Search results for: cyber security and policy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6310

Search results for: cyber security and policy

5620 Smart Sensor Data to Predict Machine Performance with IoT-Based Machine Learning and Artificial Intelligence

Authors: C. J. Rossouw, T. I. van Niekerk

Abstract:

The global manufacturing industry is utilizing the internet and cloud-based services to further explore the anatomy and optimize manufacturing processes in support of the movement into the Fourth Industrial Revolution (4IR). The 4IR from a third world and African perspective is hindered by the fact that many manufacturing systems that were developed in the third industrial revolution are not inherently equipped to utilize the internet and services of the 4IR, hindering the progression of third world manufacturing industries into the 4IR. This research focuses on the development of a non-invasive and cost-effective cyber-physical IoT system that will exploit a machine’s vibration to expose semantic characteristics in the manufacturing process and utilize these results through a real-time cloud-based machine condition monitoring system with the intention to optimize the system. A microcontroller-based IoT sensor was designed to acquire a machine’s mechanical vibration data, process it in real-time, and transmit it to a cloud-based platform via Wi-Fi and the internet. Time-frequency Fourier analysis was applied to the vibration data to form an image representation of the machine’s behaviour. This data was used to train a Convolutional Neural Network (CNN) to learn semantic characteristics in the machine’s behaviour and relate them to a state of operation. The same data was also used to train a Convolutional Autoencoder (CAE) to detect anomalies in the data. Real-time edge-based artificial intelligence was achieved by deploying the CNN and CAE on the sensor to analyse the vibration. A cloud platform was deployed to visualize the vibration data and the results of the CNN and CAE in real-time. The cyber-physical IoT system was deployed on a semi-automated metal granulation machine with a set of trained machine learning models. Using a single sensor, the system was able to accurately visualize three states of the machine’s operation in real-time. The system was also able to detect a variance in the material being granulated. The research demonstrates how non-IoT manufacturing systems can be equipped with edge-based artificial intelligence to establish a remote machine condition monitoring system.

Keywords: IoT, cyber-physical systems, artificial intelligence, manufacturing, vibration analytics, continuous machine condition monitoring

Procedia PDF Downloads 79
5619 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective

Authors: Obinna Emmanuel Nkomadu

Abstract:

A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.

Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea

Procedia PDF Downloads 138
5618 Potential Determinants of Research Output: Comparing Economics and Business

Authors: Osiris Jorge Parcero, Néstor Gandelman, Flavia Roldán, Josef Montag

Abstract:

This paper uses cross-country unbalanced panel data of up to 146 countries over the period 1996 to 2015 to be the first study to identify potential determinants of a country’s relative research output in Economics versus Business. More generally, it is also one of the first studies comparing Economics and Business. The results show that better policy-related data availability, higher income inequality, and lower ethnic fractionalization relatively favor economics. The findings are robust to two alternative fixed effects specifications, three alternative definitions of economics and business, two alternative measures of research output (publications and citations), and the inclusion of meaningful control variables. To the best of our knowledge, our paper is also the first to demonstrate the importance of policy-related data as drivers of economic research. Our regressions show that the availability of this type of data is the single most important factor associated with the prevalence of economics over business as a research domain. Thus, our work has policy implications, as the availability of policy-related data is partially under policy control. Moreover, it has implications for students, professionals, universities, university departments, and research-funding agencies that face choices between profiles oriented toward economics and those oriented toward business. Finally, the conclusions show potential lines for further research.

Keywords: research output, publication performance, bibliometrics, economics, business, policy-related data

Procedia PDF Downloads 122
5617 South Korean Discourse on Bioecomomy in the Sector of Agriculture

Authors: Mi Sun Park

Abstract:

Biotechnology provides us with technological solutions to resource-based challenges facing the global society. A bioeconomy or bio-based economy emerged as all economic activities derived from biotechnology. This paper aims to understand discourses on bioeconomy in the sector of agriculture with three dimensions; media discourse, science discourse, and policy discourse. For achieving research goals, content analysis was applied to this research. Media articles, academic journal articles and policy documents published from 2000 to 2016 were collected in South Korea. The text was coded and analyzed with the categories of speakers and their arguments. The research findings indicate that powerful actors and key messages of bioeconomy in South Korean agriculture. Differences and similarities among media, science, and policy were examined. Therefore this case study can contribute to understanding dynamic interaction and interfaces of media, science and policy discourse on biotechnology in the sector of agriculture.

Keywords: media, discourse, bioeconomy, agriculture

Procedia PDF Downloads 223
5616 On the Allopatry of National College Entrance Exam in China: The Root, Policy and Strategy

Authors: Shi Zhang

Abstract:

This paper aims to introduce the allopatry of national college entrance examination which allow migrant students enter senior high schools and take college entrance exam where they live, identifies the reasons affect the implementation of this policy in the Chinese context. Most of China’s provinces and municipalities recently have announced new policies regarding national college entrance exams for non-local students. The paper conducts SWOT analysis reveals the opportunities, strength, weakness and challenges of the scheme, so as to discuss the implementation strategies from the perspectives of idea and institution. The research findings imply that the government should take a more positive attitude toward relaxing the allopatry of NCEE policy restrictions, and promote the reform household registration policy and NCEE policy with synchronous operations. Higher education institutions should explore the diversification of enrollment model; the government should issue the authority of universities and colleges to select elite migrant students beyond the restrictions of NCEE. To suit reform policies to local conditions, the big cities such as Beijing, Shanghai and Guangzhou should publish related compensate measures for children of migrant workers access to higher vocational colleges with tuition fee waivered. 

Keywords: college entrance examination, higher education, education policy, education equality

Procedia PDF Downloads 365
5615 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez

Abstract:

This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.

Keywords: temporal graph network, anomaly detection, cyber security, IDS

Procedia PDF Downloads 90
5614 Self-Government Health Policy Programs as a Form of Implementation of Public Health Tasks in Poland

Authors: T. Holecki, J. Wozniak-Holecka, K. Sobczyk

Abstract:

Development, implementation, and evaluation of the effects of health policy programs, resulting from the identified health needs and health status of residents, is the own task of all local government units in Poland. This is due to the obligation to provide access to healthcare services to all residents and the implementation of tasks in the field of health promotion based on specific legal acts. Until the end of 2016 local governments financed health policy programs only with their own funds. Currently, there are additional resources available from the public health insurance subsidising up to 80% of health policy programs costs in cities with a population under 5 thousand people and up to 40% in bigger cities. Changes in legal provisions do not translate automatically to increased involvement of local government units in the implementation of public health tasks. The main objective of the study was to assess the actual impact of the new legal regulation on financing local health policy programs on the engagement of local administration in this area of public health activity. To achieve this aim, we analyzed difference in the number of local governments developing and implementing health policy programs before and after the new law came into force. The aim of the study was also to estimate the level of expenditures incurred by self-government units and the National Health Fund to cover the costs of health policy programs. In the first stage of the project, legal acts concerning the subject of research and financial data published by the National Health Fund were analyzed. The material for the second, main stage of the study was the detailed financial data obtained from the National Health Fund and data obtained from local government units. The results present the situation in Poland in territorial terms, divided into 16 voivodships.

Keywords: health care system, health policy programs, local self-governments, public health

Procedia PDF Downloads 143
5613 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 106
5612 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics

Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood

Abstract:

We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.

Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka

Procedia PDF Downloads 380
5611 Trade and Environmental Policy Strategies

Authors: Olakunle Felix Adekunle

Abstract:

In the recent years several non-tariff provisions have been regarded as means holding back transboundary environmental damages. Affected countries have then increasingly come up with trade policies to compensate for or to In recent years, several non‐tariff trade provisions have been regarded as means of holding back transboundary environmental damages. Affected countries have then increasingly come up with trade policies to compensate for or to enforce the adoption of environmental policies elsewhere. These non‐tariff trade constraints are claimed to threaten the freedom of trading across nations, as well as the harmonization sought towards the distribution of income and policy measures. Therefore the ‘greening’ of world trade issues essentially ranges over whether there ought or ought not to be a trade‐off between trade and environmental policies. The impacts of free trade and environmental policies on major economic variables (such as trade flows, balances of trade, resource allocation, output, consumption and welfare) are thus studied here, and so is the EKC hypothesis, when such variables are played against the resulting emission levels. The policy response is seen as a political game, played here by two representative parties named North and South. Whether their policy choices, simulated by four scenarios, are right or wrong depends on their policy goals, split into economic and environmental ones.

Keywords: environmental, policies, strategies, constraint

Procedia PDF Downloads 317
5610 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 465
5609 Ranking Priorities for Digital Health in Portugal: Aligning Health Managers’ Perceptions with Official Policy Perspectives

Authors: Pedro G. Rodrigues, Maria J. Bárrios, Sara A. Ambrósio

Abstract:

The digitalisation of health is a profoundly transformative economic, political, and social process. As is often the case, such processes need to be carefully managed if misunderstandings, policy misalignments, or outright conflicts between the government and a wide gamut of stakeholders with competing interests are to be avoided. Thus, ensuring open lines of communication where all parties know what each other’s concerns are is key to good governance, as well as efficient and effective policymaking. This project aims to make a small but still significant contribution in this regard in that we seek to determine the extent to which health managers’ perceptions of what is a priority for digital health in Portugal are aligned with official policy perspectives. By applying state-of-the-art artificial intelligence technology first to the indexed literature on digital health and then to a set of official policy documents on the same topic, followed by a survey directed at health managers working in public and private hospitals in Portugal, we obtain two priority rankings that, when compared, will allow us to produce a synthesis and toolkit on digital health policy in Portugal, with a view to identifying areas of policy convergence and divergence. This project is also particularly peculiar in the sense that sophisticated digital methods related to text analytics are employed to study good governance aspects of digitalisation applied to health care.

Keywords: digital health, health informatics, text analytics, governance, natural language understanding

Procedia PDF Downloads 51
5608 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 160
5607 Peculiar Implications of Self Perceived Identity as Policy Tool for Transgender Recognition in Pakistan

Authors: Hamza Iftikhar

Abstract:

The research study focuses on the transgender community's gender recognition challenges. It is one of the issues for the transgender community, interacting directly with the difficulties of gender identity and the lives of these people who are facing gender disapproval from society. This study investigates the major flaws of the transgender act. The study's goal is to look into the strange implications of self-perceived identity as a policy tool for transgender recognition. This policy tool jeopardises the rights of Pakistan's indigenous gender-variant people as well as the country's legal and social framework. Qualitative research using semi structured interviews will be carried out. This study proposes developing a scheme for mainstreaming gender-variant people on the basis of the Pakistani Constitution, Supreme Court guidelines, and internationally recognised principles of law. This would necessitate a thorough review of current law using a new approach and reference point.

Keywords: transgender act, self perceived identity, gender variant, policy tool

Procedia PDF Downloads 107
5606 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s

Authors: Zunjarrao Kadam, Vikas Minchekar

Abstract:

The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.

Keywords: experimentally induced stress, facial recognition, cognition, security personnel

Procedia PDF Downloads 245
5605 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry

Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim

Abstract:

Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.

Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain

Procedia PDF Downloads 80
5604 Consequences of Transformation of Modern Monetary Policy during the Global Financial Crisis

Authors: Aleksandra Szunke

Abstract:

Monetary policy is an important pillar of the economy, directly affecting on the condition of banking sector. Depending on the strategy may both support functioning of banking institutions, as well as limit their excessively risky activities. The literature studies indicate a large number of publications, which include characteristics of initiatives, implemented by central banks during the global financial crisis and the potential effects of the use of non-standard monetary policy instruments. However, the empirical evidence about their effects and real consequences for the financial markets are still not final. Even before the escalation of instability, Bernanke, Reinhart, and Sack (2004) analyzed the effectiveness of various unconventional monetary tools in lowering long-term interest rates in the United States and Japan. The obtained results largely confirmed the effectiveness of the zero-interest-rate policy and Quantitative Easing (QE) in achieving the goal of reducing long-term interest rates. Japan, considered as the precursor of QE policy, also conducted research about the consequences of non-standard instruments, implemented to restore financial stability of the country. Although the literature about the effectiveness of Quantitative Easing in Japan is extensive, it does not uniquely specify whether it brought permanent effects. The main aim of the study is to identify the implications of non-standard monetary policy, implemented by selected central banks (the Federal Reserve System, Bank of England and European Central Bank), paying particular attention to the consequences into three areas: the size of money supply, financial markets, and the real economy.

Keywords: consequences of modern monetary policy, quantitative easing policy, banking sector instability, global financial crisis

Procedia PDF Downloads 462
5603 A Theoretical Approach on Electoral Competition, Lobby Formation and Equilibrium Policy Platforms

Authors: Deepti Kohli, Meeta Keswani Mehra

Abstract:

The paper develops a theoretical model of electoral competition with purely opportunistic candidates and a uni-dimensional policy using the probability voting approach while focusing on the aspect of lobby formation to analyze the inherent complex interactions between centripetal and centrifugal forces and their effects on equilibrium policy platforms. There exist three types of agents, namely, Left-wing, Moderate and Right-wing who comprise of the total voting population. Also, it is assumed that the Left and Right agents are free to initiate a lobby of their choice. If initiated, these lobbies generate donations which in turn can be contributed to one (or both) electoral candidates in order to influence them to implement the lobby’s preferred policy. Four different lobby formation scenarios have been considered: no lobby formation, only Left, only Right and both Left and Right. The equilibrium policy platforms, amount of individual donations by agents to their respective lobbies and the contributions offered to the electoral candidates have been solved for under each of the above four cases. Since it is assumed that the agents cannot coordinate each other’s actions during the lobby formation stage, there exists a probability with which a lobby would be formed, which is also solved for in the model. The results indicate that the policy platforms of the two electoral candidates converge completely under the cases of no lobby and both (extreme) formations but diverge under the cases of only one (Left or Right) lobby formation. This is because in the case of no lobby being formed, only the centripetal forces (emerging from the election-winning aspect) are present while in the case of both extreme (Left-wing and Right-wing) lobbies being formed, centrifugal forces (emerging from the lobby formation aspect) also arise but cancel each other out, again resulting in a pure policy convergence phenomenon. In contrast, in case of only one lobby being formed, both centripetal and centrifugal forces interact strategically, leading the two electoral candidates to choose completely different policy platforms in equilibrium. Additionally, it is found that in equilibrium, while the donation by a specific agent type increases with the formation of both lobbies in comparison to when only one lobby is formed, the probability of implementation of the policy being advocated by that lobby group falls.

Keywords: electoral competition, equilibrium policy platforms, lobby formation, opportunistic candidates

Procedia PDF Downloads 320
5602 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 373
5601 Philippine Film Industry and Cultural Policy: A Critical Analysis and Case Study

Authors: Michael Kho Lim

Abstract:

This paper examines the status of the film industry as an industry in the Philippines—where or how it is classified in the Philippine industrial classification system and how this positioning gives the film industry an identity (or not) and affects (film) policy development and impacts the larger national economy. It is important to look at how the national government recognises Philippine cinema officially, as this will have a direct and indirect impact on the industry in terms of its representation, conduct of business, international relations, and most especially its implications on policy development and implementation. Therefore, it is imperative that the ‘identity’ of Philippine cinema be clearly established and defined in the overall industrial landscape. Having a clear understanding of Philippine cinema’s industry status provides a better view of the bigger picture and helps us determine cinema’s position in the national agenda in terms of priority setting, future direction and how the state perceives and thereby values the film industry as an industry. This will then serve as a frame of reference that will anchor the succeeding discussion. Once the Philippine film industry status is identified, the paper will then clarify how cultural policy is defined, understood, and applied in the Philippines in relation to Philippine cinema by reviewing and analyzing existing policy documents and pending bills in the Philippine Congress and Senate. Lastly, the paper delves into the roles that (national) cultural institutions and industry organisations play as primary drivers or support mechanisms and how they become platforms (or not) for the upliftment of the independent film sector and towards the sustainability of the film industry. The paper concludes by arguing that the role of the government and how government officials perceive and treats culture is far more important than cultural policy itself, as these policies emanate from them.

Keywords: cultural and creative industries, cultural policy, film industry, Philippine cinema

Procedia PDF Downloads 417
5600 E-Commercial Enterprises' Behavior on China's Local Government's Economic Policy: An Example from Zhejiang Province

Authors: Chia-Chi Cheng

Abstract:

After the implementation of “the internet plus,” several puzzles emerge as below: why does China impose more regulation and laws on economic development on the Internet? Why does China urge the importance of manufacturing industry? Why does China’s local government passively implement the policy imposed by the central government? What kind of factors can influence China’s local government’s economic preference? In the framework of neo-institutionalism, this research considers China’s local government as changing agents to analyze its preferences and behavior. In general, the interests urged by the local government will decide its preference and behaviors. They will change its counterpart to cooperate if the change will bring more benefits. Thus, they will change its preference and behavior while the external environment alters. While the local government has the same definition on political activity and economic interest, they will prefer to cooperate with the local enterprises in the way of laying symbiont, within the presumption that the institution remains. While the local government has the different positions on political activity and economic interest, they will re-define the existed regulation or create new regulation in the condition of institution vacuum. Sequentially, they will replace the targets, and the policy, which does not fit in the Central government’s policy, will emerge.

Keywords: China, institutional change, government enterprise relationship, e-commercial policy

Procedia PDF Downloads 224
5599 Developing a Cultural Policy Framework for Small Towns and Cities

Authors: Raymond Ndhlovu, Jen Snowball

Abstract:

It has long been known that the Cultural and Creative Industries (CCIs) have the potential to aid in physical, social and economic renewal and regeneration of towns and cities, hence their importance when dealing with regional development. The CCIs can act as a catalyst for activity and investment in an area because the ‘consumption’ of cultural activities will lead to the activities and use of other non-cultural activities, for example, hospitality development including restaurants and bars, as well as public transport. ‘Consumption’ of cultural activities also leads to employment creation, and diversification. However, CCIs tend to be clustered, especially around large cities. There is, moreover, a case for development of CCIs around smaller towns and cities, because they do not rely on high technology inputs, and long supply chains, and, their direct link to rural and isolated places makes them vital in regional development. However, there is currently little research on how to craft cultural policy for regions with smaller towns and cities. Using the Sarah Baartman District (SBDM) in South Africa as an example, this paper describes the process of developing cultural policy for a region that has potential, and existing, cultural clusters, but currently no one, coherent policy relating to CCI development. The SBDM was chosen as a case study because it has no large cities, but has some CCI clusters, and has identified them as potential drivers of local economic development. The process of developing cultural policy is discussed in stages: Identification of what resources are present; including human resources, soft and hard infrastructure; Identification of clusters; Analysis of CCI labour markets and ownership patterns; Opportunities and challenges from the point of view of CCIs and other key stakeholders; Alignment of regional policy aims with provincial and national policy objectives; and finally, design and implementation of a regional cultural policy.

Keywords: cultural and creative industries, economic impact, intrinsic value, regional development

Procedia PDF Downloads 220
5598 The Principle of Methodological Rationality and Security of Organisations

Authors: Jan Franciszek Jacko

Abstract:

This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.

Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics

Procedia PDF Downloads 127
5597 Application of Non-Smoking Areas in Hospitals

Authors: Nur Inayah Ismaniar, Sukri Palutturi, Ansariadi, Atjo Wahyu

Abstract:

Background: In various countries in the world, the problem of smoking is now considered something serious because of the effects of smoking which can not only lead to addiction but also have the potential to harm health. Public health authorities have concluded that one solution that can be done to protect the public from active smokers is to issue a policy that requires public facilities to be completely smoke-free. The hospital is one of the public facilities that has been designated as a smoke-free area. However, the implementation and maintenance of a successful program based on a smoke-free hospital are still considered an ongoing challenge worldwide due to the very low level of adherence. The low level of compliance with this smoke-free policy is also seen in other public facilities. The purpose of the literature review is to review the level of compliance with the application of the Non-Smoking Area policy, how this policy has succeeded in reducing smoking activity in hospitals, and what factors lead to such compliance in each country in the world. Methods: A literature review of articles was carried out on all types of research methods, both qualitative and quantitative. The sample is all subjects who are in the research location, which includes patients, staff and hospital visitors. Results: Various variations in the level of compliance were found in various kinds of literature. The literature with the highest level of compliance is 88.4%. Furthermore, several determinants that are known to affect the compliance of the Non-Smoking Area policies in hospitals include communication, information, knowledge, perceptions, interventions, attitudes and support. Obstacles to its enforcement are the absence of sanctions against violators of the Non-Smoking Area policy, the ineffectiveness of the function of policymakers in hospitals, and negative perceptions of smoking related to mental health. Conclusion: Violations of the Non-Smoking Area policy are often committed by the hospital staff themselves, which makes it difficult for this policy to be fully enforced at various points in the hospital.

Keywords: health policy, non-smoking area, hospital, implementation

Procedia PDF Downloads 74
5596 Policies and Practice of Refugee Education from Malaysian Perspective: Preliminary Findings

Authors: A. H. A. Hamid, N. A. Zainuddin, M. Y. M. Nor

Abstract:

Millions of child refugees leave their countries in the hope of better and safer lives particularly in the aspect of education. However, the education access for the child refugees is strongly depending on the policies made by the federal and local governments. Malaysia, in particular, is a country which does not have a specific educational policy that is inclusive of child refugees. Hence, this study explores the feasibility of possible educational policy that specifically caters the needs of child refugees in Malaysia. These are preliminary findings of a case study which involved thirty-five postgraduate students in a local university who undertook Educational Policy coursework and five teachers in a refugee community centre in Kuala Lumpur, Malaysia. Interviews were recorded, transcribed and thematically analysed in relation to issues highlighted in the refugee education literature. The findings showed that most of the informants felt there is an urgent need of a systematic intervention put in place by the local government to cater to the needs of equal education access to the child refugees. A further large scale study is needed in the near future by integrating different perspectives of relevant stakeholders for an effective, efficient and sustainable policy formulation and implementation related to child refugees in Malaysia. The findings may be of interests to the educators, the ministry of education, state education office, district education office, teachers, parents and surrounding communities for their awareness about the needs of refugee education and the feasibility of educational policy for child refugees in the country.

Keywords: child refugees, educational policy, inclusive education, Malaysia

Procedia PDF Downloads 135
5595 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria

Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma

Abstract:

Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.

Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures

Procedia PDF Downloads 103
5594 Macroeconomic Reevaluation of CNY/USD Exchange Rate: Quantitative Impact on EUR/USD Exchange Rate

Authors: R. Henry, H. Andriamboavonjy, J. B. Paulin, S. Drahy, R. Gourichon

Abstract:

During past decade, Chinese monetary policy has been to maintain stability of exchange rate CNY/USD by creating parity between the two currencies. This policy, against market equilibrium, impacts the exchange rate in having low Yuan currency, and keeping attractiveness of Chinese industries. Using macroeconomic and statistic approach, the impact of such policy onto CNY/USD exchange rate is quantitatively determined. It is also pointed out how Chinese banks respect Basel III ratios, in particular the foreign exchange ratio. The main analysis is focusing on how Chinese banks will respect these ratios in the future.

Keywords: macroeconomics models, yuan floating exchange rate, basel iii, china banking system

Procedia PDF Downloads 557
5593 Attitudes of University Students toward English Language Education Policy in Iraqi Kurdistan

Authors: Momen Yaseen M. Amin

Abstract:

Despite widespread coverage of language policy in the literature, there has been scant research probing into English language education policy at tertiary levels in general and in the case of higher education context of Iraqi Kurdistan in particular. The present qualitative study investigated the results of a questionnaire on attitudes toward English language education policy in terms of attitudes toward the English language in general, the current English education policy, and the purposes for learning English among Kurdish EFL university students. Moreover, this study aimed to investigate this topic in light of the participants’ gender and major. To this end, an adapted version of Yang’s (2012) questionnaire was administered to university EFL students majoring in soft and hard sciences (N=300, male 34%, female 67%, four and two disciplines, respectively) at two-state and private universities in Iraqi Kurdistan. The findings revealed positive attitudes toward English as an international language in both soft and hard sciences. While strongly subscribing to the idea that all Iraqi Kurdish students should learn the English language and the courses to be offered in English as well as Kurdish, the majority of the participants expressed their readiness and enthusiasm to excel in English and considered such competency a significant academic accomplishment. However, a good number felt dissatisfied with the status quo of English education at their institutions. This paper provides some implications and recommendations for English education policies makers, administrators, and English language instructors at tertiary levels.

Keywords: attitudes, language policy, English language education, Iraqi Kurdistan

Procedia PDF Downloads 159
5592 Effects of Family Ownership and Institutional Ownership on Cash Dividend Policy in Companies Listed at Tehran Stock Exchange

Authors: Mahdi Azizzadeh, Ali Nabizadeh

Abstract:

This paper investigates whether ownership structure has significant effects on dividend policy and the percentage of cash dividend payout ratio in Iranian companies listed on the Tehran Stock Exchange. We use a sample of 300 firm-years for 2010-2014. Results indicate that there is no significant relationship between family ownership and/or institutional ownership and dividend policy. Furthermore, there is no significant relationship between dividend policies in family-owned firms with high or low institutional ownership. However, our empirical test shows that family firms with a low level of institutional investors distribute more cash dividends on average than family firms with a high level of institutional ownership.

Keywords: family ownership, institutional ownership, dividend policy, dividend payout ratio

Procedia PDF Downloads 293
5591 A Comparative Human Rights Analysis of Expulsion as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

Where criminal law used to be the traditional response to cope with the terrorist threat, European governments are increasingly relying on administrative paths. The reliance on immigration law fits into this trend. Terrorism is seen as a civilization menace emanating from abroad. In this context, the expulsion of dangerous aliens, immigration law’s core task, is put forward as a key security tool. Governments all over Europe are focusing on removing dangerous individuals from their territory rather than bringing them to justice. This research reflects on the consequences for the expelled individuals’ fundamental rights. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, igniting the recourse to immigration law as a counterterrorism tool. Yet, they adopt a very different approach on this: the United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also 'securitized' its immigration policy after the recent terrorist hit in Stockholm, but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This paper addresses the situation in Belgium. In 2017, the Belgian parliament introduced several legislative changes by which it considerably expanded and facilitated the possibility to expel unwanted aliens. First, the expulsion measure was subjected to new and questionably definitions: a serious attack on the nation’s safety used to be required to expel certain categories of aliens. Presently, mere suspicions suffice to fulfil the new definition of a 'serious threat to national security'. A definition which fails to respond to the principle of legality; the law, nor the prepatory works clarify what is meant by 'a threat to national security'. This creates the risk of submitting this concept’s interpretation almost entirely to the discretion of the immigration authorities. Secondly, in name of intervening more quickly and efficiently, the automatic suspensive appeal for expulsions was abolished. The European Court of Human Rights nonetheless requires such an automatic suspensive appeal under Article 13 and 3 of the Convention. Whether this procedural reform will stand to endure, is thus questionable. This contribution also raises questions regarding expulsion’s efficacy as a key security tool. In a globalized and mobilized world, particularly in a European Union with no internal boundaries, questions can be raised about the usefulness of this measure. Even more so, by simply expelling a dangerous individual, States avoid their responsibility and shift the risk to another State. Criminal law might in these instances be more capable of providing a conclusive and long term response. This contribution explores the human rights consequences of expulsion as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counter-terrorism and human rights, expulsion, immigration law

Procedia PDF Downloads 114