Search results for: identity of local resources
10697 A Contested Territory in a Sacralized Landscape: The Fight of the Gich Community over Semien Mountains National Park
Authors: Marshet Girmay
Abstract:
Local community involvement is widely considered vital for the sustainability of heritage management. Yet, it is often the case that heritage-related projects lag behind in community involvement. In the Semien Mountains the creation, first, and expansion, later, of the National Park has led to several conflicts with the local communities that for centuries have inhabited the area. Local communities have only been passive actors in the plans to expand the Park set up by UNESCO and by local decision makers. This paper investigates the causes that led the Gich community, one of the communities affected by the Park’s expansion, to refuse the resettlement plan offered by the authorities. Qualitative research methods were employed, including document analysis, community conference and interview of informants. The paper shows that although the local community of Gich was highly attached to the Park’s heritage assets, their level of involvement in the heritage management was very low due to shortcomings in the design and implementation of official policies. Therefore, their attitude towards the Park’s managers has been until the present one of mistrust and opposition. The paper recommends to policy-makers a series of measures more sensitive towards local communities, such as that the development agencies act as true communication facilitators and regional authorities nurture sincere relationships with the locals.Keywords: Gich, heritage management, local communities, Semen Mountains, sustainability, UNESCO, world heritage site
Procedia PDF Downloads 33710696 Intangible Cultural Heritage as a Strategic Place Branding Tool
Authors: L. Ozoliņa
Abstract:
Place branding as a strategic marketing tool is applied in Latvia since 2000. The main objective of the study is to find unique connecting aspects of the intangible cultural heritage elements on the development of sustainable place branding. The study is based on in-depth semi-structured interviews with Latvian place branding experts and content analysis of Latvia's place brand identities. The study indicates place branding as an internal co-creational and educational process of all involved stakeholders of the place and highlights a critical view on the local place branding practices on the notability of the in-depth research of the intangible cultural heritage.Keywords: belonging, identity, intangible cultural heritage, narrative, self-image, place branding
Procedia PDF Downloads 14410695 Interpreting Form Based Code in Historic Residential Corridor
Authors: Diljan C. K.
Abstract:
Every location on the planet has a history and culture that give it its own identity and character, making it distinct from others. urbanised world, it is fashionable to remould its original character and impression in a contemporary style. The new character and impression of places show a complete detachment from their roots. The heritage and cultural values of the place are replaced by new impressions, and as a result, they eventually lose their identity and character and never have sustenance. In this situation, form-based coding acts as a tool in the urban design process, helping to come up with solutions that strongly bind individuals to their neighbourhood and are closely related to culture through the physical spaces they are associated with. Form-based code was made by pioneers of new urbanism in 1987 in the United States of America. Since then, it has been used in various projects inside and outside the USA with varied scales, from the design of a single building to the design of a whole community. This research makes an effort to interpret the form-based code in historic corridors to establish the association of physical form and space with the public realm to uphold the context and culture. Many of the historic corridors are undergoing a tremendous transformation in their physical form, avoiding their culture and context. This will lead to it losing its identity in form and function. If the case of Valiyashala in Trivandrum is taken as the case, which is transforming its form and will lead to the loss of its identity, the form-based code will be a suitable tool to strengthen its historical value. The study concludes by analysing the existing code (KMBR) of Valiyashala and form-based code to find the requirements in form-based code for Valiyashala.Keywords: form based code, urban conservation, heritage, historic corridor
Procedia PDF Downloads 10910694 The Importance of Optimization of Halal Tourism: A Study of the Development of Halal Tourism in Indonesia
Authors: Rizqi W. Romadhon, Nur Arifan
Abstract:
Halal Tourism is a part of tourism industry which is based on Islamic Principle and addressed to the Muslim tourist. The potency of halal tourism is very broad to be developed, because the growth of Muslim populations is rapidly increasing. Indonesia is one of the biggest countries with Majority of its population is Muslim, therefore human resources and natural resources have very good potential to be part of the Halal tourism industry. But the fact is Indonesia can not optimize the potential of human resources and natural resources as well as neighboring countries carried out. This paper will discuss the reasons of the importance of developing Halal tourism, and the factors influencing the success of developing halal tourism in Indonesia, and also the optimization strategies which can be adopted by the government so that the Halal tourism industry in Indonesia has a sustainable competitive advantage. The existence of this research is expected to government, tourism agents and others can optimize the potency of Indonesia’s Human resources and natural resources for developing Halal tourism industry in Indonesia.Keywords: halal tourism, Islamic principle, optimization, sustainable competitive advantage
Procedia PDF Downloads 38410693 Conflict of the Thai-Malaysian Gas Pipeline Project
Authors: Nopadol Burananuth
Abstract:
This research was aimed to investigate (1) the relationship among local social movements, non-governmental Organization activities and state measures deployment; and (2) the effects of local social movements, non-governmental Organization activities, and state measures deployment on conflict of local people towards the Thai-Malaysian gas pipeline project. These people included 1,000 residents of the four districts in Songkhla province. The methods of data analysis consist of multiple regression analysis. The results of the analysis showed that: (1) local social movements depended on information, and mass communication; deployment of state measures depended on compromise, coordination, and mass communication; and (2) the conflict of local people depended on mobilization, negotiation, and campaigning for participation of people in the project. Thus, it is recommended that to successfully implement any government policy, consideration must be paid to the conflict of local people, mobilization, negotiation, and campaigning for people’s participation in the project.Keywords: conflict, NGO activities, social movements, state measures
Procedia PDF Downloads 32210692 A Proposal of Local Indentation Techniques for Mechanical Property Evaluation
Authors: G. B. Lim, C. H. Jeon, K. H. Jung
Abstract:
General light metal alloys are often developed in the material of transportation equipment such as automobiles and aircraft. Among the light metal alloys, magnesium is the lightest structural material with superior specific strength and many attractive physical and mechanical properties. However, magnesium alloys were difficult to obtain the mechanical properties at warm temperature. The aims of present work were to establish an analytical relation between mechanical properties and plastic flow induced by local indentation. An experimental investigation of the local strain distribution was carried out using a specially designed local indentation equipment in conjunction with ARAMIS based on digital image correlation method.Keywords: indentation, magnesium, mechanical property, lightweight material, ARAMIS
Procedia PDF Downloads 49210691 The Stereotypical Images of Marginalized Women in the Poetry of Rita Dove
Authors: Wafaa Kamal Isaac
Abstract:
This paper attempts to shed light upon the stereotypical images of marginalized black women as shown through the poetry of Rita Dove. Meanwhile, it explores how stereotypical images held by the society and public perceptions perpetuate the marginalization of black women. Dove is considered one of the most fundamental African-American poets who devoted her writings to explore the problem of identity that confronted marginalized women in America. Besides tackling the issue of black women’s stereotypical images, this paper focuses upon the psychological damage which the black women had suffered from due to their stripped identity. In ‘Thomas and Beulah’, Dove reflects the black woman’s longing for her homeland in order to make up for her lost identity. This poem represents atavistic feelings deal with certain recurrent images, both aural and visual, like the image of Beulah who represents the African-American woman who searches for an identity, as she is being denied and humiliated one in the newly founded society. In an attempt to protest against the stereotypical mule image that had been imposed upon black women in America, Dove in ‘On the Bus with Rosa Parks’ tries to ignite the beaten spirits to struggle for their own rights by revitalizing the rebellious nature and strong determination of the historical figure ‘Rosa Parks’ that sparked the Civil Rights Movement. In ‘Daystar’, Dove proves that black women are subjected to double-edged oppression; firstly, in terms of race as a black woman in an unjust white society that violates her rights due to her black origins and secondly, in terms of gender as a member of the female sex that is meant to exist only to serve man’s needs. Similarly, in the ‘Adolescence’ series, Dove focuses on the double marginalization which the black women had experienced. It concludes that the marginalization of black women has resulted from the domination of the masculine world and the oppression of the white world. Moreover, Dove’s ‘Beauty and the Beast’ investigates the African-American women’s problem of estrangement and identity crisis in America. It also sheds light upon the psychological consequences that resulted from the violation of marginalized women’s identity. Furthermore, this poem shows the black women’s self-debasement, helplessness, and double consciousness that emanate from the sense of uprootedness. Finally, this paper finds out that the negative, debased and inferior stereotypical image held by the society did not only contribute to the marginalization of black women but also silenced and muted their voices.Keywords: stereotypical images, marginalized women, Rita Dove, identity
Procedia PDF Downloads 16410690 Community Forest Management Practice in Nepal: Public Understanding of Forest Benefit
Authors: Chandralal Shrestha
Abstract:
In the developing countries like Nepal, the community based forest management approach has often been glorified as one of the best forest management alternatives to maximize the forest benefits. Though the approach has succeeded to construct a local level institution and conserve the forest biodiversity, how the local communities perceived about the forest benefits, the question always remains silent among the researchers and policy makers. The paper aims to explore the understanding of forest benefits from the perspective of local communities who used the forests in terms of institutional stability, equity and livelihood opportunity, and ecological stability. The paper revealed that the local communities have mixed understanding over the forest benefits. The institutional and ecological activities carried out by the local communities indicated that they have better understanding over the forest benefits. However, inequality while sharing the forest benefits, low pricing strategy and its negative consequences in valuation of forest products and limited livelihood opportunities indicated the poor understanding.Keywords: community based forest management, forest benefits, lowland, Nepal
Procedia PDF Downloads 31210689 Energy Efficient Plant Design Approaches: Case Study of the Sample Building of the Energy Efficiency Training Facilities
Authors: Idil Kanter Otcu
Abstract:
Nowadays, due to the growing problems of energy supply and the drastic reduction of natural non-renewable resources, the development of new applications in the energy sector and steps towards greater efficiency in energy consumption are required. Since buildings account for a large share of energy consumption, increasing the structural density of buildings causes an increase in energy consumption. This increase in energy consumption means that energy efficiency approaches to building design and the integration of new systems using emerging technologies become necessary in order to curb this consumption. As new systems for productive usage of generated energy are developed, buildings that require less energy to operate, with rational use of resources, need to be developed. One solution for reducing the energy requirements of buildings is through landscape planning, design and application. Requirements such as heating, cooling and lighting can be met with lower energy consumption through planting design, which can help to achieve more efficient and rational use of resources. Within this context, rather than a planting design which considers only the ecological and aesthetic features of plants, these considerations should also extend to spatial organization whereby the relationship between the site and open spaces in the context of climatic elements and planting designs are taken into account. In this way, the planting design can serve an additional purpose. In this study, a landscape design which takes into consideration location, local climate morphology and solar angle will be illustrated on a sample building project.Keywords: energy efficiency, landscape design, plant design, xeriscape landscape
Procedia PDF Downloads 26110688 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories
Authors: Hatice Idil Gorgen
Abstract:
This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.Keywords: discourse, post colonialism, post modernism, objectivity
Procedia PDF Downloads 16010687 The Role of Brand Authenticity in Egyptian Destination Marketing
Authors: Hala Hilaly, Nermin Morsy, Jala Morsy Ibrahim
Abstract:
Brand authenticity has a significant impact on brand trust and can help grow within the markets. Consumers have become more concerned with the 'authenticity' due to the doubt of credibility of the value of mass production. This is why people prefer authentic products, which making authenticity a cornerstone of contemporary marketing and a major factor for brand success. Therefore, it is important to embrace a culture that encourages and promotes authentic values. Hence, the purpose of the research is to investigate the impact of using local products as an authentic brand on promoting Egyptian tourist destination and explore the effect of Globalized authenticity on the local product in Egypt. Results confirmed that local products provide an excellent opportunity to worldwide advertising with positive impact on promoting Egypt as tourist destination. However, number of problems are facing local products in Egypt such as imported 'Made in China' products as well as other obstacles.Keywords: authentic brand, contemporary marketing, destination marketing, local products
Procedia PDF Downloads 28310686 Phenology and Size in the Social Sweat Bee, Halictus ligatus, in an Urban Environment
Authors: Rachel A. Brant, Grace E. Kenny, Paige A. Muñiz, Gerardo R. Camilo
Abstract:
The social sweat bee, Halictus ligatus, has been documented to alter its phenology as a response to changes in temporal dynamics of resources. Furthermore, H. ligatus exhibits polyethism in natural environments as a consequence of the variation in resources. Yet, we do not know if or how H. ligatus responds to these variations in urban environments. As urban environments become much more widespread, and human population is expected to reach nine billion by 2050, it is crucial to distinguish how resources are allocated by bees in cities. We hypothesize that in urban regions, where floral availability varies with human activity, H. ligatus will exhibit polyethism in order to match the extremely localized spatial variability of resources. We predict that in an urban setting, where resources vary both spatially and temporally, the phenology of H. ligatus will alter in response to these fluctuations. This study was conducted in Saint Louis, Missouri, at fifteen sites each varying in size and management type (community garden, urban farm, prairie restoration). Bees were collected by hand netting from 2013-2016. Results suggest that the largest individuals, mostly gynes, occurred in lower income neighborhood community gardens in May and August. We used a model averaging procedure, based on information theoretical methods, to determine a best model for predicting bee size. Our results suggest that month and locality within the city are the best predictors of bee size. Halictus ligatus was observed to comply with the predictions of polyethism from 2013 to 2015. However, in 2016 there was an almost complete absence of the smallest worker castes. This is a significant deviation from what is expected under polyethism. This could be attributed to shifts in planting decisions, shifts in plant-pollinator matches, or local climatic conditions. Further research is needed to determine if this divergence from polyethism is a new strategy for the social sweat bee as climate continues to alter or a response to human dominated landscapes.Keywords: polyethism, urban environment, phenology, social sweat bee
Procedia PDF Downloads 22110685 Assessing Suitability of Earthbag Technology for Temporary Housing: Sustainability Challenge
Authors: S. M. Amin Hosseini, Ana Blanco, Albert De La Fuente, Sergio Cavalaro
Abstract:
In emergency situations, it is fundamental to provide with a safe shelter to the population affected. However, the lack of resources and short time often represent a barrier difficult to overcome. A sustainable, rapid and low-cost construction technique is earthbag construction. This technique has spread as an alternative to the construction of emergency shelter, social housing, and even ecovillages. The earthbag construction consists of introducing soil in degradable bags that are stacked to form adobe structures. The present study aims to assess characteristics of the earthbag construction technique based on sustainability requirements and features of other methods used for temporary housing. In this case, after defining the sustainability criteria and emergency situation necessities, this study compares earthbag construction with other types of prefabricated temporary housing. Finally, the most suitable conditions for applying this technique based on the particular local properties and second life scenarios of superadobe temporary housing. The results of the study contribute to promote the earthbag and superadobe techniques as sustainable alternatives for temporary housing. However, the sustainability index of this technology highly depends on affected local conditions and characteristics. Consequently, in order to achieve a high sustainability index, emergency managers need to decide about this technology based on the highlighted results of this study, attention to the importance of specific local conditions and next functions of temporary housing.Keywords: temporary housing, temporary shelter, earthbag, superadobe, sustainability, emergency
Procedia PDF Downloads 22910684 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment
Authors: Wen Shyong Hsieh, Chih Hsueh Lin
Abstract:
In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication
Procedia PDF Downloads 39110683 Student Records Management System Using Smart Cards and Biometric Technology for Educational Institutions
Authors: Patrick O. Bobbie, Prince S. Attrams
Abstract:
In recent times, the rapid change in new technologies has spurred up the way and manner records are handled in educational institutions. Also, there is a need for reliable access and ease-of use to these records, resulting in increased productivity in organizations. In academic institutions, such benefits help in quality assessments, institutional performance, and assessments of teaching and evaluation methods. Students in educational institutions benefit the most when advanced technologies are deployed in accessing records. This research paper discusses the use of biometric technologies coupled with smartcard technologies to provide a unique way of identifying students and matching their data to financial records to grant them access to restricted areas such as examination halls. The system developed in this paper, has an identity verification component as part of its main functionalities. A systematic software development cycle of analysis, design, coding, testing and support was used. The system provides a secured way of verifying student’s identity and real time verification of financial records. An advanced prototype version of the system has been developed for testing purposes.Keywords: biometrics, smartcards, identity-verification, fingerprints
Procedia PDF Downloads 41910682 People's Perspective on Water Commons in Trans-Boundary Water Governance: A Case Study from Nepal
Authors: Sristi Silwal
Abstract:
South Asian rivers support ecosystems and sustain well-being of thousands of riparian communities. Rivers however are also sources of conflict between countries and one of the contested issues between governments of the region. Governments have signed treaties to harness some of the rivers but their provisions have not been successful in improving the quality of life of those who depend on water as common property resources. This paper will present a case of the study of the status of the water commons along the lower command areas of Koshi, Gandka and Mahakali rivers. Nepal and India have signed treaties for development and management of these rivers in 1928, 1954 and 1966. The study investigated perceptions of the local community on climate-induced disasters, provision of the treaties such as water for irrigation, participation in decision-making and specific impact of women. It looked at how the local community coped with adversities. The study showed that the common pool resources are gradually getting degraded, flood events increasing while community blame ‘other state’ and state administration for exacerbating these ills. The level of awareness about provisions of existing treatise is poor. Ongoing approach to trans-boundary water management has taken inadequate cognizance of these realities as the dominant narrative perpetuates cooperation between the governments. The paper argues that on-going discourses on trans-boundary water development and management need to use a new metrics of taking cognizance of the condition of the commons and that of the people depended on them for sustenance. In absence of such narratives, the scale of degradation would increase making those already marginalized more vulnerable to impacts of global climate change.Keywords: climate change vulnerability, conflict, cooperation, water commons
Procedia PDF Downloads 23610681 The Scale of Farms and Development Perspectives in Georgia
Authors: M. Chavleishvili, E. Kharaishvili, G. Erkomaishvili
Abstract:
The article presents the development trends of farms, estimates on the optimal scope of farming, as well as the experience of local and foreign countries in this area. As well, the advantages of small and large farms are discussed; herewith, the scales of farms are compared to the local reality. The study analyzes the results of farm operations and the possibilities of diversification of farms. The indicators of an effective use of land resources and land fragmentation are measured; also, a comparative analysis with other countries is presented, in particular, the measurements of agricultural lands for farming, as well as the indicators of population ensuring. The conducted research shows that most of the farms in Georgia are small and their development is at the initial stage, which outlines that the country has a high resource potential to increase the scale of the farming industry and its full integration into market relations. On the basis of the obtained results, according to the research on the scale of farming in Georgia and the identification of hampering factors of farming development, the conclusions are presented and the relevant recommendations are suggested.Keywords: farm cooperatives.farms, farm scale, land fragmentation, small and large farms
Procedia PDF Downloads 25610680 A Mixed Methodology of the Social and Spatial Fragmentation of the City of Beirut Leading to the Creation of Internal Boundaries
Authors: Hala Obeid
Abstract:
Among the cities that have been touched by hard events and have been experiencing this polemic of existence, one can quote Beirut. A city that defies and confronts itself for its own existence. Beirut materialized all the social complexity; it has also preserved the memory of a society that has been able to build and reflect a certain unique identity. In spite of its glory, Lebanon’s civil war has marked a turning point in Beirut’s history. It has caused many deaths and opposed religious communities. Once this civil war has ended, the reconstruction of the city center, however, saw the spatial exclusion of manual labor, small local commerce, and middle-class residences. The urban functions that characterized the pre-war center were removed, and the city’s spontaneous evolutions were replaced by a historical urban planning, which neglected the city’s memory and identity. The social and spatial fragmentation that has erupted since the war has led to a breakdown of spatial and social boundaries within the city. The aim of this study is to evaluate the impact of fragmentation and boundaries on the city of Beirut in spatial, social, religious and ethnic terms. The method used in this research is what we call the mixed method which is a combination between the quantitative method and the qualitative one. These two approaches, in this case, do not oppose but complement each other in order to study the city of Beirut physically and socially. The main purpose of the qualitative approach is to describe and analyze the social phenomenon of the fragmentation of the city; this method can be summarized by the field observation and study. While the quantitative approach is based on filling out questionnaires that leads to statistics analyzes. Together, these two approaches will mark the course of the research. As a result, Beirut is not only a divided city but is fragmented spatially into many fragments and socially into many groups. This fragmentation is creating immaterial boundaries between fragments and therefore between groups. These urban and social boundaries are specifically religious and ethnic limits. As a conclusion, one of the most important and discussed boundary in Beirut is a spatial and religious boundary called ‘the green line’ or the demarcation line, a true caesura within the city. It marks the opposition of two urban groups and the aggravated fragmentation between them. This line divided Beirut into two compartments: East Beirut (for Christians) and West Beirut (for Muslims). This green line has become an urban void that holds the past in suspension. Finally, to think of Beirut as an urban unit becomes an insoluble problem.Keywords: Beirut, boundaries, fragmentation, identity
Procedia PDF Downloads 17810679 A Cloud-Based Federated Identity Management in Europe
Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas
Abstract:
Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).Keywords: cybersecurity, identity federation, trust, user authentication
Procedia PDF Downloads 16610678 Development of Electronic Services in Georgia: Analysis of Current Situation
Authors: Dato Surmanidze, Dato Antadze, Tornike Partenadze
Abstract:
Public online services in Georgia are concentrated on main target segments: public administration, business, population, non-governmental and other interested organizations. Therefore, the strategy of digital Georgia is focused on providing G2C, G2B/B2G, G2NGO and G2G services. In G2C framework sophisticated and high-technological online services have been developed in order to provide passports, identity cards, documentations concerning residence and civil acts (birth, marriage, divorce, child adoption, change of name and surname, death, etc) as well as other services. Websites like my.gov.ge and sda.gov.ge have distance services like electronic application, processing and decision making. In line with international standards automatic services like electronic tenders, product catalogues, invoices and payment have been developed. This creates better investment climate for foreign companies in Georgia in the framework of G2B politics. The website mybusiness.gov.ge creates better conditions for local business. Among electronic services is e-NRMS (electronic system for national resource management) which was introduced by the Ministry of Finance of Georgia. The system was created in order to ensure management of national resources by state and business organizations. It is integrated with bank services and provides G2C, G2B and B2G representatives with electronic services. Also a portal meteo.gov.ge was created which gives electronic services concerning air, geological, environmental and pollution issues. Also worknet.gov.ge should be mentioned which is an electronic hub of information management for employers and employees. The information portal of labor market will facilitate receipt of information, its analysis and delivery to interested people like employers and employees. However, nowadays it’s been two years that only employees portal is activated. Therefore, awareness about the portal, its competitiveness and success is undermined.Keywords: electronic services, public administration, information technology, information society
Procedia PDF Downloads 26810677 Modelling and Optimization of Geothermal Energy in the Gulf of Suez
Authors: Amira Abdelhafez, Rufus Brunt
Abstract:
Geothermal energy in Egypt represents a significant untapped renewable resource that can reduce reliance on conventional power generation. Exploiting these geothermal resources depends on depth, temperature range, and geological characteristics. The intracontinental rift setting of the Gulf of Suez (GoS)-Red Sea rift is a favourable tectonic setting for convection-dominated geothermal plays. The geothermal gradient across the GoS ranges from 24.9 to 86.66 °C/km, with a heat flow of 31-127.2 mW/m². Surface expressions of convective heat loss emerge along the gulf flanks as hot springs (e.g., Hammam Faraun) accompanying deeper geothermal resources. These thermal anomalies are driven mainly by the local tectonic configuration. Characterizing the structural framework of major faults and their control on reservoir properties and subsurface hydrothermal fluid circulation is vital for geothermal applications in the gulf. The geothermal play systems of the GoS depend on structural and lithological properties that contribute to heat storage and vertical transport. Potential geothermal reservoirs include the Nubia sandstones, which, due to their thickness, continuity, and contact with hot basement rocks at a mean depth of 3 km, create an extensive reservoir for geothermal fluids. To develop these geothermal resources for energy production, defining the permeability anisotropy of the reservoir due to faults and facies variation is a crucial step in our study, particularly the evaluation of influence on thermal breakthrough and production rates.Keywords: geothermal, October field, site specific study, reservoir modelling
Procedia PDF Downloads 1210676 Development of Management Model for Promoting Sustainable Tourism of Rajabhat Universities in Thailand
Authors: Weera Weerasophon
Abstract:
This research paper is to study the development of a management model for promoting sustainable tourism of Rajabhat universities in Thailand. Mixed Method Research is applied under the said topic. The researcher has developed a management model to promote sustainable tourism. The objectives of the research are 1) to study the readiness in management sustainable tourism of Rajabhat universities in Thailand 2) to develop a management model for promoting sustainable tourism of those universities. The process of this research is organized in two steps according to the objectives. The results of the research are as in the following: 1. Rajabhat universities have the readiness in management for promoting sustainable tourism. The universities can be developed to be sustainable tourist attraction under the admistrators who have vision and realize the importance of tourism, eager to promote sustainable tourism of the universities by specifying obvious policy plans and management. 2. The management model for promoting sustainable tourism of Rajabhat universities is consisted of the main following factors : 2.1 Master plan and policy, 2.2 Rajabhat universities organization management and personnel administration, 2.3 Assignment and authority, leadership, 2.4 Join network, 2.5 Assurance of quality and controlling, 2.6 Budget management, 2.7 Human Resources management, 2.8 Alliance and co-ordination, 2.9 Tool of marketing. There are also other communal factors for promoting sustainable tourism. They are: local communities, local communities, tourism activities, government and private sectors, communicative technology system, history, tourist attractive, art and culture, internal and external environment including local wisdom heritage. The management model for promoting sustainable tourism can be concluded from these main and communal factors mentioned above.Keywords: tourism, sustainable tourism, management, Rajabhat University
Procedia PDF Downloads 41410675 Ireland to US Food Tourism the Diaspora and the Locale
Authors: Catriona Hilliard
Abstract:
Food identity is synonymous with many national tourism destinations and perceptions in tourist source markets – stereotypes could include snails in France; beer in Britain and Germany; paella in Spain - and is an accepted element of national identity that can be incorporated into tourism experiences. Irish transatlantic food connections are culturally strong with diaspora subsequent generations in the US displaying an online interest in traditional Irish food, even with a twist. Back ‘home’, the value of the local indigenous experience was a specific element of the way The Gathering 2013 was promoted to the Irish diaspora, developing community interest and input to tourism. Over the past 20 years, Ireland has realized the value of its food industry to tourism. This has included the establishment of food development programmes for the hospitality industry; food festivals as a possible element of the tourist experience; and a programmes of food ambassadors to market Irish produce and to encourage service providers to understand; utilize and incorporate this into their offerings. Irish produce is being now actively marketed as part of the proposed tourism experience, to particular segment markets including transatlantic visitors. In addition, individual providers are becoming aware of the value of the market, and how to gain from it. Also, networks of food providers have developed collaborative structures of promoting their experiences to audiences, displaying a cluster approach of tourism development towards that sector. A power point presentation will look at how Irish produce contributes to tourism marketing and promotion of Ireland to America; how that may have assisted sustainable development of communities here; and hopes to elicit some discussion relating to longer term identification of Irish food, as part of tourism, for the potential benefit of the ‘locale’.Keywords: Irish, USA, food, tourism
Procedia PDF Downloads 38910674 Bridging the Gap and Widening the Divide
Authors: Lerato Dixon, Thorsten Chmura
Abstract:
This paper explores whether ethnic identity in Zimbabwe leads to discriminatory behaviour and the degree to which a norm-based intervention can shift this discriminatory behaviour. Social Identity Theory suggests that group identity can lead to favouritism towards the in-group and discriminatory behaviour towards the out-group. Agents yield higher utility from maintaining positive self-esteem by confirming with group behaviour. This paper focuses on the two majority ethnic groups in Zimbabwe – the Ndebele and Shona. Racial identities are synonymous with the language spoken. Zimbabwe’s history highlights how identity formation took place. As following independence, political parties became recognised as either Ndebele or Shona-speaking. It is against this backdrop that this study investigates the degree to which norm-based nudge can alter behaviour. This paper uses experimental methods to analyse discriminatory behaviour between two naturally occurring ethnic groups in Zimbabwe. In addition, we investigate if social norm-based interventions can shift discriminatory behaviour to understand if the divide between these two identity groups can be further divided or healed. Participants are randomly assigned into three groups to receive information regarding a social norm. We compare the effect of a proscriptive social norm-based intervention, stating what shouldn't be done and prescriptive social norms as interventions, stating what should be done. Specifically, participants are either shown the socially appropriate (Heal) norm, the socially inappropriateness (Divide) norm regarding interethnic marriages or no norm-based intervention. Following the random assignment into intervention groups, participants take part in the Trust Game. We conjecture that discrimination will shift in accordance with the prevailing social norm. Instead, we find evidence of interethnic discriminatory behaviour. We also find that trust increases when interacting with Ndebele, Shona and Zimbabwean participants following the Heal intervention. However, if the participant is Shona, the Heal intervention decreases trust toward in-groups and Zimbabwean co-players. On the other hand, if the participant is Shona, the Divide treatment significantly increases trust toward Ndebele participants. In summary, we find evidence that norm-based interventions significantly change behaviour. However, the prescriptive norm-based intervention (Heal) decreases trust toward the in-group, out-group and national identity group if the participant is Shona – therefore having an adverse effect. In contrast, the proscriptive Divide treatment increases trust if the participant is Shona towards Ndebele co-players. We conclude that norm-based interventions have a ‘rebound’ effect by altering behaviour in the opposite direction.Keywords: discrimination, social identity, social norm-based intervention, zimbabwe
Procedia PDF Downloads 25010673 Anti-Intellectualism in Populist Discourse and Its Role in Identity Construction: A Comparative Study between the United States of America and France
Authors: Iuliana-Erika Köpeczi
Abstract:
‘Language is no longer regarded as peripheral to our grasp of the world we live in, but as central to it. Words are not mere vocal labels or communicational adjuncts superimposed upon an already given order of things. They are collective products of social interaction, essential instruments through which human beings constitute and articulate their world’, said Roy Harris. If we were to accept the above-mentioned premise, then we surely must accept that discourse, generally, - and political discourse, specifically -, bears a crucial importance to one’s perception of reality. The way in which political rhetoric constructs reality changes the relationship between the voter and his/her view of the world, which, in turn, influences greatly the future trends of political participation. In this context, our inquiry focuses on the role of populist discourses in the post 9/11 political rhetoric, and how this led to the formation, construction and reconstruction of identity within the ‘us’ vs. ‘them’ dichotomy. It is our hypothesis that anti-intellectualistic elements played a significant role in the manner in which identity construction had been carried out on a discursive level. By adopting a comparative approach, we intend to identify the similarities and differences between the use of such anti-intellectualist elements in the United States of America on one hand – within the discourse of Rick Santorum, – and France on the other – with Marine le Pen’s discourse. Our methodological approach uses close textual analysis of primary source material (discourse analysis); historical contextualization of both primary documents and broader socio-political and cultural framework through archival research and secondary sources; as well as interpretation of primary texts through theoretical frameworks (qualitative research). We hope that the output of our endeavor will be useful in better understanding the different correlations that exist between anti-intellectualism and populism and how the interactions between these two elements aids in political identity construction through discourse.Keywords: anti-intellectualism, discourse theory, France, identity construction, populism, United States of America
Procedia PDF Downloads 30810672 Analysing the Behaviour of Local Hurst Exponent and Lyapunov Exponent for Prediction of Market Crashes
Authors: Shreemoyee Sarkar, Vikhyat Chadha
Abstract:
In this paper, the local fractal properties and chaotic properties of financial time series are investigated by calculating two exponents, the Local Hurst Exponent: LHE and Lyapunov Exponent in a moving time window of a financial series.y. For the purpose of this paper, the Dow Jones Industrial Average (DIJA) and S&P 500, two of the major indices of United States have been considered. The behaviour of the above-mentioned exponents prior to some major crashes (1998 and 2008 crashes in S&P 500 and 2002 and 2008 crashes in DIJA) is discussed. Also, the optimal length of the window for obtaining the best possible results is decided. Based on the outcomes of the above, an attempt is made to predict the crashes and accuracy of such an algorithm is decided.Keywords: local hurst exponent, lyapunov exponent, market crash prediction, time series chaos, time series local fractal properties
Procedia PDF Downloads 15210671 Rebuilding Health Post-Conflict: Case Studies from Afghanistan, Cambodia, and Mozambique
Authors: Spencer Rutherford, Shadi Saleh
Abstract:
War and conflict negatively impact all facets of a health system; services cease to function, resources become depleted, and any semblance of governance is lost. Following cessation of conflict, the rebuilding process includes a wide array of international and local actors. During this period, stakeholders must contend with various trade-offs, including balancing sustainable outcomes with immediate health needs, introducing health reform measures while also increasing local capacity, and reconciling external assistance with local legitimacy. Compounding these factors are additional challenges, including coordination amongst stakeholders, the re-occurrence of conflict, and ulterior motives from donors and governments, to name a few. Therefore, the present paper evaluated health system development in three post-conflict countries over a 12-year timeline. Specifically, health policies, health inputs (such infrastructure and human resources), and measures of governance, from the post-conflict periods of Afghanistan, Cambodia, and Mozambique, were assessed against health outputs and other measures. All post-conflict countries experienced similar challenges when rebuilding the health sector, including; division and competition between donors, NGOs, and local institutions; urban and rural health inequalities; and the re-occurrence of conflict. However, countries also employed unique and effective mechanisms for reconstructing their health systems, including; government engagement of the NGO and private sector; integration of competing factions into the same workforce; and collaborative planning for health policy. Based on these findings, best-practice development strategies were determined and compiled into a 12-year framework. Briefly, during the initial stage of the post-conflict period, primary stakeholders should work quickly to draft a national health strategy in collaboration with the government, and focus on managing and coordinating NGOs through performance-based partnership agreements. With this scaffolding in place, the development community can then prioritize the reconstruction of primary health care centers, increasing and retaining health workers, and horizontal integration of immunization services. The final stages should then concentrate on transferring ownership of the health system national institutions, implementing sustainable financing mechanisms, and phasing-out NGO services. Overall, these findings contribute post-conflict health system development by evaluating the process holistically and along a timeline and can be of further use by healthcare managers, policy-makers, and other health professionals.Keywords: Afghanistan, Cambodia, health system development, health system reconstruction, Mozambique, post-conflict, state-building
Procedia PDF Downloads 15910670 Transgenerational Entrepreneurship in Chinese Family Businesses: Proposal for a Model of Work-Life Synergy
Authors: Jenny Oliveros Lao Phillips, Arturo E. Osorio, José Alves
Abstract:
Family business are the dominant form of business in the world, and Chinese family business (CFB) is a unique type of family business that relies on collective action to survive. This paper argues that in CFBs, entrepreneurial actions are transgenerational collective endeavors, and successors are groomed as stewards of the family legacy. Work-life relationship in CFBs is about synergy and not balance because the family identity is the business identity, and vice-versa. Using five in-depth case studies, this research introduces an alternative understanding of CFBs and proposes a model of work-life synergy in transgenerational entrepreneurship based on discussion of five theory-based propositions. This model explains that through emphasizing on the business family’s shared value and entrepreneurial legacy, elements of trust, shared identity and stewardship of family members are enhanced which leads to collective action and goal of the business family, resulting in transgenerational entrepreneurship. Limitations and future research are presented.Keywords: Chinese family business, family legacy, stewardship, transgenerational entrepreneurship, work-life synergy
Procedia PDF Downloads 29810669 The New Universities Law in Saudi Arabia, Bath to Develop the Higher Education in the Kingdom
Authors: Gassrm Alfaleh
Abstract:
The new Law of Universities has many goals, one of them is how each university can be independent financially and educationally. Another goal is to open doors for foreign universities to open branches in the kingdom. This paper focuses on how these goals can create competition between local and foreign universities. And how this new law can bring significant changes in the Kingdom’s higher education sector. The methodology of this study is to compare the new Saudi law to another legal system, especially in Australia. And how this new law can affect the higher education environment and Saudi culture. It covers the view of other different legal jurisdictions and compares it to this new law. The major findings are that the new law of universities can give a chance to Saudi universities to achieve their goals based on empowerment, quality, and participate in developing the educational and research methods. It may allow universities to start their own resources, permit them to create endowments and companies, and may allow them to create their degrees and programs. It will help those universities to increase the efficiency of spending, developing financial resources, and human capabilities for universities in line with the Kingdom’s Vision 2030. As a result, this paper states whether this new law can improve higher education in the kingdom of Saudi Arabia.Keywords: law, education, Saudi legal system, university
Procedia PDF Downloads 14310668 Moving Images and Re-Articulations of Self-Identity: Young People's Experiences of Viewing Representations Disability in Films
Authors: Alison Wilde, Stephen Millett
Abstract:
The cultural value of disabled people has largely been overlooked within forms of media and cultural analysis until the 1980s, when disabled people and disability studies highlighted the cultural misrecognition of disabled people and called for improved forms of cultural recognition and representation. Despite an increase in cultural analysis of representations of disabled people, much has been assumed about how images are read, and little work has been done on the value attributed to disabled people by media audiences and the viewing interests and encounters of film audiences. In particular, there has been little work on film reception, or on the way that young people interpret images of disability. We set out to understand some of the ways that young people read disability imagery, by showing small groups of young people different types of film featuring impairments, chosen from three different eras in film. These were Freaks, Rear Window (remake), and Finding Nemo. The discussions after these films allowed them to explore their own experiences of disability alongside the evolution of cultural representations; in so doing they discussed significant themes of cultural value and reflected on their own identities, e.g. in/dependency, autonomy, and competency and the ways these intersected with self-identity, and attitudes to disabled people.Keywords: film, audience, identity, disability
Procedia PDF Downloads 419