Search results for: public order and security act
19906 The Effects of Urban Public Spaces on Place Attachment in Large Cities: Examining Spatial Perception in Shenzhen’s Shekou Community as a Case Study
Authors: Xiaoxue Jin, Qiong Zhang
Abstract:
The rapid influx and ongoing flow of young migrants in large cities, alongside the emergence and evolution of new social media, have led to increased interpersonal alienation and weakened place attachment. In the interplay between individuals and space, urban public spaces play a pivotal role in meeting the multifaceted needs of individuals and fostering a sense of attachment. This article aims to investigate the relationship between the place characteristics of public spaces and individuals' needs and perceptions, with an aim to identify the factors influencing place attachment among the youth. This study is conducted in the Shekou community of Shenzhen, focusing on the youth residents to evaluate their place attachment levels and to analyze their perceptions of the place characteristics of selected public spaces. The influencing factors of public spaces on place attachment were sorted out through detailed data analysis. Research has found that rapid urbanization has led to spatial homogenization and spatial segregation caused by uneven resource distribution, which in turn diminishes the utilization of public spaces. The social characteristics of public spaces, such as the quality of social activities and spatial openness, are critical in forming place attachment. In this research, place characteristics impacting place attachment are categorized, aiming to reconstruct the characteristics of public space places and use them as a medium to explore the place attachment of young people, promote their independent creation and participation in public life, and enhance the dynamism between individuals and spaces.Keywords: place attachment, place characteristics, public spaces, spatial perception
Procedia PDF Downloads 5019905 Wage Differentials in Pakistan by Focusing on Wage Differentials in Public and Private Sectors, Formal and Informal Sectors, and Major Occupational Groups
Authors: Asghar Ali, Narjis Khatoon
Abstract:
This study focuses on the presence of wage differentials in Pakistan and also on the determinants that originate it. Since there are a smaller number of studies that are conducted on this topic in Pakistan, the current study aims to contribute in bridging the existing gap in this particular research genre. Hence, this study not only generates the desired results specific focus but it also contributes to the overall empirical work on the Pakistan economy. The preceding works which have been done to research wage determinants and wage differentials have used numerous different theories and approaches to reach their goals. The current study, in order to analyze the determinants of wage differentials in the developing economy, deals with the study of a number of such theories and approaches that are supposed as being beneficial for the purpose. This study undertakes the explanation of wage differentials in Pakistan by focusing on wage differentials in public and private sectors, formal and informal sectors, and major occupational groups. The study uses 'Wage Theory' to examine wage differentials among male and female employees in public and private sectors on varied levels of working conditions. This study also uses 'Segmented Labor Market Theory' to determine the wage differential in both public and private sectors, formal and informal, and major occupational groups in Pakistan. So the author has used various econometric techniques in order to explain and test these theories and to find out the required results. This study has employed seven different cross-sectional Labour Force Surveys for the time period between 2006-07 to 2012-13. Gender equality is not only a policy reform agenda for developing countries but also an important goal of Millennium Development Goals. This study investigates the nexus between wage inequality and economic growth and detects co-integration between gender wage differential and economic growth using ARDL bound test. It is confirmed from the empirical results that there exists long-run relationship between economic growth and wage differential. Our study indicated that half of the total female employees from fourteen major cities of Pakistan were employed in the public sector. Out of total female employees in private sector, 66 percent are employed in the formal sector, and 33 percent are working in the informal sector. Results also indicated that both men and women were paid more in the public sector compared to the private sector counterparts. Among the total female employees, only 9 percent had received any formal training, 52% were married and average years of schooling were 11 years. Further, our findings regarding wage differential between genders indicate that wage gap is lower in public sector as compared to private sector. In proportion, gender wage ratio was found to be 0.96, 0.62 and 0.66 in public, formal private and informal private sectors respectively. This suggests that in this case, private sector female employees with the same pay structure are compensated at a lower endowments rate as then public sector workers as compared to their counter parts.Keywords: wage differentials, formal, informal, economic growth
Procedia PDF Downloads 19919904 Prospect and Challenges of Public Bicycle Sharing System in Indian Cities
Authors: Anil Kumar
Abstract:
Public Bicycle System (PBS), generally known as Public Bicycle Share System or Bike-Share, is a service provided to the everyday commuters in which several cycles are available on the shared system. The concept of PBS is new to the people of India and requires more study in the fields of essential requirements, major infrastructural requirements, social acceptability, and various challenges. In various Indian cities, MRTS, BRTS, Monorail, and other modes of transport have been adopted for the main haul of transport. These modes take more time, space and are also expensive to implement. At the same time, the PBS system is more economical and takes less time to implement. The main benefit of the PBS system is that it is more environmentally friendly. PBS is being implemented in many Indian cities for public use, but various challenges are associated with this. The study aims to determine what are the basic infrastructural requirements for PBS in India, as well as to determine to what extent a Public Bike Sharing System can provide a quality and efficient service to passengers as a primary method of transportation.Keywords: public bicycle sharing system, sustainable transport, infrastructure, smart city
Procedia PDF Downloads 19319903 The Impact of Quality Management System Establishment over the Performance of Public Administration Services in Kosovo
Authors: Ilir Rexhepi, Naim Ismajli
Abstract:
Quality and quality management are key factors of success nowadays. Public sector and quality management in this sector contains many challenges and difficulties, most notably in a new country like Kosovo. This study analyses the process of implementation of quality management system in public administration institutions in this country. The main objective is to show how to set up a quality management system and how does the quality management system setup affect the overall public administration services in Kosovo. This study shows how the efficiency and effectiveness of public institution services/performance is rapidly improving through the establishment and functionalization of Quality Management System. The specific impact of established QMC within the organization has resulted with the identification of mission related processes within the entire system including input identification, the person in charge and the way of conversion to the output of each activity though the interference with other service processes within the system. By giving detailed analyses of all steps of implementation of the Quality Management System, its effect and consequences towards the overall public institution service performance, we try to go one step further, by showing it as a very good example or tool of other public institutions for improving their service performance. Interviews with employees, middle and high level managers including the quality manager and general secretaries are also part of analyses in this paper.Keywords: quality, quality management system, efficiency, public administration institutions
Procedia PDF Downloads 28419902 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 36019901 The Sectoral Differences in the Use of Construction Incentive
Authors: Qiuwen Ma, Sai On Cheung
Abstract:
Incentive contracting has been developed to push the agent team for extra effort. Generally, there are three types of incentive arrangement, namely incentive/penalty for super performance/underperformance, risk/reward sharing and future business opportunities. It is found that there are significant differences in the use of incentive arrangement in private and public projects. In Hong Kong, very few public projects have used future business as incentivizer whereas private developers often signal repeated business coupled with heavy penalty. This study was conducted to identify various attributes affecting the use of I/D in both private and public engineering sectors of Hong Kong. The diverging preferences were unveiled with reference to a literature review and semi-structured interviews with industry experts. The findings reveal the public/private sectors would consider the implementation issues regarding the various performance targets. The most deterministic factor for the public sector is about accountability. The private sector is in general skeptical about the need to provide extra for the contractors for what they have already contracted to perform.Keywords: construction incentive, public/private projects, semi-structured interview, hong kong
Procedia PDF Downloads 10419900 Analysis of Security Vulnerabilities for Mobile Health Applications
Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López
Abstract:
The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors
Procedia PDF Downloads 51919899 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)
Authors: Tewelde Gebresslase Haile, S. P. Singh
Abstract:
To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.Keywords: social protection, livelihood assets, social vulnerability, public policy SVI
Procedia PDF Downloads 9019898 Relative Influence of Self-Regulation, Emotional Intelligence, Self-Efficacy, and Goal Orientation on School Engagement among Public Secondary School Students in Ibadan, Nigeria
Authors: Ogunremi Beatrice, Oluwole David Adebayo
Abstract:
Public secondary school students are face with some challenges from the parents, government and teachers in school. Some of the challenges that arises from the parents are lack of attention and adequate communication. From the government are unavailability of useful instructional materials, competent and professionally trained teachers for each subject the students do in school. The challenges that arise from the teachers most often are mismanagement of time, inability to understand the capacity of the student and lack class management and follow up. This study investigated self-regulation, emotional intelligence, self-efficacy and goal orientation as predictors of school engagement among public secondary school students in Ibadan. A structured questionnaire was administered on 258 students from six mixed secondary schools in Ibadan. Pearson Product Moment Correlation method was used for data analysis. Four hypothesis were raised and answered, the results showed there is positive and significant relationships between school engagement among public secondary school students and each of the independent variable: Self-regulation, Emotional intelligence, Self-efficacy, Goal orientation. On the basis of these findings, it was recommended that the parents have to encourage their children on how to be goal oriented ,build their self-efficacy skill, to be self-regulated and emotionally intelligent in order to be effective in school and be able to increase their intellectual ability.Keywords: emotional intelligence, self-efficacy, goal orientation, school engagement, self-regulation
Procedia PDF Downloads 48719897 Effect of the Interference of Political Elected Members on the Performance of Public Schools
Authors: Farhat Ullah
Abstract:
It is very unfortunate that in Pakistani public schools political interference is on its peak. The present study tries to find out the effect of the interference of political elected members in the affairs of public schools. The objectives of the study were to find out, the degree of interference of political members in public school, the positive and negative effects of political members, influence in public schools, students, and its administrators. This study was quantitative in nature. All the public schools in Khyber Pakhtunkhwa were the population of this study. A sample of 400 teachers and 100 schools heads were selected for this study. A survey questionnaire consisted of 50 items related to objectives, was used for this study. The questionnaire consisted of five options based on Likert scale. Data were collected by the researcher himself from the respondents. Data were analyzed using chi square test. It was concluded from the analysis of data that recently the political members are involved in the process of school activities, which had badly affected the freedom and autonomy of school administrators. Mostly teachers are transferred from schools on political influence, which had created uncertainty among the schools teachers. Further, the student’s academic performance was also affected badly. It is recommended that schools must be free from political involvement for the smooth running of schools.Keywords: public schools, politics, interference, performance
Procedia PDF Downloads 13619896 Towards a Secure Storage in Cloud Computing
Authors: Mohamed Elkholy, Ahmed Elfatatry
Abstract:
Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security
Procedia PDF Downloads 33519895 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security
Authors: Anders Troedsson
Abstract:
For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace
Procedia PDF Downloads 29819894 Standards of Toxicity and Food Security in Brazil
Authors: Ana Luiza Da Gama E Souza
Abstract:
This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.Keywords: standards, indicators, human rights, food security
Procedia PDF Downloads 33319893 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security
Authors: Rhisan Mae Enriquez-Morales
Abstract:
The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea
Procedia PDF Downloads 39519892 User Survey on Food and Drinks in Japanese Public Libraries
Authors: Marika Kawamoto, Keita Tsuji
Abstract:
Several decades ago, food and drinks were disallowed in most Japanese libraries. However, as discussions of “Library as a Place” have increased in recent years, the number of public and university libraries that have relaxed their policies to allow food and drinks have been increasing. This study focused on the opinions of library users on allowing food and drinks in public libraries and conducted a questionnaire survey among users of nine Japanese libraries. The results indicated that many users favored allowing food and drinks in libraries. Furthermore, it was found that users tend to frequently visit and stay longer in libraries where food and drinks are allowed.Keywords: food and drinks, Japanese libraries, opinions of users, public libraries
Procedia PDF Downloads 30819891 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems
Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy
Abstract:
The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.Keywords: smart grids, blockchain, fiber optic sensor, security
Procedia PDF Downloads 12119890 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 34719889 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults
Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer
Abstract:
Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security
Procedia PDF Downloads 12919888 Main Chaos-Based Image Encryption Algorithm
Authors: Ibtissem Talbi
Abstract:
During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich
Procedia PDF Downloads 68419887 An Empirical Investigation of Factors Influencing Construction Project Selection Processes within the Nigeria Public Sector
Authors: Emmanuel U. Unuafe, Oyegoke T. Bukoye, Sandhya Sastry, Yanqing Duan
Abstract:
Globally, there is increasing interest in project management due to a shortage in infrastructure services supply capability. Hence, it is of utmost importance that organisations understand that choosing a particular project over another is an opportunity cost – tying up the organisations resources. In order to devise constructive ways to bring direction, structure, and oversight to the process of project selection has led to the development of tools and techniques by researchers and practitioners. However, despite the development of various frameworks to assist in the appraisal and selection of government projects, failures are still being recorded with government projects. In developing countries, where frameworks are rarely used, the problems are compounded. To improve the situation, this study will investigate the current practice of construction project selection processes within the Nigeria public sector in order to inform theories of decision making from the perspective of developing nations and project management practice. Unlike other research around construction projects in Nigeria this research concentrate on factors influencing the selection process within the Nigeria public sector, which has received limited study. The authors report the findings of semi-structured interviews of top management in the Nigerian public sector and draw conclusions in terms of decision making extant theory and current practice. Preliminary results from the data analysis show that groups make project selection decisions and this forces sub-optimal decisions due to pressure on time, clashes of interest, lack of standardised framework for selecting projects, lack of accountability and poor leadership. Consequently, because decision maker is usually drawn from different fields, religious beliefs, ethnic group and with different languages. The choice of a project by an individual will be greatly influence by experience, political precedence than by realistic investigation as well as his understanding of the desired outcome of the project, in other words, the individual’s ideology and their level of fairness.Keywords: factors influencing project selection, public sector construction project selection, projects portfolio selection, strategic decision-making
Procedia PDF Downloads 33119886 The Impact of the Fitness Center Ownership Structure on the Service Quality Perception in the Fitness in Serbia
Authors: Dragan Zivotic, Mirjana Ilic, Aleksandra Perovic, Predrag Gavrilovic
Abstract:
As with the provision of other services, the service quality perception is one of the key factors that the modern manager must pay attention to. Countries in which the state regulation is in transition also have specific features in providing fitness services. Identification of the dimensions in which the most significant different service quality perception between different types of fitness centers, enables managers to profile the offer according to the wishes and expectations of users. The aim of the paper was the comparison of the quality of services perception in the field of fitness in Serbia between three categories of fitness centers: the privately owned centers, the publicly owned centers, and the Public-private partnership centers. For this research 350 respondents of both genders (174 men and 176 women) were interviewed, aged between 18 and 68 years, being beneficiaries of fitness services for at least 1 year. Administered questionnaire with 100 items provided information about the 15 basic areas in which they expressed the service quality perception in the gym. The core sample was composed of 212 service users in private fitness centers, 69 service users in public fitness centers and 69 service users in the public-private partnership. Sub-samples were equal in representation of women and men, as well as by age and length of use of fitness services. The obtained results were subject of univariate analysis with the Kruskal-Wallis non-parametric analysis of variance. Significant differences between the analyzed sub-samples were not found solely in the areas of rapid response and quality outcomes. In the multivariate model, the results were processed by backward stepwise discriminant analysis that extracted 3 areas that maximize the differences between sub-samples: material and technical basis, secondary facilities and coaches. By applying the classification function 93.87% of private centers services users, 62.32% of public centers services users and 85.51% of the public-private partnership centers users of services were correctly classified (total 86.00%). These results allow optimizing the allocation of the necessary resources in profiling offers of a fitness center in order to optimally adjust it to the user’s needs and expectations.Keywords: fitness, quality perception, management, public ownership, private ownership, public-private partnership, discriminative analysis
Procedia PDF Downloads 29419885 Information in Public Domain: How Far It Measures Government's Accountability
Authors: Sandip Mitra
Abstract:
Studies on Governance and Accountability has often stressed the need to release Data in public domain to increase transparency ,which otherwise act as an evidence of performance. However, inefficient handling, lack of capacity and the dynamics of transfers (especially fund transfers) are important issues which need appropriate attention. E-Governance alone can not serve as a measure of transparency as long as a comprehensive planning is instituted. Studies on Governance and public exposure has often triggered public opinion in favour or against any government. The root of the problem (especially in local governments) lies in the management of the governance. The participation of the people in the local government functioning, the networks within and outside the locality, synergy with various layers of Government are crucial in understanding the activities of any government. Unfortunately, data on such issues are not released in the public domain .If they are at all released , the extraction of information is often hindered for complicated designs. A Study has been undertaken with a few local Governments in India. The data has been analysed to substantiate the views.Keywords: accountability, e-governance, transparency, local government
Procedia PDF Downloads 43719884 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy
Authors: Babatunde Osabiya
Abstract:
Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.Keywords: security risk, legal framework, cyber security and policy, national security
Procedia PDF Downloads 9419883 Virtual Schooling as a Collaboration between Public Schools and the Scientific Community
Authors: Thomas A. Fuller
Abstract:
Over the past fifteen years, virtual schooling has been introduced and implemented in varying degrees throughout the public education system in the United States. It is possible in some states for students to voluntarily take all of their course load online, without ever having to step in a classroom. Experts foresee a dramatic rise in the number of courses taken online by public school students in the United States, with some predicting that by 2019 as many as 50% of public high school courses will be delivered online. This electronic delivery of public education offers tremendous potential to the scientific community because it calls for innovation and is funded by public school revenue. Public accountability provides a ready supply of statistical data for measuring the progress of virtual schools as they are implemented into the public school arena. This allows for a survey of the current use of virtual schooling through examination of past statistical data, as well as forecasting forward for future years based upon this past data. Virtual schooling is on the rise in the United States, but its growth has been tempered by practical problems of implementation. The greatest and best use of virtual schooling thus far has been to supplement the courses offered by public schools (e.g., offering unique language courses, elective courses, and games-based math and science courses). The weaknesses of virtual schooling lay in the problematic accountability in allowing students to take courses online at home and the lack of supportive infrastructure in the public school arena. Virtual schooling holds great promise for the public school education system in the United States, as well as the scientific community. Online courses allow students access to a much greater catalog of courses than is offered through classroom instruction in their local public school. This promising sector needs assistance from the scientific community in implementing new pedagogical methodologies.Keywords: virtual schools, online classroom, electronic delivery, technological innovation
Procedia PDF Downloads 38419882 The International Constitutional Order and Elements of Human Rights
Authors: Girma Y. Iyassu Menelik
Abstract:
“The world is now like a global village!” so goes the saying that shows that due to development and technology the countries of the world are now closely linked. In the field of Human rights there is a close relationship in the way that rights are recognised and enforced. This paper will show that human rights have evolved from ancient times through important landmarks such as the Magna Carta, the French Declaration of Rights of Man and of the Citizen and the American Bill of Rights. The formation of the United Nations after the Second World War resulted in the need to codify and protect human rights. There are some rights which are so fundamental that they are found in international and continental instruments, national constitutions and domestic legislation. In the civil and political sphere they include the right to vote, to freedom of association, speech and assembly, right to life, privacy and fair trial. In the economic and social sphere you have the right to work, protection of the family, social security and rights to education, health and shelter. In some instance some rights can be suspended in times of public emergency but such derogations shall be circumscribed by the law and in most constitutions such limitations are subject to judicial review. However, some rights are so crucial that they cannot be derogated from under any circumstances and these include the right to life, recognition before the law, freedom from torture and slavery and of thought, conscience and religion. International jurisprudence has been developed to protect fundamental rights and avoid discrimination on the grounds of race, colour, sex, language or social origin. The elaborate protection system go to show that these rights have become part of the international order and they have universal application. We have now got to a stage where UDHR, ICCPR and ICESCR and have come to be regarded as part of an international bill of rights with horizontal and vertical enforcement mechanisms involving state parties, NGO’s , international bodies and other organs.Keywords: rights, international, constitutional, state, judiciary
Procedia PDF Downloads 45319881 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)
Authors: Yousef Farhaoui
Abstract:
An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).Keywords: intrusion detection, architectures, characteristic, tools, security
Procedia PDF Downloads 46219880 The Public Law Studies: Relationship Between Accountability, Environmental Education and Smart Cities
Authors: Aline Alves Bandeira, Luís Pedro Lima, Maria Cecília de Paula Silva, Paulo Henrique de Viveiros Tavares
Abstract:
Nowadays, the study of public policies regarding management efficiency is essential. Public policies are about what governments do or do not do, being an area that has grown worldwide, contributing through the knowledge of technologies and methodologies that monitor and evaluate the performance of public administrators. The information published on official government websites needs to provide for transparency and responsiveness of managers. Thus, transparency is a primordial factor for the execution of Accountability, providing, in this way, services to the citizen with the expansion of transparent, efficient, democratic information and that value administrative eco-efficiency. The ecologically balanced management of a Smart City must optimize environmental education, building a fairer society, which brings about equality in the use of quality environmental resources. Smart Cities add value in the construction of public management, enabling interaction between people, enhancing environmental education and the practical applicability of administrative eco-efficiency, fostering economic development and improving the quality of life.Keywords: accountability, environmental education, new public administration, smart cities
Procedia PDF Downloads 12919879 A Model of Human Security: A Comparison of Vulnerabilities and Timespace
Authors: Anders Troedsson
Abstract:
For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.Keywords: human security, timespace, vulnerabilities, risk perception
Procedia PDF Downloads 33919878 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count
Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney
Abstract:
Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python
Procedia PDF Downloads 14419877 Big Data Analytics and Public Policy: A Study in Rural India
Authors: Vasantha Gouri Prathapagiri
Abstract:
Innovations in ICT sector facilitate qualitative life style for citizens across the globe. Countries that facilitate usage of new techniques in ICT, i.e., big data analytics find it easier to fulfil the needs of their citizens. Big data is characterised by its volume, variety, and speed. Analytics involves its processing in a cost effective way in order to draw conclusion for their useful application. Big data also involves into the field of machine learning, artificial intelligence all leading to accuracy in data presentation useful for public policy making. Hence using data analytics in public policy making is a proper way to march towards all round development of any country. The data driven insights can help the government to take important strategic decisions with regard to socio-economic development of her country. Developed nations like UK and USA are already far ahead on the path of digitization with the support of Big Data analytics. India is a huge country and is currently on the path of massive digitization being realised through Digital India Mission. Internet connection per household is on the rise every year. This transforms into a massive data set that has the potential to improvise the public services delivery system into an effective service mechanism for Indian citizens. In fact, when compared to developed nations, this capacity is being underutilized in India. This is particularly true for administrative system in rural areas. The present paper focuses on the need for big data analytics adaptation in Indian rural administration and its contribution towards development of the country on a faster pace. Results of the research focussed on the need for increasing awareness and serious capacity building of the government personnel working for rural development with regard to big data analytics and its utility for development of the country. Multiple public policies are framed and implemented for rural development yet the results are not as effective as they should be. Big data has a major role to play in this context as can assist in improving both policy making and implementation aiming at all round development of the country.Keywords: Digital India Mission, public service delivery system, public policy, Indian administration
Procedia PDF Downloads 160