Search results for: Arabic Fodio Nigeria security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5369

Search results for: Arabic Fodio Nigeria security

4739 Investigation into the Socio-ecological Impact of Migration of Fulani Herders in Anambra State of Nigeria Through a Climate Justice Lens

Authors: Anselm Ego Onyimonyi, Maduako Johnpaul O.

Abstract:

The study was designed to investigate into the socio-ecological impact of migration of Fulani herders in Anambra state of Nigeria, through a climate justice lens. Nigeria is one of the world’s most densely populated countries with a population of over 284 million people, half of which are considered to be in abject poverty. There is no doubt that livestock production provides sustainable contributions to food security and poverty reduction to Nigeria economy, but not without some environmental implications like any other economic activities. Nigeria is recognized as being vulnerable to climate change. Climate change and global warming if left unchecked will cause adverse effects on livelihoods in Nigeria, such as livestock production, crop production, fisheries, forestry and post-harvest activities, because the rainfall regimes and patterns will be altered, floods which devastate farmlands would occur, increase in temperature and humidity which increases pest and disease would occur and other natural disasters like desertification, drought, floods, ocean and storm surges, which not only damage Nigerians’ livelihood but also cause harm to life and property, would occur. This and other climatic issue as it affects Fulani herdsmen was what this study investigated. In carrying out this research, a survey research design was adopted. A simple sampling technique was used. One local government area (LGA) was selected purposively from each of the four agricultural zone in the state based on its predominance of Fulani herders. For appropriate sampling, 25 respondents from each of the four Agricultural zones in the state were randomly selected making up the 100 respondent being sampled. Primary data were generated by using a set of structured 5-likert scale questionnaire. Data generated were analyzed using SPSS and the result presented using descriptive statistics. From the data analyzed, the study indentified; Unpredicted rainfall (mean = 3.56), Forest fire (mean = 4.63), Drying Water Source (mean = 3.99), Dwindling Grazing (mean 4.43), Desertification (mean = 4.44), Fertile land scarcity (mean = 3.42) as major factor predisposing Fulani herders to migrate southward while rejecting Natural inclination to migrate (mean = 2.38) and migration to cause trouble as a factor. On the reason why Fulani herders are trying to establish a permanent camp in Anambra state; Moderate temperature (mean= 3.60), Avoiding overgrazing (4.42), Search for fodder and water (mean = 4.81) and (mean = 4.70) respectively, Need for market (4.28), Favorable environment (mean = 3.99) and Access to fertile land (3.96) were identified. It was concluded that changing climatic variables necessitated the migration of herders from Northern Nigeria to areas in the South were the variables are most favorable to the herders and their animals.

Keywords: socio-ecological, migration, fulani, climate, justice, lens

Procedia PDF Downloads 42
4738 Policies and Politics of Infrastructure Provisioning in Nigeria

Authors: Olufemi Adedamola Oyedele

Abstract:

Infrastructure provision in Nigeria is now at its lowest ebb in spite of its being critical to the socio-economic and political development of any nation. This is partly because the policy that will ensure its adequate provisioning is missing and partly because politics is affecting its provision. Policy is the basic principles by which a government is guided. Infrastructural development is the basis for measuring the performance of governments and it is the foundation of good governance. Demand for infrastructural development is higher and resources used in its provision are limited. Ethnic-interest agitation and lobbying for infrastructure provision are common things in multi-ethnic state like Nigeria. Most infrastructures are now decayed and need repair or replacement. Government is the system that organizes, control and sensitizes the people in a society in other for all to have an acceptable level of living. Governments have the power to put in place all measures that they deem fit will make an environment conducive for living for everybody. Infrastructure development in any environment requires needs assessment, feasibility and viability studies and carrying out physical development of the project. The challenge in Nigeria is largely carrying out development where they are not needed but where the people are loyal. There are numerous abandoned projects because they were started due to politics and not because they are feasible. Policies and politics greatly affect infrastructure provisioning in Nigeria and this is the premise of this paper.

Keywords: infrastructure challenges, infrastructure development, policy making, politics, project finance

Procedia PDF Downloads 279
4737 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 95
4736 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 57
4735 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 382
4734 Self-Overestimation and Underestimation of Others: A Catalyst for Religious Conflict in Nigeria

Authors: Abdulazeez Balogun Shittu

Abstract:

This study investigates the role of self-overestimation and underestimation of others in fueling religious conflicts in Nigeria. Using a mixed-methods approach, this research examines how exaggerated self-perceptions and diminished views of others contribute to intergroup tensions, stereotypes, and violence. The findings reveal that self-overestimation and underestimation of others are significant predictors of religious conflict, mediated by factors such as intergroup bias, social identity, cultural narratives and lack of interfaith dialogue. The study also identifies the consequences of these biases, including Escalated sectarian violence, social cohesion erosion and polarized communities. To mitigate these effects, the research recommends interfaith education and dialogue initiatives, inclusive governance and policy frameworks and pluralistic media representation. This study contributes to the understanding of psychological and social dynamics driving religious conflict in Nigeria, informing evidence-based policies and interventions to promote peaceful coexistence.

Keywords: conflict resolution, intergroup relations, Nigeria, Religious conflict, self-overestimation, social psychology, underestimation of others

Procedia PDF Downloads 14
4733 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 384
4732 Mass Media Representation and the Status of Women in the 2015 General Elections in Nigeria

Authors: Grace Anweh, Patience Achakpa-ikyo

Abstract:

The issue of women unfavourable representation in the mass media is long standing. While it is a worldwide problem, developing countries in Africa especially Nigeria are considered peculiar. This paper, ‘mass media representation and the status of women in the 2015, general elections in Nigeria’ therefore aimed to assess the current trend of role playing in the mass media and how this has affected general status of women in Nigeria politics with particular reference to the 2015 general elections. The study employed a review of secondary literature and data regarding previous performances of Nigeria women in politics from 1999 to 2015 and the picture that has been paid by Nigerian mass media about women. Anchoring the paper on the agenda setting theory of the mass media, the paper analysed secondary literature and discovered that from 1999 to date, women have been participating in politics but rather than improve their status in elective offices, the percentage of women for such offices is rather declining. This trend the paper concluded is attributed to the way and manner women are represented in the mass media - as not good for policy making offices except as kitchen and home managers. The paper therefore recommends that, the country should adopt the quota allocation for all the political parties in order to give women a chance to compete with their male counterparts. While women should strive towards the managerial and ownership of media houses in order to represent the interest of women in politics thus offering the opportunity for the favourable representation of women and role models for those who may want to tour a similar part.

Keywords: mass media, media representation, Nigeria elections, women

Procedia PDF Downloads 332
4731 Unified Theory of Acceptance and Use of Technology in Evaluating Voters' Intention Towards the Adoption of Electronic Forensic Election Audit System

Authors: Sijuade A. A., Oguntoye J. P., Awodoye O. O., Adedapo O. A., Wahab W. B., Okediran O. O., Omidiora E. O., Olabiyisi S. O.

Abstract:

Electronic voting systems have been introduced to improve the efficiency, accuracy, and transparency of the election process in many countries around the world, including Nigeria. However, concerns have been raised about the security and integrity of these systems. One way to address these concerns is through the implementation of electronic forensic election audit systems. This study aims to evaluate voters' intention to the adoption of electronic forensic election audit systems using the Unified Theory of Acceptance and Use of Technology (UTAUT) model. In the study, the UTAUT model which is a widely used model in the field of information systems to explain the factors that influence individuals' intention to use a technology by integrating performance expectancy, effort expectancy, social influence, facilitating conditions, cost factor and privacy factor to voters’ behavioural intention was proposed. A total of 294 sample data were collected from a selected population of electorates who had at one time or the other participated in at least an electioneering process in Nigeria. The data was then analyzed statistically using Partial Least Square Structural Equation Modeling (PLS-SEM). The results obtained show that all variables have a significant effect on the electorates’ behavioral intention to adopt the development and implementation of an electronic forensic election audit system in Nigeria.

Keywords: election Audi, voters, UTAUT, performance expectancy, effort expectancy, social influence, facilitating condition social influence, facilitating conditions, cost factor, privacy factor, behavioural intention

Procedia PDF Downloads 73
4730 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 430
4729 A Review of the Literature on Factors Impacting Women’s Retention in Science, Technology, Engineering, Mathematics: A Critical Analysis of Nigeria and Georgia

Authors: Josephine O. Okocha, Ifeanyi Adigwe

Abstract:

This research aims to examine the factors impacting women's retention in STEM in Nigeria and Georgia. In a bid to come up with strategies to enhance women’s participation in STEM, this study identifies and juxtaposes the factors impacting the retention of women in STEM and how they vary from one country to another are discussed. This study adopted the literature review method to perform the critical analysis. A total of 76 papers were retrieved from the Scopus database and were published between 2018 and 2023. Only 12 papers met the criteria for inclusion in the analysis. The findings reveal that the factors impacting women’s retention in STEM include funding (NGOs and government agencies), scholarship, specialized recruitment, mentoring, the establishment of women-only higher institutions, creating a balanced work and family environment, combating stereotypes, and enabling policies and laws. The paper highlights some key recommendations to help improve the retention of women in STEM in Africa and Nigeria in particular.

Keywords: STEM, women, retention, career, Nigeria, Georgia, women’s retention, women representation

Procedia PDF Downloads 73
4728 Development of an Interagency Crime Management System for Nigeria’s Law Enforcement Agencies

Authors: Muhammad Abba Jallo, Fred Fudah Moveh

Abstract:

This study addresses the challenges faced by Nigerian law enforcement agencies due to the lack of an integrated crime management system. While various agencies use ICT-based systems, the absence of interoperability creates barriers to effective collaboration and information sharing. The research proposes the development of an Interagency Crime Management System (ICMS), which integrates the Crime Management Systems (CMS) of different agencies through an Application Program Interface (API). The system is designed to allow all law enforcement agencies to input data using a standardized format, improving crime tracking, reporting, and management across Nigeria. This paper details the design and implementation process, highlighting the benefits of enhanced collaboration for crime management.

Keywords: crime management, Nigeria, law enforcement, ICT

Procedia PDF Downloads 19
4727 The Integration of Prosecutorial Discretion in the Anti-Money Laundering Regime in Nigeria: A Focus on Politically Exposed Persons

Authors: Chineduum Okpala

Abstract:

Nigeria, since her independence, has been engulfed in financial crimes of different forms. From embezzlement and conversion of public funds by public servants to stealing, contract inflation, and money laundering. Money laundering in Nigeria, particularly by political exposed persons, has been an issue of concern since independence. Corruption has been endemic, and Nigeria needs to integrate pro-active measures to show to the international community that it is ready to move against this vice. This paper discusses the negative effect of corruption and its effect on prosecutorial discretion. It also takes cognisance of the policy and aims of the anti-money laundering (AML) policy as enacted in Nigeria. It also takes as valid the assumption that the effective application of the rule of law will improve the efficacy of the Nigerian regime. In this regard, the perspective is internal to the Nigerian regime and its internal policy discourse which also reflect its policy discourse at international level. This paper takes notice of the typology of money laundering (ML) offences that most affect Nigeria, which hinges on corruption and abuse of office by a specific type of person, politically exposed persons (PEP). This typology of money laundering offence appears to be the most prevalent in developing nations like Nigeria. The application of essential principles of law provides an opportunity for the internalisation of the rule of law in the anti-money laundering regime in Nigeria, which could aid the successful prosecution of politically exposed persons on money laundering offences. The rule of law and how well the Nigerian legal system manages to deal with the interface between high level politics and the criminal justice system in Nigeria cannot be understood from internal sources but must be developed as a genuine but critical account informed by perspectives external to the Nigerian regime. If the efficacy of the regime is to be assessed in view of notorious failures of the regime, an external assessment is needed. Hence the paper discusses the need to integrate the essential principles of law in the application of prosecutorial discretion in the anti-money laundering regime in Nigeria, particularly with politically exposed persons. The paper highlights jurisdiction where prosecutorial discretion is integrated into the anti-money laundering regime in accordance to the rule of law which forms a basis for comparative analysis of the success of the anti-money laundering regime in Nigeria. This paper discusses why the application of prosecutorial discretion should not be used as a tool to extricate or avail the rich and powerful in the society from justice. The paper aims to argue that the successful prosecution of politically exposed persons, will raise the confidence of the citizens and the international community in the anti-money laundering regime in Nigeria.

Keywords: money laundering, politically exposed persons, corruption, Nigeria

Procedia PDF Downloads 130
4726 The Legal Personality of The Security Council

Authors: Helyeh Doutaghi

Abstract:

The United Nations Security Council (UNSC) is one of the six principal organs of the United Nations. Under the Charter of the United Nations (UN Charter), the UNSC’s primary responsibility is maintaining international peace and security, which it does through establishing and adopting a Security Council resolution. United Nations resolutions are formal expressions of the opinion or will of United Nations organs. However, there have been times when powerful politicians (or governments with great political power) had the first say in situations where the UNSC should have had jurisdiction based on the principle of rule of law, which is the notion that people are governed by the law rather than by officials. This paper will assess the effectiveness of the UNSC by analyzing its actions during the Iran-Iraq war for it has been found that one of the major reasons for the prolongation of the war was a result of the one-sided positions taken by the UNSC and many nations. The UNSC’s success in achieving its primary goal during the war will be discussed, including an examination of the duties and structure of the UNSC by reviewing the articles in the UN Charter; this will include examples of the UNSC’s role in other international disputes as well.

Keywords: UN Security Council, Iran, Iraq, charter, international law

Procedia PDF Downloads 460
4725 Bring Your Own Device Security Model in a Financial Institution of South Africa

Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren

Abstract:

This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.

Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis

Procedia PDF Downloads 31
4724 Disaster and Emergency Management in Nigeria: The Case of Chibok School Girls Abducted by Boko Haram Insurgents

Authors: Aidelunuoghene Sunday Ojeifo

Abstract:

More than a decade ago, the Islamist Terrorist group called Boko Haram has caused terrible violence in the north-eastern part of Nigeria. The group’s use of suicide attacks is a dreadful trait of international terrorist violence. It is certainly not in doubt that Boko Haram is the biggest headache of the Nigerian Government right now. The objective of this paper is to answer four fundamental questions about the extremist group: Who is Boko Haram? Why does the group rebel? How has the Nigerian state responded to the emergency and disaster in which more than 200 schoolgirls were abducted from their school in Chibok? Is there any assistance from other nations of the world to help Nigeria out of the grips of this cruel dilemma?

Keywords: Boko Haram, disaster, hazards, vulnerability, insurgents

Procedia PDF Downloads 381
4723 A Comparative Study of Milton’s Paradise Lost and the Quran in Islam

Authors: Najmeh Dehghanitafti

Abstract:

Paradise Lost, John Milton's epic poem of theology and cosmology, gained substantial critical attention in the twentieth century. Milton's illustration of Satan and Eve and his allusions to the Bible can be an interesting source of criticism for the scholars who try to analyze Milton's works in terms of religious studies. Therefore, various studies of Paradise Lost try to investigate this epic in terms of religions beyond Christianity. Paradise Lost's comparison with religious books such as the Qur’an in Islam in terms of character illustration created multiple translations of this epic into Arabic. Accordingly, this paper aims to compare Miltonic Satan versus Quranic Iblis based on Inani’s translation of Paradise Lost into Arabic. This study also tries to investigate Miltonic and Quranic view of Eve to find out the similarities and differences between Christianity and Islam in terms of feminism.

Keywords: Eve, feminism, Iblis, Paradise Lost, Satan, The Quran

Procedia PDF Downloads 258
4722 The Effect of Deficit Financing on Macro-Economic Variables in Nigeria (1970-2013)

Authors: Ezeoke Callistus Obiora, Ezeoke Nneka Angela

Abstract:

The study investigated the effect of deficit financing on macroeconomic variables in Nigeria. The specific objectives included to find out the relationship between deficit financing and GDP, interest rate, inflation rate, money supply, exchange rate and private investment respectively on a time series covering a period of 44 years (1970 – 2013). The Ordinary Least Square multiple regression produced statistics for the coefficient of determination (R2), F-test, t-test used for the interpretation of the study. The findings revealed that Deficit financing has significant positive effect on GDP and exchange rate. Again, deficit financing has a positive and insignificant relationship inflation, money supply and investment. Only interest rate recorded negative yet insignificant relationship with deficit financing. The implications of the findings are that deficit financing can be a veritable tool for boosting economic development in Nigeria, but the influential positively rising exchange rate implies that deficit financing devalues the Naira exchange rate to other currencies indicating that deficit financing can affect Nigerians competitive advantage at the world market. Thus, the study concludes that deficit financing has not encouraged economic growth in Nigeria.

Keywords: deficit financing, money supply, exchange rate, inflation, GDP, investment, Nigeria

Procedia PDF Downloads 478
4721 The Analysis of Deceptive and Truthful Speech: A Computational Linguistic Based Method

Authors: Seham El Kareh, Miramar Etman

Abstract:

Recently, detecting liars and extracting features which distinguish them from truth-tellers have been the focus of a wide range of disciplines. To the author’s best knowledge, most of the work has been done on facial expressions and body gestures but only few works have been done on the language used by both liars and truth-tellers. This paper sheds light on four axes. The first axis copes with building an audio corpus for deceptive and truthful speech for Egyptian Arabic speakers. The second axis focuses on examining the human perception of lies and proving our need for computational linguistic-based methods to extract features which characterize truthful and deceptive speech. The third axis is concerned with building a linguistic analysis program that could extract from the corpus the inter- and intra-linguistic cues for deceptive and truthful speech. The program built here is based on selected categories from the Linguistic Inquiry and Word Count program. Our results demonstrated that Egyptian Arabic speakers on one hand preferred to use first-person pronouns and present tense compared to the past tense when lying and their lies lacked of second-person pronouns, and on the other hand, when telling the truth, they preferred to use the verbs related to motion and the nouns related to time. The results also showed that there is a need for bigger data to prove the significance of words related to emotions and numbers.

Keywords: Egyptian Arabic corpus, computational analysis, deceptive features, forensic linguistics, human perception, truthful features

Procedia PDF Downloads 206
4720 Arms and Light Weapons Flow in Nigerian/Chad Border: A Reflection on the How Insurgents Had Access to Their Target

Authors: Lawan Ja’afar Tahir

Abstract:

This research work centered on the problem of free Arms flow around the Nigeria and Chad Border. The whole of the northeastern Nigerian region has been devastated by the crisis of insecurity facilitated by more than a decade of insurgency. One of the major issues of concern to security experts and personnel in the country is how the insurgents are getting access to weapons, which gave them more strength to fight the war for this long period, which has become so difficult to overcome. Among the possible avenues that continue to strengthen the enemies is the easy access to the arms flow from the neighboring countries, especially the Republic of Chad, which borders Nigeria to the east, where Boko Haram gained firm roots. This paper, therefore, looked at the nature of the waterway of the Nigeria/Chad Border, which has become a source of strength to the insurgents as the flow of weapons is one of the cheapest things on the Border. The availability of such arms flow has also led to the People abandoning their lands and economic and commercial activities, especially those settlements between the Border of these two countries. For more than eight years now, they have suspended their livelihood activities, roads were blocked and chances of survival in the rural areas were minimal due to the frequent attacks carried out by the insurgents. However, this research looks at the causes of the arms flow along the Border of these neighboring countries, the extent of damage done as a result of the availability of the weapons, and how far the Nigerian government has gone in curtailing the menace of the flow of dangerous weapons into the country. The research looked at the ways arm dealers are conniving with settlers along the border as well as the various ways they followed to reach their target. The work provided suggestion as to how the fragile Border should be managed with the view to reduce the influx of arms without control, which, according to this research, is the central factor that continues to unleash and give terror groups the opportunity to destroy people for more than a decade.

Keywords: border, insecurity, weapons, management

Procedia PDF Downloads 68
4719 Enhancing Food Security through Cabbage Production by Local Fammers in Nkokobe Municipality

Authors: Sipumle Qapeshu, Bongiwe Mcata, Ajuruchukwu Obi

Abstract:

Subsistence farmers practice farming for survival while commercial farmers produce to feed themselves and larger society with the motive to achieve highest profit. These types of farmers are characterised by growing what they eat, live without making regular purchases in the markets. The main objective of subsistence/peasant farmers is to ensure food security at household level. Cabbage is a crop that has been identified to have vital food nutrient sources like Vitamin A, B and C, protein, calcium, iron and antioxidative compounds beneficial for preventing cancer. This paper, therefore, looks at the potential that cabbage production has in enhancing household food security and also the challenges encountered by these cabbage producers. Primary data was obtained from 50 respondents, and linear regression model was used to analyse the data used. Income was used as food security measure. The results showed that three variables were statistically significant and they are gender (10%), education (5%) and household size (5%). Meaning that these are variables that influenced cabbage production by these households, and it also affects their food security status since income is affected.

Keywords: subsistence farmers, food security, cabbage, farming

Procedia PDF Downloads 300
4718 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 78
4717 Nexus Between Library and Information Science Education Training and Practice in Nigeria: A Critical Assessment of the Synergy

Authors: Adebayo Emmanuel Layi

Abstract:

Library and Information Science Education is about six (6) decades old in Nigeria. The first Library School was established in 1962 at the University of Ibadan, and since then, several institutions have been running the programme under various certifications, providing the manpower needs of professionals for libraries. As at June 2023, Nigeria has close to a thousand (1000) tertiary institutions and all needing the services of librarians. Apart from the tertiary institutions, several libraries exit in various establishments, both government, private and non-governmental organisations. These has underscored the enormous need for trained librarians for the libraries in these places. The Nexus between LIS Education training and Practice is like a puzzle of egg and chick, which one came first and against this background, this paper examined the roles of the colonial masters in educational development in Africa and vis-à-vis the influence of great library educators such as Melvil Dewey and other educators and the journey through Nigeria institutions. Despite the sound footing of LIS Education, Noise which seems to be a major obstacle on the practice as well as mending the broken link were all examined in the paper. Strategies and the way forward for overall development are suggested.

Keywords: nexus, education, training, synergy

Procedia PDF Downloads 93
4716 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 562
4715 Exploring Students’ Satisfaction Levels with Online Facilitation Provided by National Open University of Nigeria’s Facilitators

Authors: Louis Okon Akpan

Abstract:

National Open University of Nigeria (NOUN) is an open and distance learning institution whose aim is to provide education for all and also promote lifelong learning in Nigeria. Before now, student-centred learning was adopted. In recent times, online facilitation has been introduced. Therefore, the study explores ways in which students are satisfied with online facilitation provided by NOUN lecturers. A qualitative approach was adopted. The interpretive paradigm was employed as a lens to interpret narratives from the participants. In order to gather information for the study, a semi-structured interview was developed for sixteen participants who were purposively selected from eight facilities of the university. After data gathering from the field, it was subjected to transcription and coding. The emergence of themes from the coded data was analysed using thematic analysis. Findings indicated that students found online learning, recently introduced by the university management, extremely fulfilling and rewarding.

Keywords: online facilitation, lecturer, students’ satisfaction, National Open University of Nigeria

Procedia PDF Downloads 83
4714 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia

Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana

Abstract:

Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.

Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom

Procedia PDF Downloads 453
4713 Nuclear Materials and Nuclear Security in India: A Brief Overview

Authors: Debalina Ghoshal

Abstract:

Nuclear security is the ‘prevention and detection of, and response to unauthorised removal, sabotage, unauthorised access, illegal transfer or other malicious acts involving nuclear or radiological material or their associated facilities.’ Ever since the end of Cold War, nuclear materials security has remained a concern for global security. However, with the increase in terrorist attacks not just in India especially, security of nuclear materials remains a priority. Therefore, India has made continued efforts to tighten its security on nuclear materials to prevent nuclear theft and radiological terrorism. Nuclear security is different from nuclear safety. Physical security is also a serious concern and India had been careful of the physical security of its nuclear materials. This is more so important since India is expanding its nuclear power capability to generate electricity for economic development. As India targets 60,000 MW of electricity production by 2030, it has a range of reactors to help it achieve its goal. These include indigenous Pressurised Heavy Water Reactors, now standardized at 700 MW per reactor Light Water Reactors, and the indigenous Fast Breeder Reactors that can generate more fuel for the future and enable the country to utilise its abundant thorium resource. Nuclear materials security can be enhanced through two important ways. One is through proliferation resistant technologies and diplomatic efforts to take non proliferation initiatives. The other is by developing technical means to prevent any leakage in nuclear materials in the hands of asymmetric organisations. New Delhi has already implemented IAEA Safeguards on their civilian nuclear installations. Moreover, the IAEA Additional Protocol has also been ratified by India in order to enhance its transparency of nuclear material and strengthen nuclear security. India is a party to the IAEA Conventions on Nuclear Safety and Security, and in particular the 1980 Convention on the Physical Protection of Nuclear Material and its amendment in 2005, Code of Conduct in Safety and Security of Radioactive Sources, 2006 which enables the country to provide for the highest international standards on nuclear and radiological safety and security. India's nuclear security approach is driven by five key components: Governance, Nuclear Security Practice and Culture, Institutions, Technology and International Cooperation. However, there is still scope for further improvements to strengthen nuclear materials and nuclear security. The NTI Report, ‘India’s improvement reflects its first contribution to the IAEA Nuclear Security Fund etc. in the future, India’s nuclear materials security conditions could be further improved by strengthening its laws and regulations for security and control of materials, particularly for control and accounting of materials, mitigating the insider threat, and for the physical security of materials during transport. India’s nuclear materials security conditions also remain adversely affected due to its continued increase in its quantities of nuclear material, and high levels of corruption among public officials.’ This paper would study briefly the progress made by India in nuclear and nuclear material security and the step ahead for India to further strengthen this.

Keywords: India, nuclear security, nuclear materials, non proliferation

Procedia PDF Downloads 352
4712 Foreign Artificial Intelligence Investments and National Security Exceptions in International Investment Law

Authors: Ying Zhu

Abstract:

Recent years have witnessed a boom of foreign investments in the field of artificial intelligence (AI). Foreign investments provide critical capital for AI development but also trigger national security concerns of host states. A notable example is an increasing number of cases in which the Committee on Foreign Investment in the United States (CFIUS) has denied Chinese acquisitions of US technology companies on national security grounds. On July 19, 2018, the Congress has reached a deal on the final draft of a new provision to strengthen CFIUS’s authority to review overseas transactions involving sensitive US technology. The question is: how to reconcile the emerging tension between, on the one hand, foreign AI investors’ expectations of a predictable investment environment, and on the other hand, host states’ regulatory power on national security? This paper provides a methodology to reconcile this tension under international investment law. Based on an examination, the national security exception clauses in international investment treaties and the application of national security justification in investor-state arbitration jurisprudence, the paper argues that a traditional interpretation of the national security exception, based on the necessity concept in customary international law, fails to take into account new risks faced by countries, including security concerns over strategic industries such as AI. To overcome this shortage, the paper proposes to incorporate an integrated national security clause in international investment treaties, which includes a two-tier test: a ‘self-judging’ test in the pre-establishment period and a ‘proportionality’ test in the post-establishment period. At the end, the paper drafts a model national security clause for future treaty-drafting practice.

Keywords: foreign investment, artificial intelligence, international investment law, national security exception

Procedia PDF Downloads 152
4711 Perception, Awareness and Attitude of Muslim Academicians on Islamic Banking Products in Kano State of Nigeria

Authors: Muhammad Abdullahi Mago

Abstract:

Islamic Banking began in Nigeria last three years and the sector has shown the sign of bright future for the sector and the Nigerian economy, within this very short time it is important to know the perception of the customers particularly learned or educated individuals for immediate evaluation and adjustment. This study investigates into the perception, awareness and attitudes of the academicians in the most populous state/place in Nigeria with more than 90% muslims, and the results has shown a relatively low levels results in all the variables of the study.The study recommends aggressive marketing strategy for the Banks operating within the sector.

Keywords: Islamic Banking Products, Islamic Financial Products, academicians, Islamic finance industry, perception, awareness and attitude

Procedia PDF Downloads 441
4710 Evolution of Sustainable Municipal Solid Waste Management in Nigeria: Lagos Case Study

Authors: Chinedu Bevis Dibia, Hom Nath Dhakal

Abstract:

Effective waste management in sub-Saharan Africa has been identified as a means of resolving the wicked problems posed by climate change. Municipal solid waste management in Nigeria could be argued to be ineffective and unsustainable, despite the tag of sustainable ascribed to most municipalities’ waste management. Relatively, few studies have enquired on the evolution of Sustainable Municipal Waste Management (SMWM) in Nigeria. The main objective of this research is to examine the evolution of SMWM in Nigeria using Lagos state as a case study. A qualitative method was used as methodology, soft systems analysis is the main tool of evaluation. Results indicated that effective policy implementation and management is the main challenge to the proper evolution of SMWM. These findings highlight the relevance of effective stakeholder’s engagement and management, policy consistency as major determinants in SMWM.

Keywords: high income localities, low middle income localities, SMWM, upper middle income localities, waste collection, waste disposal

Procedia PDF Downloads 153