infrastructures that enable alternative mobility options. This paper uses a Geographic Information System (GIS) approach that analyzes the accessibility of current and planned public transport stations and how they intertwine with massive urban greening projects that may play a role as an enabler of micro-mobility and walk-ability options in the city.

Keywords: urban development, urban mobility, sustainable mobility, Middle East

Procedia PDF Downloads 77
8543 Designing Sustainable and Energy-Efficient Urban Network: A Passive Architectural Approach with Solar Integration and Urban Building Energy Modeling (UBEM) Tools

Authors: A. Maghoul, A. Rostampouryasouri, MR. Maghami

Abstract:

The development of an urban design and power network planning has been gaining momentum in recent years. The integration of renewable energy with urban design has been widely regarded as an increasingly important solution leading to climate change and energy security. Through the use of passive strategies and solar integration with Urban Building Energy Modeling (UBEM) tools, architects and designers can create high-quality designs that meet the needs of clients and stakeholders. To determine the most effective ways of combining renewable energy with urban development, we analyze the relationship between urban form and renewable energy production. The procedure involved in this practice include passive solar gain (in building design and urban design), solar integration, location strategy, and 3D models with a case study conducted in Tehran, Iran. The study emphasizes the importance of spatial and temporal considerations in the development of sector coupling strategies for solar power establishment in arid and semi-arid regions. The substation considered in the research consists of two parallel transformers, 13 lines, and 38 connection points. Each urban load connection point is equipped with 500 kW of solar PV capacity and 1 kWh of battery Energy Storage (BES) to store excess power generated from solar, injecting it into the urban network during peak periods. The simulations and analyses have occurred in EnergyPlus software. Passive solar gain involves maximizing the amount of sunlight that enters a building to reduce the need for artificial lighting and heating. Solar integration involves integrating solar photovoltaic (PV) power into smart grids to reduce emissions and increase energy efficiency. Location strategy is crucial to maximize the utilization of solar PV in an urban distribution feeder. Additionally, 3D models are made in Revit, and they are keys component of decision-making in areas including climate change mitigation, urban planning, and infrastructure. we applied these strategies in this research, and the results show that it is possible to create sustainable and energy-efficient urban environments. Furthermore, demand response programs can be used in conjunction with solar integration to optimize energy usage and reduce the strain on the power grid. This study highlights the influence of ancient Persian architecture on Iran's urban planning system, as well as the potential for reducing pollutants in building construction. Additionally, the paper explores the advances in eco-city planning and development and the emerging practices and strategies for integrating sustainability goals.

Keywords: energy-efficient urban planning, sustainable architecture, solar energy, sustainable urban design

Procedia PDF Downloads 61
8542 Identification of Parameters for Urban and Regional Level Infrastructure Development - A Theoretical Perspective: Case Study – Rail Based Mass Transit in Indian Cities

Authors: Chitresh Kumar, Santanu Gupta

Abstract:

The research work intends to understand the process of initiation, planning and development of capital-intensive urban area level infrastructure development in East Asian Cities (specific to Indian Cities). With the onset of emphasis on sustainable urban transport, self-financed urban local bodies, it has become of utmost important to identify infrastructure and projects on a priority basis, which provide optimal utility to the urban area. Through identification of Spatial, Demographic and Socio-Economic and Political Instability Parameters and their trends for the past 60 years at the urban area and state level, the paper attempts to identify the most suitable time period when initiation of the project would become economically and demographically viable for the city.

Keywords: urban planning, regional planning, mass transit, infrastructure development, spatial planning

Procedia PDF Downloads 539
8541 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 191
8540 Urban Roof Farming: A Smart City Solution Leading to Sustainability

Authors: Phibankhamti Ryngnga

Abstract:

It is a common phenomenon worldwide that farmland has been gradually converted for urban development particularly in the 21st century keeping in mind the population increase on the other hand. Since food demand and supply are not in equilibrium in urban set up, therefore, there is a need for alternative to feed the hungry urban settlers worldwide. In this regard, urban rooftop farming is the only way out to meet the growing demand for food production with the extra benefits of making our urban areas and cities greener and when the populace is exposed to nature and vegetation, it in turn provides an array of psychological benefits, from decreased anxiety to increased productivity. Bare roofs in cities absorb and then radiate heat — a phenomenon known as the “heat island effect. This increases energy usage and contributes to the poor air quality that often plagues big cities. But Urban rooftop farming do provide many solutions to help cool buildings, ultimately reducing carbon emissions, and by growing food in the communities they serve, rooftop farmers lessen the environmental impact of food transportation. This paper will emphasise the significance of Urban roof farming in the present century which in itself a multi-solution to various city problems.

Keywords: urban, roof farming, smart solution, sustainability

Procedia PDF Downloads 123
8539 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 81
8538 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 312
8537 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 386
8536 Psychogeographic Analysis of Spatial Appropriation within Walking Practice: The City Centre versus University Campus in the Case of Van, Turkey

Authors: Yasemin Ilkay

Abstract:

Urban spatial pattern interacts with the minds and bodies of citizens and influences their perception and attitudes, which leads to a two-folded map of the same space: physical and Psychogeographic maps. Psychogeography is a field of inquiry (rooted in literature and fiction) investigating how the environment affects the feelings and behaviors of individuals. This term was posed by Situationist International Movement in the 1950s by Guy Debord; in the course of time, the artistic framework evolved into a political issue, especially with the term Dérive, which indicates ‘deviation’ and ‘resistance’ to the existing spatial reality. The term Dérive appeared on the track of Flânéur after one hundred years; and turned out to be a political tool to transform everyday urban life. The three main concepts of psychogeography [walking, dérive, and palimpsest] construct the epistemological framework for a psychogeographic spatial analysis. Mental representations investigating this framework would provide a designer to capture the invisible layers of the gap between ‘how a space is conceived’ and ‘how the same space is perceived and experienced.’ This gap is a neglected but critical issue to discuss in the planning discipline, and psychogeography provides methodological inputs to cover the interrelation among top-down designs of urban patterning and bottom-up reproductions of ‘the soul’ of urban space at the intersection of geography and psychology. City centers and university campuses exemplify opposite poles of spatial organization and walking practice, which may result in differentiated spatial appropriation forms. There is a traditional city center in Van, located at the core of the city with a dense population and several activities, but not connected to Van Lake, which is the largest lake in the country. On the other hand, the university campus is located at the periphery, and although it has a promenade along the lake’s coast and a regional hospital, it presents a limited walking experience with ambiguous forms of spatial appropriation. The city center draws a vivid urban everyday life; however, the campus presents a relatively natural life far away from the center. This paper aims to reveal the differentiated psychogeographic maps of spatial appropriation at the city center vs. the university campus, which is located at the periphery of the city and along the coast of the largest lake in Turkey. The main question of the paper is, “how do the psychogeographic maps of spatial appropriation differentiate at the city center and university campus in Van within the walking experience with reference to the two-folded map assumption.” The experiential maps of a core group of 15 planning students will be created with the techniques of mental mapping, photographing, and narratives through attentive walks conducted together on selected routes; in addition to these attentive walks, 30 more in-depth interviews will be conducted by the core group. The narrative of psychogeographic mapping of spatial appropriation at the two spatial poles would display the conflicting soul of the city with reference to sub-behavioural regions of walking, differentiated forms of derive and layers of palimpsest.

Keywords: attentive walk, body, cognitive geography, derive, experiential maps, psychogeography, Van, Turkey

Procedia PDF Downloads 63
8535 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 118
8534 Environmental Refugees in Africa: A Case Study of Sahel Region

Authors: Ahlem Setrallah

Abstract:

Environment has become a phenomenon directly linked to security in recent decades. This security aspect of environment is justified by the challenges that environment problems can have on human life and thus security especially within the scope of human security that is based mainly on the individual rather than on the state. Because Africa is not safe from the global warming and all its consequences on environment, this continent has witnessed many crises related to environment and that have had direct impact on security in Africa. One of those crises is environmental displacement or immigration which was caused by natural disasters like draught, desertification and food shortage to name but a few. This paper aims at shedding light at some important cases in the Africa focusing mainly on the Sahel region. The main research questions that we are trying to answer are the following: 1-What is the relationship between environment and forced immigration in the Sahel region? 2-What is the impact of environmental immigration on Security in the region? 3-How have the states in this region reacted to this crisis? 4-Is the measures taken by those states adequate or not? 5- How to remedy for the limitations of those measures? The paper is based on case study methodology as a way to better understand the relationship between security and environment using library research for data collection and analysis. This paper aims also at presenting some suggesting regarding possible ways of reducing the negative impact of environmental immigration.

Keywords: environment, refugees, Sahel region, security

Procedia PDF Downloads 450
8533 Factors Associated with Rural-Urban Migration and Its Associated Health Hazards on the Female Adolescents in Kumasi Metropolis

Authors: Freda Adomaa, Samuel Oppong Boampong, Charles Gyamfi Rahman

Abstract:

The living and working environment of migrants and their access to healthcare services induce good or poor health. This study was conducted to assess the factors associated with rural-urban migration and its associated health hazards among female adolescents. A sample size of two hundred (200) was chosen in which all responded to questionnaires comprising closed-ended questions, which were distributed to gather data from the respondents, after which it was analyzed using the Statistical Package for Social Sciences (SPSS) version 20. The utilized three causes of rural-urban migration thus political, economic and socio-cultural. The study revealed that political situations such as regional inequality (65.4%) and ethnic conflicts (78.2%) whereas economic factors such as lack of amenities (82.3%), lack of employment in rural communities (77.4%), lack of education (74%), and poverty (85.3%) as well as socio-cultural factors such as divorced parents (65.6%), media influence (79.1%), family conflicts (59.4%) and appealing urban informal sector (65.2%) are major causes of migration. Respondents’ encountered challenges such as poor remuneration for services (87.2%), being maltreated by a colleague or worker (69%), sleeping in open space (73.3%), and harassment by the task force (71.4%) and teenage pregnancies (58.5%). The study concluded that the three variables play a key role in adolescent migration and when they travel they end up getting involved in serious health hazardous behaviors such as rapes as well as physical and psychological harassments’. The study, therefore, recommends that vocational training of the rural people on small scale industries (non-farm) activities that could generate an income for the rural household should be introduced.

Keywords: rural, urban, migration, female health hazards

Procedia PDF Downloads 114
8532 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 445
8531 A Comparative Analysis of the Role, Representations and Architectural Identity of Public Space in Medieval and Contemporary Cairo

Authors: Muhammad Feteha

Abstract:

The socio-political Middle East scene has radically changed over the last decade, and one major contributor to this change was the Egyptian revolution of 2011. The massive impact of this revolution that originally started as a small protest in the Tahrir square has attracted more scholars to study the public space in Egypt, where it has become a necessity in order to understand and improve the socio-political conditions. The status of public space in Egypt has been deteriorating due to many reasons, including privatization and neglect. This paper studies one of the major problems of the contemporary public space in Cairo, which is the lack of identity. This takes place through a comparative analysis between selected case studies from both medieval and contemporary Cairo. The theoretical framework upon which the analysis is based views public space as a ‘container of social action’ and a ‘product of spatial practice’. Through the ‘deciphering of space’, differences in the socio-political role, symbolism, and identity of public spaces between both eras are shown. The paper aims to extract some lessons from public space in medieval Cairo, which was truly the ‘centerpiece of the public realm’ and a ‘fundamental expressions’ of the unique trans-dynastic architectural identity of Cairo. In addition, it suggests some strategies to revive the Cairene identity of public space instead of constructing new ones to be only ‘utilitarian spaces used for circulation’ and lack any identity.

Keywords: architectural identity, Cairene public space, Islamic architectural history, production of space

Procedia PDF Downloads 177
8530 Algebraic Characterization of Sheaves over Boolean Spaces

Authors: U. M. Swamy

Abstract:

A compact Hausdorff and totally disconnected topological space are known as Boolean space in view of the stone duality between Boolean algebras and such topological spaces. A sheaf over X is a triple (S, p, X) where S and X are topological spaces and p is a local homeomorphism of S onto X (that is, for each element s in S, there exist open sets U and G containing s and p(s) in S and X respectively such that the restriction of p to U is a homeomorphism of U onto G). Here we mainly concern on sheaves over Boolean spaces. From a given sheaf over a Boolean space, we obtain an algebraic structure in such a way that there is a one-to-one correspondence between these algebraic structures and sheaves over Boolean spaces.

Keywords: Boolean algebra, Boolean space, sheaf, stone duality

Procedia PDF Downloads 333
8529 An Exploration of Anti-Terrorism Laws in Nigeria

Authors: Sani Mohammed Adam

Abstract:

This work seeks to review the security challenges facing Nigeria and explore the relevance of laws and policies in tackling the menace. The work looks at the adequacy of available legislations and the functionality of relevant institutions such as the Armed Forces, the Nigeria Police Force, the State Security Service, the Defence Intelligence Agency and the Nigerian Intelligence Agency etc. Comparisons would be made with other jurisdictions, such as inter alia, the Homeland Security in the USA and Counter Terrorism Laws of the United Kingdom. Recommendations would be made on how to strengthen both institutions and laws to curtail the growth of Terrorism in Nigeria.

Keywords: legislations, Nigeria, security, terrorism

Procedia PDF Downloads 661
8528 Urban Rail Transit CBTC Computer Interlocking Subsystem Relying on Multi-Template Pen Point Tracking Algorithm

Authors: Xinli Chen, Xue Su

Abstract:

In the urban rail transit CBTC system, interlocking is considered one of the most basic sys-tems, which has the characteristics of logical complexity and high-security requirements. The development and verification of traditional interlocking subsystems are entirely manual pro-cesses and rely too much on the designer, which often hides many uncertain factors. In order to solve this problem, this article is based on the multi-template nib tracking algorithm for model construction and verification, achieving the main safety attributes and using SCADE for formal verification. Experimental results show that this method helps to improve the quality and efficiency of interlocking software.

Keywords: computer interlocking subsystem, penpoint tracking, communication-based train control system, multi-template tip tracking

Procedia PDF Downloads 142
8527 Landmines and the Postcolonial Security Discourse in Zimbabwe

Authors: Fradreck Jockonia Mujuru

Abstract:

The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.

Keywords: landmines, postcolonial, repression, security, violence

Procedia PDF Downloads 58
8526 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 435