Search results for: cyber threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 903

Search results for: cyber threats

303 Influence of Low and Extreme Heat Fluxes on Thermal Degradation of Carbon Fibre-Reinforced Polymers

Authors: Johannes Bibinger, Sebastian Eibl, Hans-Joachim Gudladt

Abstract:

This study considers the influence of different irradiation scenarios on the thermal degradation of carbon fiber-reinforced polymers (CFRP). Real threats are simulated, such as fires with long-lasting low heat fluxes and nuclear heat flashes with short-lasting high heat fluxes. For this purpose, coated and uncoated quasi-isotropic samples of the commercially available CFRP HexPly® 8552/IM7 are thermally irradiated from one side by a cone calorimeter and a xenon short-arc lamp with heat fluxes between 5 and 175 W/cm² at varying time intervals. The specimen temperature is recorded on the front and backside as well as at different laminate depths. The CFRP is non-destructively tested with ultrasonic testing, infrared spectroscopy (ATR-FTIR), scanning electron microscopy (SEM), and micro-focused computed X-Ray tomography (μCT). Destructive tests are performed to evaluate the mechanical properties in terms of interlaminar shear strength (ILSS), compressive and tensile strength. The irradiation scenarios vary significantly in heat flux and exposure time. Thus, different heating rates, radiation effects, and temperature distributions occur. This leads to unequal decomposition processes, which affect the sensitivity of the strength type and damage behaviour of the specimens. However, with the use of surface coatings, thermal degradation of composite materials can be delayed.

Keywords: CFRP, one-sided thermal damage, high heat flux, heating rate, non-destructive and destructive testing

Procedia PDF Downloads 83
302 Choosing the Lesser Evil: Tribal Alignment Formation in Civil Wars

Authors: Busra Nur Ozguler Aktel

Abstract:

This research aims to understand the factors that affect the ways in which tribes perceive and respond to violent conflicts in fragile states, given that tribes are essential stakeholders in many conflict-ridden fragile states, whether Afghanistan, Iraq, Syria, Libya, Somalia, Nigeria, or Yemen. It explores the primary questions of why some tribes align with extremist groups while others align with states during civil wars and why some tribes switch alignments. It argues that tribes form and switch alignments based on their perception of threats to their traditional tribal structure (internal dynamics) and clientelist relationships (external dynamics). Put differently; threat perceptions lead them to choose either the state or extremist groups that will more likely secure their traditional structure and patronage networks. This study focuses on Iraqi tribes as a case study. It builds a theory of tribal alignment formation based on ethnographic fieldwork in the Middle East, with a particular focus on Iraqi Sunni tribes living in the Kurdish region of Iraq and Jordan. As a result of the interviews with tribal leaders and members, local journalists, researchers, and politicians, it concludes that complex (re)alignments of tribes can determine the course and outcome of the conflicts, either mitigating or escalating violence. This study contributes to the larger body of conflict management and peacebuilding literature by introducing tribes as non-state actors and exploring their interactions with other actors in civil wars.

Keywords: civil wars, tribes, alignment formation, side-switching, Iraq

Procedia PDF Downloads 66
301 Key Challenges Facing the Management of Archaeological and Tourism Sites in Jordan

Authors: Muna Slehat

Abstract:

Jordan is endowed with over 14,500 productive archaeological sites and also a wealth of heritage sites that need to be protected from the pressing threat of destruction and damage. Archaeological sites in Jordan face significant threats, including insensitive development, urbanization, pollution, tourism, and vandalism, therefore an effective management plan is a key element, not only for the conservation of this heritage, but also to address issues such as tourism and sustainable development. This study highlights the obstacles that confront the management of the archaeological and tourism sites in Jordan, prior to and after the launch of the Strategies for Management of Jordan’s Archaeological Heritage by the Department of Antiquities (DoA) 2007-2010 and 2014-2018, as well as the establishment of the Directorate of the Management of Archaeological Sites in 2010, and instructions for the proper use of tourism sites, 2014, by the Ministry of Tourism and Antiquities (MoTA). The study has revealed that the management of the archaeological and tourism sites under the pretext of improvement of services for tourists and visitors to Jordan would allow access to so-called polarization tourism and facilitate tourism development that would be sustainable economically and provide attractive returns. The data required have been collected through conducting interviews with 18 specialists. The main findings of the study are that management is new in Jordan, and has become a vital and dynamic force in Jordan after 2000 but that there have also been many mistakes, with sustainability of the sites being ignored and a lack of awareness among local communities surrounding these sites. Management of the sites has also suffered from a lack of organizational vision, with no instructions for practical application and no legislative provisions which cater for the efficient management of the sites. All of this needs to be amended to remove gaps, overlaps and ambiguities, so that the authorities responsible for the rehabilitation and promotion, development and management of these sites can overcome the problems, such as lack of human resources (specialists) and financial resources.

Keywords: Jordan, management, archaeological sites, tourism, challenges

Procedia PDF Downloads 274
300 Resilient Security System with Toll Free Call Services: Case Study of Adama City

Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein

Abstract:

Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.

Keywords: smart, safety, crime, call center, security

Procedia PDF Downloads 32
299 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 116
298 Influence of Pseudomonas japonica on Growth and Metal Tolerance of Celosia cristata L.

Authors: Muhammad Umair Mushtaq, Ameena Iqbal, Muhammad Aqib Hassan Ali Khan, Ismat Nawaz, Sohail Yousaf, Mazhar Iqbal

Abstract:

Heavy metals are one of the priority pollutants as they pose serious health and environmental threats. They can be removed by various physiochemical methods but are costly and responsible for additional environmental problems. Bioremediation that exploits plants and their associated microbes have been referred as cost effective and environmental friendly technique. In this study, a pot experiment was conducted in a greenhouse to evaluate the potential of Celosia cristata and effects of bacteria, Pseudomonas japonica, and organic amendment moss/compost on tolerating/accumulating heavy metals. Two weeks old seedlings were transferred to soil in pots, and after four weeks they were inoculated with bacterial strain, while after growth of six weeks they were watered with a metal containing synthetic wastewater and were harvested after a growth period of nine weeks. After harvesting, morphological and physiological parameters and metal content of plants were measured. The results showed highest plant growth and biomass production in case of organic amendments while highest metal uptake has been found in non-amended pots. Positive controls have shown highest Pb uptake of 2900 mg/kg DW, while P. japonica amended pots have shown highest Cd, Cr, Ni and Cu uptake of 963.53, 1481.17, 1022.01 and 602.17 mg/kg DW, respectively. In conclusion organic amendments have strong impacts on growth enhancement while P. japonica enhances metal translocation and accumulation to aerial parts with little significant involvement in plant growth.

Keywords: ornamental plants, plant microbe interaction, amendments, bacteria

Procedia PDF Downloads 258
297 Cycas beddomei Dyer: An Endemic and Endangered Indian Medicinal Plant

Authors: Ayyavu Brama Dhayala Selvam

Abstract:

Herbal medicines are gaining importance due to holistic nature and lesser side effects. Cycas beddomei Dyer is one of the highly exploited medicinal plants in India. Due to over-exploitation of male and female cones, young leaves and starch-bearing pithy stems for edible, medicinal and socio-cultural practices by the locals, tribals and traders, the plant population has drastically declined in its natural habitats. Cycas beddomei is an endemic to India. The current IUCN status of this plant species in the wild is endangered. Perhaps, it is the only species of Cycas enlisted in Appendix I of CITES (Convention on International Trade in Endangered Species of wild fauna and flora). Endorsing the CITES decisions, the Government of India has placed C. beddomei in the “Negative List of Exports” during 1998. Though this plant has been banned legally, but illegally, it is highly exploited by different means. Therefore, conservation of this species is an urgent need of the hour. The present paper highlights unique morphological and anatomical characters of C. beddomei, along with its present status, major threats and conservation measures. Cycas beddomei can easily be identified by some of the distinguishing morphological and anatomical characters, viz., 2–4 mm wide leaflets with revolute margins; the apices of microsporophylls from the middle to apex of the pollen cones turn downwards on maturity; mucilage canal cells are seen in the midrib region of the leaflets; stomatal frequency is about 18 numbers at 250x; pollen grains are monocolpate and their diameter ranging from 22.5 to 30 µm.

Keywords: CITES, Cycas beddomei, endangered, endemic

Procedia PDF Downloads 267
296 Understanding Patterns of Hard Coral Demographics in Kenyan Reefs to Inform Restoration

Authors: Swaleh Aboud, Mishal Gudka, David Obura

Abstract:

Background: Coral reefs are becoming increasingly vulnerable due to several threats ranging from climate change to overfishing. This has resulted in increased management and conservation efforts to protect reefs from degradation and facilitate recovery. Recruitmentof new individuals are isimportant in the recovery process and critical for the persistence of coral reef ecosystems. Local coral community structure can be influenced by successful recruit settlement, survival, and growth Understanding coral recruitment patterns can help quantify reef resilience and connectivity, establish baselines and track changes and evaluate the effectiveness of reef restoration and conservation efforts. This study will examine the abundance and spatial pattern of coral recruits and how this relates to adult community structure, including the distribution of thermal resistance and sensitive genera and their distribution in different management regimes. Methods: Coral recruit and demography surveys were conducted from 2020 to 2022, covering 35 sites in 19coral reef locations along the Kenyan coast. These included marine parks, reserves, community conservation areas (CMAs), and open access areas from the north (Marereni) to the south (Kisite) coast of Kenya and across different reef habitats. The data was collected through the underwater visual census (UVC) technique. We counted adult corals (>10 cm diameter)of23 selected genera using belt transects (25 by 1 m) and sampling of 1 m2 quadrat (at an interval of 5m) for all coloniesless than 10 cm diameter. The benthic cover was collected using photo quadrats. The surveys were only done during the northeast monsoon season. The data wereanalyzed using the R program to see the distribution patterns and the Kruskal Wallis test to see whether there was a significant difference. Spearman correlation was also applied to assess the relationship between the distribution of coral genera in recruits and adults. Results: A total of 44 different coral genera were recorded for recruits, ranging from 3at Marereni to 30at Watamu Marine Reserve. Recruit densities ranged from 1.2±1.5recruit m-2 (mean±SD) at Likoni to 10.3± 8.4 recruit m-2 at Kisite Marine Park. The overall densityof recruitssignificantly differed between reef locations, with Kisite Marine Park and Reserve and Likonihaving significantly large differences from all the other locations, while Vuma, Watamu, Malindi, and Kilifi had significantly lower differences from all the other locations. The recruit generadensity along the Kenya coastwas divided into two clusters, one of which only included sites inKisite Marine Park. Adult colonies were dominated by Porites massive, Acropora, Platygyra, and Favites, whereas recruits were dominated by Porites branching, Porites massive, Galaxea, and Acropora. However, correlation analysis revealed a statistically significant positive correlation (r=0.81, p<0.05) between recruit and adult coral densities across the 23 coral genera. Marereni, which had the lowest densityof recruits, has only thermallyresistant coral genera, while Kisite Marine Park, with the highest recruit densities, has over 90% thermal sensitive coral genera. A weak positive correlation was found between recruit density and coralline algae, dead standing corals, and turf algae, whereas a weak negative correlation was found between recruit density and bare substrate and macroalgae. Between management regimes, marine reserves were found to have more recruits than no-take zones (marine parks and CMAs) and open access areas, although the difference was not significant. Conclusion: There was a statistically significant difference in the density of recruits between different reef locations along the Kenyan coast. Although the dominating genera of adults and recruits were different, there was a strong positive correlation between their coral communities, which could indicate self-recruitment processes or consistent distance seedings (of the same recruit genera). Sites such as Kisite Marine Park, with high recruit densities but dominated by thermally sensitive genera, will, on the other hand, be adversely affected by future thermal stress. This could imply that reducing the threats to coral reefs such as overfishingcould allow for their natural regeneration and recovery.

Keywords: coral recruits, coral adult size-class, cora demography, resilience

Procedia PDF Downloads 97
295 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security

Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna

Abstract:

Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.

Keywords: cipher text, cryptography, plaintext, raaga

Procedia PDF Downloads 264
294 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 504
293 Dynamic Corrosion Prevention through Magneto-Responsive Nanostructure with Controllable Hydrophobicity

Authors: Anne McCarthy, Anna Kim, Yin Song, Kyoo Jo, Donald Cropek, Sungmin Hong

Abstract:

Corrosion prevention remains an indispensable concern across a spectrum of industries, demanding inventive and adaptable methodologies to effectively tackle the ever-evolving obstacles presented by corrosive surroundings. This abstract introduces a pioneering approach to corrosion prevention that amalgamates the distinct attributes of magneto-responsive polymers with finely adjustable hydrophobicity inspired by the structure of cicada wings, effectively deterring bacterial proliferation and biofilm formation. The proposed strategy entails the creation of an innovative array of magneto-responsive nanostructures endowed with the capacity to dynamically modulate their hydrophobic characteristics. This dynamic control over hydrophobicity facilitates active repulsion of water and corrosive agents on demand. Additionally, the cyclic motion generated by magnetic activation prevents the biofilms formation and rejection. Thus, the synergistic interplay between magneto-active nanostructures and hydrophobicity manipulation establishes a versatile defensive mechanism against diverse corrosive agents. This study introduces a novel method for corrosion prevention, harnessing the advantages of magneto-active nanostructures and the precision of hydrophobicity adjustment, resulting in water-repellency, effective biofilm removal, and offering a promising solution to handle corrosion-related challenges. We believe that the combined effect will significantly contribute to extending asset lifespan, improving safety, and reducing maintenance costs in the face of corrosion threats.

Keywords: magneto-active material, nanoimprinting, corrosion prevention, hydrophobicity

Procedia PDF Downloads 38
292 Measuring Impacts of Agroforestry on Soil Erosion with Field Devices: Quantifying Potential for Water Infiltration, Soil Conservation, and Payments for Ecosystems Services Schemes

Authors: Arthur Rouanet, Marina Gavaldao

Abstract:

Throughout the second half of the 20th Century, estimates indicate that soil losses due to erosion have impacted one-third of worldwide arable lands. As such, these losses are amongst the largest threats to agriculture sustainability and production potential. Increasing tree cover is considered one of the most efficient methods to mitigate this phenomenon. The present study describes soil erosion measurements in different land cover situations in Alto Huayabamba, Peru, using the experimental plot methodology. Three parcels were studied during a one-year period (starting September 2015) with 3 different land cover scenarii evaluated: 10-year-old secondary tropical forest (P1), 3-year-old native species reforestation (P2) and bare soil (P3). Information was collected systematically after each rain to assess the average rainfall, water runoff and soil eroded. The results indicate that variance in land cover has a strong impact on the level of soil erosion. In our study, it was found that P1, P2 and P3 had erosion rates of 92 kg/ha/yr, 11 tons/ha/yr and 59,7 tons/ha/year respectively. Using a replacement cost method, the potential of limiting erosion by reforesting bare soil was estimated to be 561 $/ha/yr after three years and 687 $/ha/yr after ten years. Finally, the results of the study allow us to assess the potential soil services provided by vegetation, which could be an important building block for a payment for ecosystems services (PES) scheme. The latter has been increasingly spread all over the world through Public-Private Partnerships (PPP).

Keywords: agroforestry, erosion, ecosystem services, payment for ecosystem services (PES), water conservation, public private partnership (PPP)

Procedia PDF Downloads 236
291 Dual Mode Mobile Based Detection of Endogenous Hydrogen Sulfide for Determination of Live and Antibiotic Resistant Bacteria

Authors: Shashank Gahlaut, Chandrashekhar Sharan, J. P. Singh

Abstract:

Increasing incidence of antibiotic-resistant bacteria is a big concern for the treatment of pathogenic diseases. The effect of treatment of patients with antibiotics often leads to the evolution of antibiotic resistance in the pathogens. The detection of antibiotic or antimicrobial resistant bacteria (microbes) is quite essential as it is becoming one of the big threats globally. Here we propose a novel technique to tackle this problem. We are taking a step forward to prevent the infections and diseases due to drug resistant microbes. This detection is based on some unique features of silver (a noble metal) nanorods (AgNRs) which are fabricated by a physical deposition method called thermal glancing angle deposition (GLAD). Silver nanorods are found to be highly sensitive and selective for hydrogen sulfide (H2S) gas. Color and water wetting (contact angle) of AgNRs are two parameters what are effected in the presence of this gas. H₂S is one of the major gaseous products evolved in the bacterial metabolic process. It is also known as gasotransmitter that transmits some biological singles in living systems. Nitric Oxide (NO) and Carbon mono oxide (CO) are two another members of this family. Orlowski (1895) observed the emission of H₂S by the bacteria for the first time. Most of the microorganism produce these gases. Here we are focusing on H₂S gas evolution to determine live/dead and antibiotic-resistant bacteria. AgNRs array has been used for the detection of H₂S from micro-organisms. A mobile app is also developed to make it easy, portable, user-friendly, and cost-effective.

Keywords: antibiotic resistance, hydrogen sulfide, live and dead bacteria, mobile app

Procedia PDF Downloads 121
290 E-Government Development in Nigeria, 'Bank Verification No': An Anti-Corruption Tool

Authors: Ernest C. Nwadinobi, Amanda Peart, Carl Adams

Abstract:

The leading countries like the USA, UK and some of the European countries have moved their focus away from just developing the e-government platform towards just the electronic services which aim at providing access to information to its citizens or customers, but they have gone to make significant backroom changes that can accommodate this electronic service being provided to its customers or citizens. E-government has moved from just providing electronic information to citizens and customers alike to serving their needs. In developing countries like Nigeria, the enablement of e-government is being used as an anti-corruption tool. The introduction of the Bank verification number (BVN) scheme by the Central Bank of Nigeria, has helped the government in not just saving money but also protecting customer’s transaction and enhancing confidence in the banking sector. This has helped curtail the high rate of cyber and financial crime that has been part of the system. The use of BVN as an anti-corruption tool in Nigeria came at a time there was need for openness, accountability, and discipline, after years of robbing the treasury and recklessness in handling finances. As there has not been a defined method for measuring the strength or success of e-government development, in this case BVN, in Nigeria, progress will remain at the same level. The implementation strategy of the BVN in Nigeria has mostly been a quick fix, quick win solution. In fact, there is little or no indication to show evidence of a framework for e-government. Like other leading countries, there is the need for proper implementation of strategy and framework especially towards a customer orientated process, which will accommodate every administrative body of the government institution including private business rather than focusing on a non-flexible organisational structure. The development of e-government must have a strategy and framework for it to work, and this strategy must enclose every public administration and will not be limited to any individual bodies or organization. A defined framework or monitoring method must be put in place to help evaluate and benchmark government development in e-government. This framework must follow the same concept or principles. In censorious analyses of the existing methods, this paper will denote areas that must be included in the existing approach to be able to channel e-government development towards its defined strategic objectives.

Keywords: Bank Verification No (BVN), quick-fix, anti-corruption, quick-win

Procedia PDF Downloads 139
289 Traditional Farming Practices and Climate Change Adaptation among the Dumagats of Tanay, Rizal and Their Implications to the Delivery of Extension and Advisory Services

Authors: Janika Vien K. Valsorable, Filma C. Calalo

Abstract:

Climate change is one of the most damaging and serious environmental threats worldwide being faced today. While almost everyone highly depends and puts their trust on what technology, innovations, and initiatives from hard-core science can do to cope with the changing climate, there are still people who find hope on indigenous knowledge systems. The study aimed to analyze the traditional farming practices of the Dumagats in Tanay, Rizal and how these relate to their adaptation and mitigation of climate change. The analysis is based on interviews with 17 members of the Dumagat tribe specifically residing in Barangay Cuyambay, San Andres, and Mamuyao, and supported by Key Informant Interview and Focus Group Discussion as well as document reviews. Results of the study showed that the Dumagats adopt indigenous knowledge systems and their high sensitivity and resilience to climate change aid them in their farming system and activities. These traditional farming practices are exemplified from land preparation to planting, fertilizer application, weed and pest management, harvesting and post-harvest activities. Owing to their dependence upon, and close relationship with the environment and its resources, the Dumagats have learned to interpret and react to the impacts of climate change in creative ways, drawing on their traditional knowledge to cope with the impending changes. With the increasing trend at all levels of government to service the needs of rural communities, there is the need for the extension to contextualize advisory service delivery for indigenous communities.

Keywords: climate change, Dumagat tribe, indigenous knowledge systems, traditional farming practices

Procedia PDF Downloads 244
288 Implementation of Modern Information Technologies in Business to Customer Marketing Activity and the Implementation of Pro-Environmental Goals of Enterprises

Authors: M. Łęgowik-Małolepsza

Abstract:

The article discusses the problem related to the use of modern information technologies to achieve pro-environmental marketing goals in business-to-customer (B2C) relationships. The topic is important and topical due to the strong social need to implement the concept of sustainable development. The aim of the article is to understand and evaluate the possibilities of implementing modern information technologies, such as Customer Relationship Management platforms (CRM), in the area of implementing marketing activities of companies operating in the Business to Customer model. In B2C relations, marketing departments struggle with problems resulting from the need for quick customer segmentation and the fragmentation of data existing in many systems, which significantly hinders the achievement of the assumed marketing goals. Therefore, the article proposes the use of modern information technology solutions in the area of marketing activities of enterprises, taking into account their pro-environmental goals. The most important results of the research carried out include an in-depth understanding of the possibilities of implementing modern information technologies to achieve marketing goals in B2C relationships. Moreover, a better understanding of the coexistence of opportunities and threats related to the implementation of marketing activities, taking into account pro-environmental goals and modern technologies, allows for more effective implementation of sustainable development management in enterprises. The methods used to achieve the goal are literature studies, descriptive analysis, and case studies. The study contributes to the discussion on the scope of application of modern information technologies in the area of B2C marketing activity, taking into account the implementation of pro-environmental goals of enterprises.

Keywords: B2C marketing activity, implementation of technologies, modern information technologies, pro-environmental activities

Procedia PDF Downloads 74
287 No Space for Subculture, No Space for Disruption: Taming Creativity in Urban Development Projects

Authors: Nadine Osbild

Abstract:

Recent urban development projects often try to cater to both high-tech innovation/start-up culture and local culture/sustainable living. In the process, the so-called “creative class” (Florida 2002) has become a focal point for innovative answers to increasing urban pressures. Our paper explores local subculture and art scenes as a place where current innovation policies and alternative approaches to urban future-making collide. We explore the (re-)making of prevalent understanding of creativity in the context of Munich – an economically successful and over-saturated city with a relatively conservative approach to innovation and disruption and no apparent need for the “creative class” remedy. In particular, we investigate the opportunities and manifestations of subculture in three urban development projects that are envisioned as collaborations between innovators and (sub)culturally oriented creativity. Following a co-production STS approach, we observe that these development projects serve as sites where understandings of innovation and creativity are configured and stabilized in keeping with broader socio-political and economic rationalities. What is more, the projects materialize a de-facto split between the two understandings of a “creative scene,” whereby alternative and potentially disruptive forms of creativity become sidelined or even prevented in Munich’s imagination of urban development in the name of innovation and economic growth. Thus taming the unruliness of creativity, Munich also manages to tame the disruptive threats of innovation, ensuring that the innovation-centered modes of future-making still leave socio-economic hierarchies intact while displacing (counter-)visions rooted in the subculture.

Keywords: creative districts, science and technology studies, public engagement, innovation studies

Procedia PDF Downloads 73
286 The Impact of Infectious Disease on Densely Populated Urban Area: In Terms of COVID-19

Authors: Samira Ghasempourkazemi

Abstract:

In terms of the COVID-19 pandemic, lots of mutations in the urban system, which have systemic impacts, have clearly appeared. COVID-19 not only had a direct impact on health but also caused significant losses to other departments, including the economy, education, tourism, environment and the construction industry. Therefore, the pandemic caused a disruption in the whole urban system. Particularly, today’s large urban areas are not designed in order to be compatible during a pandemic. Hence, cities are more vulnerable to infectious disease threats according to the population density, built environment and socioeconomic aspects. Considering the direct relationship between population and rate of infection, higher rates are given to those individuals located in areas with high-density populations. Population density can be a factor that seems to have a strong impact on the spread of infectious diseases. Thus, the preliminary hypothesis can be related to a densely populated areas which become hotspots for the rapid spread of the pandemic due to high levels of interaction. In addition, some other indicators can be effective in this condition, such as age range, education and socio-economy. To figure out the measure of infectious disease risk in densely populated areas in Istanbul is an objective of this study. Besides, this study intends to figure out Vulnerability Index in the case of COVID-19. In order to achieve the proper result, the considered method can be Analytic Hierarchy Process (AHP) by involving the mentioned variables. In the end, the study represents the COVID Vulnerability of densely populated areas in a metro city and the gaps that need to be identified and plugged for the pandemic-resilience city of tomorrow.

Keywords: infectious disease, COVID-19, urban system, densely populated area

Procedia PDF Downloads 60
285 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 299
284 A Chemical-Free Colouration Technique for Regenerated Fibres Using Waste Alpaca Fibres

Authors: M. Abdullah Al Faruque, Rechana Remadevi, Abu Naser M. Ahsanul Haque, Joselito Razal, Xungai Wang, Maryam Naebe

Abstract:

Generally, the colouration of textile fibres is performed by using synthetic colourants in dope dyeing or conventional dyeing methods. However, the toxic effect of some synthetic colorants due to long-term exposure can cause several health threats including cancer, asthma and skin diseases. Moreover, in colouration process, these colourants not only consume a massive amount of water but also generates huge proportion of wastewater to the environment. Despite having the environmentally friendly characteristics, current natural colourants have downsides in their yield and need chemical extraction processes which are water consuming as well. In view of this, the present work focuses to develop a chemical-free biocompatible and natural pigment based colouration technique to colour regenerated fibres. Waste alpaca fibre was used as a colourant and the colour properties, as well as the mechanical properties, of the regenerated fibres were investigated. The colourant from waste alpaca was fabricated through mechanical milling process and it was directly applied to the polyacrylonitrile (PAN) dope solution in different ratios of alpaca: PAN (10:90, 20:80, 30:70). The results obtained from the chemical structure characterization suggested that all the coloured regenerated fibres exhibited chemical functional groups of both PAN and alpaca. Furthermore, the color strength was increased gradually with the increment of alpaca content and showed excellent washing fastness properties. These results reveal a potential new pathway for chemical-free dyeing technique for fibres with improved properties.

Keywords: alpaca, chemical-free coloration, natural colorant, polyacrylonitrile, water consumption, wet spinning

Procedia PDF Downloads 150
283 Evaluation and Possibilities of Valorization of Ecotourism Potentials in the Mbam and Djerem National Park

Authors: Rinyu Shei Mercy

Abstract:

Protected areas are the potential areas for the development of ecotourism because of their biodiversity, landscapes, waterfalls, lakes, caves, salt lick and cultural heritage of local or indigenous people. These potentials have not yet been valorized, so this study will enable to investigate the evaluation and possibilities of valorization of ecotourism potentials in the Mbam and Djerem National Park. Hence, this was done by employing a combination of field observations, examination, data collection and evaluation, using a SWOT analysis. The SWOT provides an analysis to determine the strengths, weaknesses, opportunities and threats, and strategic suggestions for ecological planning. The study helps to determine an ecotouristic inventory and mapping of ecotourism potentials of the park, evaluate the degree of valorization of these potentials and the possibilities of valorization. Finally, the study has proven that the park has much natural potentials such as rivers, salt licks, waterfall and rapids, lakes, caves and rocks, etc. Also, from the study, it was realized that as concerns the degree of valorization of these ecotourism potentials, 50% of the population visit the salt lick of Pkayere because it’s a biodiversity hotspot and rich in mineral salt attracting a lot of animals and the least is the lake Miyere with 1% due to the fact that it is sacred. Moreover, from the results, there are possibilities that these potentials can be valorized and put into use because of their attractive nature such as creating good roads and bridges, good infrastructural facilities, good communication network etc. So, the study recommends that, in this process, MINTOUR, WCS, tour operators must interact sufficiently in order to develop the potential interest to ecotourism, ecocultural tourism and scientific tourism.

Keywords: ecotourism, national park Mbam and Djerem, valorization of biodiversity, protected areas of Cameroon

Procedia PDF Downloads 111
282 SWOT Analysis of the Industrial Sector in Kuwait

Authors: Abdullah Al-Alaian, Ahmad Al-Enzi, Hasan Al-Herz, Ahmad Bakri, Shant Tatorian, Amr Nounou

Abstract:

Kuwait is a country that has an imbalanced economy since most of its national outcome comes from the oil trade. It is so risky for a country to be dependent on a single source for income, and this increases the need to diversify its economy. In addition, according to the Public Authority for Industry, the contribution of the industrial sector to the current Gross Domestic Product (GDP) of Kuwait is low which is about 4.33%. Therefore, the development of the industrial sector can be one of the means to diversify the economy and increase the industry's contribution to the national outcome. This is in accordance with Kuwait’s vision of 2035 which aims at increasing the contribution of the industrial sector to the GDP to 12%. In order to do so, this study aims at proposing a strategic plan that will accomplish certain objectives when implemented. It is based on analyzing the industrial sectors in Kuwait taking into consideration studying the strengths, weaknesses, opportunities, and threats facing them. At the same time, it tends to gain from the experience of leading models and neighboring countries regarding the development of the industrial sector. In this study, the SWOT analysis technique will be conducted on all industrial sectors based on evaluation criteria in which it is determined whether any of them has a potential for improvement or not. In other words, it is determined whether the sectors are able to compete locally, regionally, or globally. Based on the results of the SWOT analysis, certain sectors will be chosen, assessed based on an assessment scheme, and their potentials for improvement will be aligned with the overall objectives. To ensure the achievement of the study’s objectives, an action plan will be proposed regarding recommendations for the related authorities, and for entrepreneurs. In addition, monitoring tools are going to be provided for the purpose of periodically checking the progress made in the implementation of the plan.

Keywords: industrial sector, SWOT analysis, productivity, competitiveness, GDP, Kuwait, economy

Procedia PDF Downloads 446
281 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.

Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs

Procedia PDF Downloads 69
280 Fear-Mongering and Its Antidotes: The Case of the Hungarian Anti-Migrant Campaign

Authors: Zsofia Nagy

Abstract:

A sharp increase in the number of refugees crossing Hungary during 2015, coupled with the Hungarian government’s agenda-setting strategy led to a powerful anti-migrant campaign in public, framing asylum-seekers as external threats to the country. While this campaign was, by and large, unchallenged by the Hungarian parliamentary opposition, Two-Tailed Dog Party, a Hungarian mock-party launched a counter-billboard campaign attacking the governmental discourse. Taking the latter as a case of digitally supported civic action, the paper first discusses two theoretical problems related to contemporary social movements: the problem of voice and the problem of participation. Afterward the paper presents the case of the Hungarian anti-migrant billboard campaign led by the government and the counter-billboard campaign and examines their action repertoires. It argues that a number of strategic differences are noteworthy: contrasts between traditional and digital methods, the reliance on the ’spirals of silence’ on the one hand and the breaking of this very silence on the other, where people are holding a minority opinion were given a platform and visibility in public. On a deeper level, the counter-campaign challenged the hegemonic views about public discourse. It effectively contrasted the government’s one-to-many, top-bottom approach to political communication with a campaign that relied on many-to-many communication and a bottom-up approach. While it is true that through memetic engineering, the original governmental messages were altered and the outcomes were brought back to the streets of Hungary; the effects of the two campaigns nevertheless reinforced the original anti-migrant focus of the political agenda.

Keywords: counterpublics, migration, refugees, social movements

Procedia PDF Downloads 213
279 Development of a Sensitive Electrochemical Sensor Based on Carbon Dots and Graphitic Carbon Nitride for the Detection of 2-Chlorophenol and Arsenic

Authors: Theo H. G. Moundzounga

Abstract:

Arsenic and 2-chlorophenol are priority pollutants that pose serious health threats to humans and ecology. An electrochemical sensor, based on graphitic carbon nitride (g-C₃N₄) and carbon dots (CDs), was fabricated and used for the determination of arsenic and 2-chlorophenol. The g-C₃N₄/CDs nanocomposite was prepared via microwave irradiation heating method and was dropped-dried on the surface of the glassy carbon electrode (GCE). Transmission electron microscopy (TEM), X-ray diffraction (XRD), photoluminescence (PL), Fourier transform infrared spectroscopy (FTIR), UV-Vis diffuse reflectance spectroscopy (UV-Vis DRS) were used for the characterization of structure and morphology of the nanocomposite. Electrochemical characterization was done by electrochemical impedance spectroscopy (EIS) and cyclic voltammetry (CV). The electrochemical behaviors of arsenic and 2-chlorophenol on different electrodes (GCE, CDs/GCE, and g-C₃N₄/CDs/GCE) was investigated by differential pulse voltammetry (DPV). The results demonstrated that the g-C₃N₄/CDs/GCE significantly enhanced the oxidation peak current of both analytes. The analytes detection sensitivity was greatly improved, suggesting that this new modified electrode has great potential in the determination of trace level of arsenic and 2-chlorophenol. Experimental conditions which affect the electrochemical response of arsenic and 2-chlorophenol were studied, the oxidation peak currents displayed a good linear relationship to concentration for 2-chlorophenol (R²=0.948, n=5) and arsenic (R²=0.9524, n=5), with a linear range from 0.5 to 2.5μM for 2-CP and arsenic and a detection limit of 2.15μM and 0.39μM respectively. The modified electrode was used to determine arsenic and 2-chlorophenol in spiked tap and effluent water samples by the standard addition method, and the results were satisfying. According to the measurement, the new modified electrode is a good alternative as chemical sensor for determination of other phenols.

Keywords: electrochemistry, electrode, limit of detection, sensor

Procedia PDF Downloads 113
278 Application and Limitation of Heavy Metal Pollution Indicators in Coastal Environment of Pakistan

Authors: Noor Us Saher

Abstract:

Oceans and Marine areas have a great importance, mainly regarding food resources, fishery products and reliance of livelihood. Aquatic pollution is common due to the incorporation of various chemicals mainly entering from urbanization, industrial and commercial facilities, such as oil and chemical spills. Many hazardous wastes and industrial effluents contaminate the nearby areas and initiate to affect the marine environment. These contaminated conditions may become worse in those aquatic environments situated besides the world’s largest cities, which are hubs of various commercial activities. Heavy metal contamination is one of the most important predicaments for marine environments and during past decades this problem has intensified due to an increase in urbanization and industrialization. Coastal regions of Pakistan are facing severe threats from various organic and inorganic pollutants, especially the estuarine and coastal areas of Karachi city, the most populated and industrialized city situated along the coastline. Metal contamination causes severe toxicity in biota resulting the degradation of Marine environments and depletion of fishery resources and sustainability. There are several abiotic (air, water and sediment) and biotic (fauna and flora) indicators that indicate metal contamination. However, all these indicators have certain limitations and complexities, which delay their implementation for rehabilitation and conservation in the marine environment. The inadequate evidences have presented on this significant topic till the time and this study discussed metal pollution and its consequences along the marine environment of Pakistan. This study further helps in identification of possible hazards for the ecological system and allied resources for management strategies and decision making for sustainable approaches.

Keywords: coastal and estuarine environment, heavy metals pollution, pollution indicators, Pakistan

Procedia PDF Downloads 225
277 New Advanced Medical Software Technology Challenges and Evolution of the Regulatory Framework in Expert Software, Artificial Intelligence, and Machine Learning

Authors: Umamaheswari Shanmugam, Silvia Ronchi

Abstract:

Software, artificial intelligence, and machine learning can improve healthcare through innovative and advanced technologies that can use the large amount and variety of data generated during healthcare services every day; one of the significant advantages of these new technologies is the ability to get experience and knowledge from real-world use and to improve their performance continuously. Healthcare systems and institutions can significantly benefit because the use of advanced technologies improves the efficiency and efficacy of healthcare. Software-defined as a medical device, is stand-alone software that is intended to be used for patients for one or more of these specific medical intended uses: - diagnosis, prevention, monitoring, prediction, prognosis, treatment or alleviation of a disease, any other health conditions, replacing or modifying any part of a physiological or pathological process–manage the received information from in vitro specimens derived from the human samples (body) and without principal main action of its principal intended use by pharmacological, immunological or metabolic definition. Software qualified as medical devices must comply with the general safety and performance requirements applicable to medical devices. These requirements are necessary to ensure high performance and quality and protect patients' safety. The evolution and the continuous improvement of software used in healthcare must consider the increase in regulatory requirements, which are becoming more complex in each market. The gap between these advanced technologies and the new regulations is the biggest challenge for medical device manufacturers. Regulatory requirements can be considered a market barrier, as they can delay or obstacle the device's approval. Still, they are necessary to ensure performance, quality, and safety. At the same time, they can be a business opportunity if the manufacturer can define the appropriate regulatory strategy in advance. The abstract will provide an overview of the current regulatory framework, the evolution of the international requirements, and the standards applicable to medical device software in the potential market all over the world.

Keywords: artificial intelligence, machine learning, SaMD, regulatory, clinical evaluation, classification, international requirements, MDR, 510k, PMA, IMDRF, cyber security, health care systems

Procedia PDF Downloads 70
276 Status of Mangrove Wetlands and Implications for Sustainable Livelihood of Coastal Communities on the Lagos Coast (West Africa)

Authors: I. Agboola Julius, Christopher A. Kumolu-Johnson, O. Kolade Rafiu, A. Saba Abdulwakil

Abstract:

This work elucidates on mangrove diversity, trends of change, factors responsible for loss over the years and implications for sustainable livelihoods of locals in four villages (Ajido (L1), Tarkwa bay (L2), University of Lagos (L3), and Ikosi (L4)) along the coast of Lagos, Nigeria. Primary data were collected through field survey, questionnaires, interviews, and review of existing literature. Field observation and data analysis reveals mangrove diversity as low and varied on a spatial scale, where Margalef’s Diversity Index (D) was 0.368, 0.269, 0.326, and 0.333, respectively for L1, L2, L3, and L4. Shannon Weiner’s Index (H) was estimated to be 1.003, 1.460, 1.160, 1.046, and Specie Richness (E) 0.913, 0.907, 0.858, and 0.015, respectively, for the four villages. Also, The Simpson’s index of diversity was analyzed to be 0.632, 0. 731, 0.647, 0.667, and Simpson’s reciprocal index 2.717, 3.717, 3.060, and 3.003, respectively, for the four villages. Chi-square test was used to analyze the impact of mangrove loss on the sustainable livelihood of coastal communities. Calculated Chi-square (X2) value (5) was higher than tabulated value (4.30), suggesting that loss of mangrove wetlands impacted on local communities’ livelihood at the four villages. Analyses of causes and trends of mangrove wetland loss over the years suggest that urbanization, fuel wood and agricultural activities are major causes. Current degradation observed in mangrove wetlands on the Lagos coast suggest a reduction in mangroves biodiversity and associated fauna with potential cascading effects on higher trophic levels such as fisheries. Low yield in fish catch, reduction in income and increasing cases of natural disaster has culminated in threats to sustainable livelihoods of local communities along the coast of Lagos.

Keywords: Mangroves, lagos coast, fisheries, management

Procedia PDF Downloads 619
275 Statistical Modelling of Maximum Temperature in Rwanda Using Extreme Value Analysis

Authors: Emmanuel Iyamuremye, Edouard Singirankabo, Alexis Habineza, Yunvirusaba Nelson

Abstract:

Temperature is one of the most important climatic factors for crop production. However, severe temperatures cause drought, feverish and cold spells that have various consequences for human life, agriculture, and the environment in general. It is necessary to provide reliable information related to the incidents and the probability of such extreme events occurring. In the 21st century, the world faces a huge number of threats, especially from climate change, due to global warming and environmental degradation. The rise in temperature has a direct effect on the decrease in rainfall. This has an impact on crop growth and development, which in turn decreases crop yield and quality. Countries that are heavily dependent on agriculture use to suffer a lot and need to take preventive steps to overcome these challenges. The main objective of this study is to model the statistical behaviour of extreme maximum temperature values in Rwanda. To achieve such an objective, the daily temperature data spanned the period from January 2000 to December 2017 recorded at nine weather stations collected from the Rwanda Meteorological Agency were used. The two methods, namely the block maxima (BM) method and the Peaks Over Threshold (POT), were applied to model and analyse extreme temperature. Model parameters were estimated, while the extreme temperature return periods and confidence intervals were predicted. The model fit suggests Gumbel and Beta distributions to be the most appropriate models for the annual maximum of daily temperature. The results show that the temperature will continue to increase, as shown by estimated return levels.

Keywords: climate change, global warming, extreme value theory, rwanda, temperature, generalised extreme value distribution, generalised pareto distribution

Procedia PDF Downloads 151
274 The Challenges of Digital Crime Nowadays

Authors: Bendes Ákos

Abstract:

Digital evidence will be the most widely used type of evidence in the future. With the development of the modern world, more and more new types of crimes have evolved and transformed. For this reason, it is extremely important to examine these types of crimes in order to get a comprehensive picture of them, with which we can help the authorities work. In 1865, with early technologies, people were able to forge a picture of a quality that is not even recognized today. With the help of today's technology, authorities receive a lot of false evidence. Officials are not able to process such a large amount of data, nor do they have the necessary technical knowledge to get a real picture of the authenticity of the given evidence. The digital world has many dangers. Unfortunately, we live in an age where we must protect everything digitally: our phones, our computers, our cars, and all the smart devices that are present in our personal lives and this is not only a burden on us, since companies, state and public utilities institutions are also forced to do so. The training of specialists and experts is essential so that the authorities can manage the incoming digital evidence at some level. When analyzing evidence, it is important to be able to examine it from the moment it is created. Establishing authenticity is a very important issue during official procedures. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. After the proper acquisition of the evidence, it is essential to store it safely and use it professionally. Otherwise, they will not have sufficient probative value and in case of doubt, the court will always decide in favor of the defendant. One of the most common problems in the world of digital data and evidence is doubt, which is why it is extremely important to examine the above-mentioned problems. The most effective way to avoid digital crimes is to prevent them, for which proper education and knowledge are essential. The aim is to present the dangers inherent in the digital world and the new types of digital crimes. After the comparison of the Hungarian investigative techniques with international practice, modernizing proposals will be given. A sufficiently stable yet flexible legislation is needed that can monitor the rapid changes in the world and not regulate afterward but rather provide an appropriate framework. It is also important to be able to distinguish between digital and digitalized evidence, as the degree of probative force differs greatly. The aim of the research is to promote effective international cooperation and uniform legal regulation in the world of digital crimes.

Keywords: digital crime, digital law, cyber crime, international cooperation, new crimes, skepticism

Procedia PDF Downloads 42