Search results for: national security strategy
9473 Dynamics of Norms and Identities Facilitate Countries to Resolve Their Conflicts: A Case Study of ASEAN
Authors: Chander Shekhar Kohli
Abstract:
In the field of international relations, countries have been experiencing distinct nature of conflicts. But, in the case of Association of Southeast Asian Nations (ASEAN) for a long time, the members have witnessed conflicts, small and large. These conflicts, as a result, have given catastrophic outcomes, such as killings and destroying properties. For the resolution of such conflicts, nonetheless, efforts likewise have been made, simultaneously, in terms of establishing peace and security. In this background, the ASEAN presents a significant example as before it had faced several wars, like Vietnam War, Cambodia conflicts, and so on. This research paper, therefore, strives to examine the ASEAN as a case with the help of both primary and secondary sources. It likewise will be dealt with how changing norms and identity building facilitate the ASEAN countries to deal with their conflicts both internal and external. This paper also will discuss how internal developments within countries affect conflict resolution process as each member of ASEAN is guided by its national interest. It is then argued that conflict resolution in the ASEAN is moving from its existing power-based solution to norms and identity-based solution as member countries have become more dependent on other countries. The research, therefore, is concluded by saying that the conflicts could only be resolved through building norms and common identities, which of course are recognized crucial mechanisms among the ASEAN countries with some exceptions.Keywords: ASEAN, conflict resolution, norms and identities, peace and security
Procedia PDF Downloads 2079472 Hidden Markov Model for Financial Limit Order Book and Its Application to Algorithmic Trading Strategy
Authors: Sriram Kashyap Prasad, Ionut Florescu
Abstract:
This study models the intraday asset prices as driven by Markov process. This work identifies the latent states of the Hidden Markov model, using limit order book data (trades and quotes) to continuously estimate the states throughout the day. This work builds a trading strategy using estimated states to generate signals. The strategy utilizes current state to recalibrate buy/ sell levels and the transition between states to trigger stop-loss when adverse price movements occur. The proposed trading strategy is tested on the Stevens High Frequency Trading (SHIFT) platform. SHIFT is a highly realistic market simulator with functionalities for creating an artificial market simulation by deploying agents, trading strategies, distributing initial wealth, etc. In the implementation several assets on the NASDAQ exchange are used for testing. In comparison to a strategy with static buy/ sell levels, this study shows that the number of limit orders that get matched and executed can be increased. Executing limit orders earns rebates on NASDAQ. The system can capture jumps in the limit order book prices, provide dynamic buy/sell levels and trigger stop loss signals to improve the PnL (Profit and Loss) performance of the strategy.Keywords: algorithmic trading, Hidden Markov model, high frequency trading, limit order book learning
Procedia PDF Downloads 1519471 Exploring the Process of Change in the Identity Constructs of Adolescents Exposed to Family Violence
Authors: Charlene Petersen, Herman Grobler, Karel Botha
Abstract:
Exposure to family violence has an impact on adolescent development, more specifically the identity process. This article explores the process of change in identity constructs of adolescents’ exposed to family violence in a Cape Town community in South Africa. In order to understand the process of identity formation the article explores and describes how the meaning that these adolescents give to family violence can contribute to change in their identity constructs. A mixed method approached was used in the study. A psycho-education strategy was implemented as the intervention and pretest-post-test scales were used to assess for change after the intervention process. Twelve participants were purposely selected for the study and included both male and female adolescents with ages ranging from 15 to 18 years from three secondary schools. The research data for this article were mainly extracted from the pre-test post-test design and the psycho-education strategy of the overall research study. The research results of the psycho-education strategy were thematically analyzed and a statistical procedure was used to measure for significant change within pre-test-post-test scales. The research merely refers to the outcome of psycho-education strategy and how it correlates with the outcome of the pre-test post-test design. Adolescents’ exposure to a psycho-education strategy, as well the pre-test post-test findings reveal a change within identity construct in terms of how they perceive themselves and interaction with others in the context of family violence.Keywords: process of change in adolescent identity, family violence, psycho-education strategy, pre and post assessment
Procedia PDF Downloads 4769470 A Study on Strategy of Coordinative Symbiosis between New and Old Buildings: Case Study of Shanghai Citic Plaza and Surroundings
Authors: Tianyi Qin
Abstract:
Along with the acceleration of Chinese urbanization, the expansion, renovation and demolition of old buildings is on the stage together with the design and construction of new buildings every day in downtown of the old city area. The coordinative symbiosis between new and old buildings is an important problem which needs to be solved in the process of urban development. By studying and analyzing the case of Shanghai Citic Plaza and surroundings, this paper contributes to discussing the concept, value and problems to be solved of the coordination of new and old buildings, meanwhile, striking the balance between new and old buildings from the aspects of architectural form, space, function and local context. As a result, the strategy of the coordinative symbiosis between new and old buildings is summarized, which can offer some guiding principles to urban development from now on.Keywords: coordinative symbiosis, new and old buildings, Shanghai Citic Plaza, strategy
Procedia PDF Downloads 3489469 The Strategic Entering Time of a Commerce Platform
Authors: Chia-li Wang
Abstract:
The surge of service and commerce platforms, such as e-commerce and internet-of-things, have rapidly changed our lives. How to avoid the congestion and get the job done in the platform is now a common problem that many people encounter every day. This requires platform users to make decisions about when to enter the platform. To that end, we investigate the strategic entering time of a simple platform containing random numbers of buyers and sellers of some item. Upon a trade, the buyer and the seller gain respective profits, yet they pay the cost of waiting in the platform. To maximize their expected payoffs from trading, both buyers and sellers can choose their entering times. This creates an interesting and practical framework of a game that is played among buyers, among sellers, and between them. That is, a strategy employed by a player is not only against players of its type but also a response to those of the other type, and, thus, a strategy profile is composed of strategies of buyers and sellers. The players' best response, the Nash equilibrium (NE) strategy profile, is derived by a pair of differential equations, which, in turn, are used to establish its existence and uniqueness. More importantly, its structure sheds valuable insights of how the entering strategy of one side (buyers or sellers) is affected by the entering behavior of the other side. These results provide a base for the study of dynamic pricing for stochastic demand-supply imbalances. Finally, comparisons between the social welfares (the sum of the payoffs incurred by individual participants) obtained by the optimal strategy and by the NE strategy are conducted for showing the efficiency loss relative to the socially optimal solution. That should help to manage the platform better.Keywords: double-sided queue, non-cooperative game, nash equilibrium, price of anarchy
Procedia PDF Downloads 869468 Lock in, Lock Out: A Double Lens Analysis of Local Media Paywall Strategies and User Response
Authors: Mona Solvoll, Ragnhild Kr. Olsen
Abstract:
Background and significance of the study: Newspapers are going through radical changes with increased competition, eroding readerships and declining advertising resulting in plummeting overall revenues. This has lead to a quest for new business models, focusing on monetizing content. This research paper investigates both how local online newspapers have introduced user payment and how the audience has received these changes. Given the role of local media in keeping their communities informed and those in power accountable, their potential impact on civic engagement and cultural integration in local communities, the business model innovations of local media deserves far more research interest. Empirically, the findings are interesting for local journalists, local media managers as well as local advertisers. Basic methodologies: The study is based on interviews with commercial leaders in 20 Norwegian local newspapers in addition to a national survey data from 1600 respondents among local media users. The interviews were conducted in the second half of 2015, while the survey was conducted in September 2016. Theoretically, the study draws on the business model framework. Findings: The analysis indicates that paywalls aim more at reducing digital cannibalisation of print revenue than about creating new digital income. The newspapers are mostly concerned with retaining “old” print subscribers and transform them into digital subscribers. However, this strategy may come at a high price for newspapers if their defensive print strategy drives away younger digital readership and hamper their recruitment potential for new audiences as some previous studies have indicated. Analysis of young reader news habits indicates that attracting the younger audience to traditional local news providers is particularly challenging and that they are more prone to seek alternative news sources than the older audience is. Conclusion: The paywall strategy applied by the local newspapers may be well fitted to stabilise print subscription figures and facilitate more tailored and better services for already existing customers, but far less suited for attracting new ones. The paywall is a short-sighted strategy, which drives away younger readers and paves the road for substitute offerings, particularly Facebook.Keywords: business model, newspapers, paywall, user payment
Procedia PDF Downloads 2779467 The Comparison of Dismount Skill between National and International Men’s Artistic Gymnastics in Parallel Bars Apparatus
Authors: Chen ChihYu, Tang Wen Tzu, Chen Kuang Hui
Abstract:
Aim —To compare the dismount skill between Taiwanese and elite international gymnastics in parallel bars following the 2017-2020 code of points. Methods—The gymnasts who advanced to the parallel bars event finals of these four competitions including World Championships, Universiade, the National Games of Taiwan, and the National Intercollegiate Athletic Games of Taiwan both 2017 and 2019 were selected in this study. The dismount skill of parallel bars was analyzed, and the average difficulty score was compared by one-way ANOVA. Descriptive statistics were applied to present the type of dismount skill and the difficulty of each gymnast in these four competitions. The data from World Championships and Universiade were combined as the international group (INT), and data of Taiwanese National Games and National Intercollegiate Athletic Games were also combined as the national group (NAT). The differences between INT and NAT were analyzed by the Chi-square test. The statistical significance of this study was set at α= 0.05. Results— i) There was a significant difference in the mean parallel bars dismount skill in these four competitions analyzed by one-way ANOVA. Both dismount scores of World Championships and Universiade were significantly higher than in Taiwanese National Games and National Intercollegiate Athletic Games (0.58±0.08 & 0.56±0.08 > 0.42±0.06 & 40±0.06, p < 0.05). ii) Most of the gymnasts in World Championships and Universiade selected the 0.6-point skill as the parallel bars dismount element, and for the Taiwanese National Games and the National Intercollegiate Athletic Games, most of the gymnasts performed the 0.4-point dismount skill. iii) The result of the Chi-square test has shown that there was a significant difference in the selection of parallel bars dismount skill. The INT group used the E or E+ difficulty element as the dismount skill, and the NAT group selected the D or D- difficulty element. Conclusion— The level of parallel bars dismount in Taiwanese gymnastics is inferior to elite international gymnastics. It is suggested that Taiwanese gymnastics must try to practice the F difficulty dismount (double salto forward tucked with half twist) in the future.Keywords: Artistic Gymnastics World Championships, dismount, difficulty score, element
Procedia PDF Downloads 1429466 Enhancing Healthcare Data Protection and Security
Authors: Joseph Udofia, Isaac Olufadewa
Abstract:
Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.Keywords: cloud security, healthcare, cybersecurity, policy and standard
Procedia PDF Downloads 909465 Federal Character Principle and the Challenges of National Integration in Nigeria: A Comparative Analysis of Some Federal Appointments under Jonathan and Buhari Administrations
Authors: Simon O. Obadahun, Samuel Otohinoyi
Abstract:
The Nigerian state is heterogeneous both in character and content. Efforts to manage this diversity has so far not yielded the desired result. This paper examines the Federal Character Principle as one of the instruments intended to manage our obvious diversity such that no part of the country is marginalized or feels marginalized or sidelined. The paper observed that the Federal Character Principle have not achieved its set objectives, which is national unity and loyalty. It draws from secondary sources and discovered that there are factors that make an equitable distribution of public appointments difficult which is beyond the powers of the federal character commission. The major argument of this paper is that if the Federal Character Commission as an organization expected to enforce this principle is not restructured and given more power to sanction individuals and organizations that are found of circumventing the relevant guidelines in this regards, the hope of national unity and loyalty will continue to be a mirage.Keywords: appointments, federalism, federal character, national integration
Procedia PDF Downloads 3329464 FPGA Implementation of the BB84 Protocol
Authors: Jaouadi Ikram, Machhout Mohsen
Abstract:
The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication
Procedia PDF Downloads 1839463 Food Strategies in the Mediterranean Basin, Possible for Food Safety and Security
Authors: Lorenza Sganzetta, Nunzia Borrelli
Abstract:
The research intends to reflect on the current mapping of the Food Strategies, on the reasons why in the planning objectives panorama, such sustainability priorities are located in those geographic areas and on the evolutions of these priorities of the Mediterranean planning dispositions. The whirling population growth that is affecting global cities is causing an enormous challenge to conventional resource-intensive food production and supply and the urgent need to face food safety, food security and sustainability concerns. Urban or Territorial Food Strategies can provide an interesting path for the development of this new agenda within the imperative principle of sustainability. In the specific, it is relevant to explore what ‘sustainability’ means within these policies. Most of these plans include actions related to four main components and interpretations of sustainability that are food security and safety, food equity, environmental sustainability itself and cultural identity and, at the designing phase, they differ slightly from each other according to the degree of approximation to one of these dimensions. Moving from these assumptions, the article would analyze some practices and policies representatives of different Food Strategies of the world and focus on the Mediterranean ones, on the problems and negative externalities from which they start, on the first interventions that are implementing and on their main objectives. We will mainly use qualitative data from primary and secondary collections. So far, an essential observation could have been made about the relationship between these sustainability dimensions and geography. In statistical terms, the US and Canadian policies tended to devote a large research space to health issues and access to food; those northern European showed a special attention to the environmental issues and the shortening of the chain; and finally the policies that, even in limited numbers, were being developed in the Mediterranean basin, were characterized by a strong territorial and cultural imprint and their major aim was to preserve local production and the contact between the productive land and the end consumer. Recently, though, Mediterranean food planning strategies are focusing more on health related and food accessibility issues and analyzing our diets not just as a matter of culture and territorial branding but as tools for reducing public health costs and accessibility to fresh food for everyone. The article would reflect then on how Food Safety, Food Security and Health are entering the new agenda of the Mediterranean Food Strategies. The research hypothesis suggests that the economic crisis that in the last years invested both producers and consumers had a significant impact on the nutrition habits and on the redefinition of food poverty, even in the fatherland of the healthy Mediterranean diet. This trend and other variables influenced the orientation and the objectives of the food strategies.Keywords: food security, food strategy, health, sustainability
Procedia PDF Downloads 2239462 The Role of Community Gardens in Urban Food Security: A Case Study of the Thulubukele Community Farm in Newlands West
Authors: Nadine Ponnusamy
Abstract:
Reducing risks to food security resulting from climate change is recognized as one of the major challenges of the 21st century. The risks to food security have intensified, primarily due to globalization, a growing population, rapid urbanization, and the constantly evolving urban environment. One of the key challenges facing cities is the need to supply sufficient food to households amid increasing demand, which necessitates a continuous effort to enhance food production. Given the severity of climate change, it is imperative to adopt solutions to address food insecurity. Communities and individuals must explore sustainable livelihood options that do not harm the environment. Urban agriculture represents one of the many strategies that can be employed to improve household food security. The objective of this research is to establish the extent to which community gardens can enhance urban food security, focusing on the Thulubukele Community Farm in Newlands West, Durban. The researcher utilized a qualitative case study approach to gain insight into urban agriculture and food security within this context, while also examining the long-term impacts on food security and community development. The sampling method utilized for selecting participants and gathering information included purposive sampling. Since the study centers on urban agriculture, key stakeholders were specifically targeted. Participants were selected for interviews based on their involvement in the food garden. In-depth interviews were conducted to collect and analyze data. Secondary data from the literature facilitated a comparative analysis of similar case studies through precedent studies. This study demonstrates that growing food not only improves the nutritional value of the produce but also enhances household food security, enables individuals to generate disposable income, and facilitates significant contributions to the local community and other organizations in need.Keywords: community gardens, food security, South Africa, urban agriculture
Procedia PDF Downloads 119461 Foresight in Food Supply System in Bogota
Authors: Suarez-Puello Alejandro, Baquero-Ruiz Andrés F, Suarez-Puello Rodrigo
Abstract:
This paper discusses the results of a foresight exercise which analyzes Bogota’s fruit, vegetable and tuber supply chain strategy- described at the Food Supply and Security Master Plan (FSSMP)-to provide the inhabitants of Bogotá, Colombia, with basic food products at a fair price. The methodology consisted of using quantitative and qualitative foresight tools such as system dynamics and variable selection methods to better represent interactions among stakeholders and obtain more integral results that could shed light on this complex situation. At first, the Master Plan is an input to establish the objectives and scope of the exercise. Then, stakeholders and their relationships are identified. Later, system dynamics is used to model product, information and money flow along the fruit, vegetable and tuber supply chain. Two scenarios are presented, discussing actions by the public sector and the reactions that could be expected from the whole food supply system. Finally, these impacts are compared to the Food Supply and Security Master Plan’s objectives suggesting recommendations that could improve its execution. This foresight exercise performed at a governmental level is intended to promote the widen the use of foresight as an anticipatory, decision-making tool that offers solutions to complex problems.Keywords: decision making, foresight, public policies, supply chain, system dynamics
Procedia PDF Downloads 4399460 Tourism and Marketing: An Exploration Study to the Strategic Market Analysis of Moses Mabhida Stadium as a Major Tourism Destination in Kwazulu-Natal
Authors: Nduduzo Andrias Ngxongo, Nsizwazikhona Simon Chili
Abstract:
This analytical exploration illustrates how the non-existence of a proper marketing strategy for a tourism destination may have resulted in a radical decline in both financial outputs and visitor arrivals. The marketing strategy is considered as the foundation for any tourism destination’s marketing tactics. Tourism destinations are ought to have dynamic and adaptive marketing strategies that will develop a promotional approach to help the destination to gain market share, identify its target markets, stay relevant to its existing clients, attract new visitors, and increase profits-earned. Accordingly, the Moses Mabhida Stadium (MMS), one of the prominent tourist attractions in KwaZulu-Natal; boasting a world-class architectural design, several international prestigious awards, and vibrant, adventurous activities, has in recent years suffered a gradual slump in both visitors and profits. Therefore, the basis of this paper was to thoroughly establish precisely how the existing MMS marketing strategy may be a basis for a decline in the number of visitors and profits-earned in recent years. The study adopted mixed method research strategy, with 380 participants. The outcome of the study suggests some costly disparities in the marketing strategy of MMS which has led to poor performance and a loss in tourism market share. In consequence, the outcome further suggests that the non-existence of market research analysis and destination marketing tools contributed vastly to the in-progress dilemma. This fact-finding exploration provides a birds-eye outlook of MMS marketing strategy, and based on the results, the study recommends for the introduction of a more far-reaching and revitalising marketing strategy through; constant and persistent market research initiatives, minimal political interference in the administration of state-funded organisations, reassessment of the feasibility study, vigorous, and sourcing of proficient personnel.Keywords: tourism, destination, marketing , marketing strategy
Procedia PDF Downloads 2719459 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications
Authors: Chieh-Fu Chang, Wan-Hsin Hsieh
Abstract:
We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.Keywords: security, IWE, cliff effect, space communications
Procedia PDF Downloads 4259458 Close-Out Netting Clauses from a Comparative Perspective
Authors: Lidija Simunovic
Abstract:
A Close-out netting cause is a clause within master agreements which reduces credit risks. This clause contains the parties ' advance agreement that the occurrence of a certain event (such as the commencement of bankruptcy proceedings) will result in the termination of the contract and that their mutual claims will be calculated as a net lump-sum to be paid by one party to the other. The legal treatment of the enforceability of close-out netting clauses opens up many legal matters in comparative legal systems because it is not uniformly treated in comparative laws. Certain legal systems take a liberal approach and allow the enforcement of close-out netting clauses. Others are much stricter, and they limit or completely prohibit the enforcement of close-out netting clauses through the mandatory provisions of their national bankruptcy laws. The author analyzes the concept of close-out netting clauses in selected comparative legal systems and examines the differences in their legal treatment by using the historical, analytical, and comparative method. It results that special treatment of the close-out netting in national laws with a liberal approach is often forced by financial industry lobbies and introduced in national laws without the justified reasons. Contrary to that in legal systems with limited or prohibited approach on close-out netting the uncertain enforceability of the close-out netting clause causes potential credit risks. The detected discrepancy on the national legal treatment and national financial markets regarding close-out netting lead to the conclusion to author’s best knowledge that is not possible to use any national model of close-out netting as a role model which perfectly fits all.Keywords: close-out netting clauses, derivatives, insolvency, offsetting
Procedia PDF Downloads 1459457 Healthcare Professionals' Utilization of Physical Exercise as a Strategy to Prevent Non-Communicable Diseases in Ethiopian Public Sector Hospitals
Authors: Jeanne Grace, Melkamu D. Kassa
Abstract:
Background: Despite the recognized benefits of physical exercise, including a reduction of health risk factor indicators, illness and deaths related to Non-Communicable Diseases (NCDs) like cardiovascular disease, diabetes, hypertension, and cancer, the extent of its recognition and use as a prevention strategy by healthcare professionals working in Ethiopian referral hospitals is unknown. Objective: This study explored healthcare professionals’ use of physical exercise as a non-communicable disease prevention strategy in the Ethiopian public sector healthcare system. Methods: In this cross-sectional study, a self-administered questionnaire was conducted after being piloted to ensure validity and reliability. For the study, 312 participants were selected from 13 purposively selected Ethiopian referral hospitals, these being 99 physicians who were purposively selected and 213 nurses who were proportionately and randomly selected. Results: The results indicated that three-quarters (78%) of healthcare professionals working in Ethiopian hospitals are not using physical exercise as a strategy to prevent NCDs. Increased specialization (AOR = 20.203, p < 0.001), longer service years (AOR = 0.041, p = 0.014), young age (AOR = 19.871, p < 0.001), and being male (AOR = 0.269, p < 0.001), were predictors of using physical exercise as a strategy for the prevention of NCDs. Conclusion: Healthcare professionals’ utilization of physical exercise as a strategy for NCDs prevention was inadequate in Ethiopia. Given the increasing burden of NCD disease in Ethiopia, training nurses, physicians and medical managers have to acknowledge the use of physical exercise as an NCD prevention strategy. The results of this study highlight the importance of formulating physical exercise intervention strategies for NCDs patients, and the need to incorporate training for healthcare professionals on the type, intensity, duration, and frequency of physical exercise to prevent NCDs in the Ethiopian healthcare system.Keywords: exercise, medical managers, nurses, physicians
Procedia PDF Downloads 1749456 The Regionalism Paradox in the Fight against Human Trafficking: Indonesia and the Limits of Regional Cooperation in ASEAN
Authors: Nur Iman Subono, Meidi Kosandi
Abstract:
This paper examines the role of regional cooperation in the Association of Southeast Asian Nations (ASEAN) in the fight against human trafficking for Indonesia. Many among scholars suggest that regional cooperation is necessary for combating human trafficking for its transnational and organized character as a crime against humanity. ASEAN members have been collectively active in responding transnational security issues with series of talks and collaboration agreement since early 2000s. Lately in 2015, ASEAN agreed on ASEAN Convention against Trafficking in Persons, particularly Women and Children (ACTIP) that requires each member to collaborate in information sharing and providing effective safeguard and protection of victims. Yet, the frequency of human trafficking crime occurrence remains high and tend to increase in Indonesian in 2017-2018. The objective of this paper is to examine the effectiveness and success of ACTIP implementation in the fight against human trafficking in Indonesia. Based on two years of research (2017-2018) in three provinces with the largest number of victims in Indonesia, this paper shows the tendency of persisting crime despite the implementation of regional and national anti-trafficking policies. The research was conducted by archive study, literature study, discourse analysis, and depth interviews with local government officials, police, prosecutors, victims, and traffickers. This paper argues that the relative success of ASEAN in establishing convention at the high-level meetings has not been followed with the success in its implementation in the society. Three main factors have contributed to the ineffectiveness of the agreements, i.e. (1) ASEAN institutional arrangement as a collection of sovereign states instead of supranational organization with binding authority; (2) the lack of commitment of ASEAN sovereign member-states to the agreements; and (3) the complexity and variety of the nature of the crime in each member-state. In effect, these factors have contributed to generating the regionalism paradox in ASEAN where states tend to revert to national policies instead of seeking regional collective solution.Keywords: human trafficking, transnational security, regionalism, anti trafficking policy
Procedia PDF Downloads 1619455 The SOCI Strategy as a Method to Meet the Innovation Challenges of COVID-19
Authors: Victoria Wolf, Renata Dobrucka, Robert Prezkop, Stephan Haubold
Abstract:
The COVID-19 causes a worldwide crisis and has an impact in every dimension of the economy. Organizations with the ability to adapt to new developments and which innovate solutions for the disrupted world during and after the Corona crises have the opportunity to not only survive the crisis but rather to use new trends to implement new business models and gain advantage. In this context, startups seem to have better opportunities to manage the Corona crisis through their innovation-based nature. The main result of this paper is the understanding that by applying a startup orientated innovation (SOCI) strategy, established companies can be motivated to meet the challenge of COVID-19 in a similar way like startups. This result can be achieved by describing the role of innovation and a SOCI strategy as helpful methods for organizations to meet the coming challenges during and after the COVID-19 epidemics. In addition to this, this paper presents a practical application of SOCI through the PANDA approach of the Fresenius University of Applied Sciences in Germany and discuss it in the context of COVID-19 as an exemplary successful real-world implementation of SOCI strategy.Keywords: Covid-19, innovation, open innovation, startup, soci framework
Procedia PDF Downloads 2369454 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income
Authors: M. Koray Cetin, Mehmet Mert
Abstract:
The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.Keywords: exchange rate, panel data analysis, security, tourism revenues
Procedia PDF Downloads 3519453 Ensuring Cyber Security Using Kippo Honeypots
Authors: S. Vivekananda Pandian
Abstract:
A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.Keywords: attackers, security, Kippo Honeypots, virtual machine
Procedia PDF Downloads 4279452 Sector-Wide Collaboration to Reduce Food Waste
Authors: Carolyn Cameron
Abstract:
Stop Food Waste Australia is working with the industry to co-design sector action plans to prevent and reduce food waste across the supply chain. We are a public-private partnership, funded in 2021 by the Australian national government under the 2017 National Food Waste Strategy. Our partnership has representatives from all levels of government, industry associations from farm to fork, and food rescue groups. Like many countries, Australia has adopted the Sustainable Development Goal (SDG) target of 12.3 to halve food waste by 2030. A seminal 2021 study, the National Food Waste Feasibility Report, developed a robust national baseline, illustrating hotspots in commodities and across the supply chain. This research found that the consumption stages – households, food service, and institutions - account for over half of all food waste, and 22% of food produced never leaves the farm gate. Importantly the study found it is feasible for Australia to meet SDG 12.3, but it will require unprecedented action by governments, industry, and the community. Sector Action Plans (Plan) are one of the four main initiatives of Stop Food Waste Australia, including a voluntary commitment, a coordinated food waste communications hub, and robust monitoring and reporting framework. These plans provide a systems-based approach to reducing food loss and waste while realising multiple benefits for supply chain partners and other collaborators. Each plan is being co-designed with the key stakeholders most able to directly control or influence the root cause(s) of food waste hotspots and to take action to reduce or eliminate food waste in their value chain. The initiatives in the Plans are fit-for-purpose, reflecting current knowledge and recognising priorities may refocus over time. To date, sector action plans have been developed with the Food Rescue, Cold Chain, Bread and Bakery, and Dairy Sectors. Work is currently underway on Meat and Horticulture, and we are also developing supply-chain stage plans for food services and institutions. The study will provide an overview of Australia’s food waste baseline and challenges, the important role of sector action plans in reducing food waste, and case studies of implementation outcomes.Keywords: co-design, horticulture, sector action plans, voluntary
Procedia PDF Downloads 1349451 Improving Listening Comprehension for EFL Pre-Intermediate Students through a Blended Learning Strategy
Authors: Heba Mustafa Abdullah
Abstract:
The research aimed at examining the effect of using a suggested blended learning (BL) strategy on developing EFL pre- intermediate students. The study adopted the quasi-experimental design. The sample of the research consisted of a group of 26 EFL pre- intermediate students. Tools of the study included a listening comprehension checklist and a pre-post listening comprehension test. Results were discussed in relation to several factors that affected the language learning process. Finally, the research provided beneficial contributions in relation to manipulating BL strategy with respect to language learning process in general and oral language learning in particular.Keywords: blended learning, english as a foreign language, listening comprehension, oral language instruction
Procedia PDF Downloads 5619450 The Relationship between Marketing Mix Strategy and Valuable of Muay Thai Training and Thai Massage in Foreign Tourists' Perception
Authors: Thammamonr Khunrattanaporn
Abstract:
The purpose of the research was to examine the relationship between the marketing mix factors and valuable of Muay Thai Training and Thai massage in foreign tourists’ perception. The research used the 8 P’s of marketing framework presented in the theory of compound marketing services strategy. Data was collect using survey for 400 questionnaires using the Quota sampling from foreign tourists travelling in Thailand. The data was analyzed to determine valuation statistics, the frequency, percent average, means and standard deviation and pearson's correlation coefficients. The result shows the foreign tourists’ perception with the marketing mix strategy in term of Muay Thai training and massage regarding curriculum areas: product, pricing, channel distribution, Promotion, Personnel services, Physical evidence and external partnerships the overall, it significant at a high level. The awareness level of service and value for travelers had two aspects of service quality and value for money it significant at the highest level.Keywords: foreign tourists’ perception, marketing mix strategy, Muay Thai training, the massage
Procedia PDF Downloads 2659449 Gendering Science, Technology and Innovation: The Case of R&D in Turkey
Authors: Setenay Nil Doğan, Ece Oztan
Abstract:
Research and development (R&D) as a term denotes the innovative studies conducted systematically to increase knowledge and its practices. As R&D intensity of Turkey (0,84%) is quite below the EU average intensity score, it has displayed a continuous increase since the 2000s. Also, the development of human capital in R&D has been one of the basic aims of National Strategy of Science, Technology, and Innovation, and National Innovation System 2023 of Turkey. R&D is considered to one of the fields in which the gender gap is wide. The reflections of the analogy of leaky pipeline, a term used for vertical differentiation in academy can also be observed in those scientific activities related with the private sector. In the private sector, the gender gap becomes wider: the percentage of female researchers in the universities (41%) decreases to 24% in the private sector. Though half of the undergraduates and gradutes are female in Turkey, a widening gender gap is observed in terms of employment in R&D. Given this background, this paper will focus on gendered dynamics of careers in R&D through the interviews conducted with 25 female and 25 male employees, working in a university technopark and some of the large RD centers in Turkey working in several sectors such as electronics, automotive etc. Focusing on some aspects of gender differences in terms of career experiences in R&D and innovation, mobility, participation to the projects, patents and inclusion to other innovatory activities, home-work balance, it aims to explore the relationships between science, technology, innovation and gender.Keywords: gender, innovation, R&D, science, technology
Procedia PDF Downloads 4419448 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks
Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar
Abstract:
Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.Keywords: mobile operating system, security, privacy, Malware
Procedia PDF Downloads 889447 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment
Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu
Abstract:
Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization
Procedia PDF Downloads 4619446 Labor Welfare and Social Security
Authors: Shoaib Alvi
Abstract:
Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.Keywords: labor welfare, internal social responsibility, social security, international conventions
Procedia PDF Downloads 5769445 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application
Authors: Senthuran Manoharan, Rathesan Sivagananalingam
Abstract:
One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.Keywords: authentication, adaptive authentication, machine learning, security
Procedia PDF Downloads 2499444 An Implementation Direct Torque Control Strategy of Induction Machine Using DSPACE TMS 320F2812
Authors: Hamid Chaikhy, Mouna Essaadi, Aziz El Afia
Abstract:
This paper presents an experimental implementation of a new direct torque control strategy of induction machine called twelve sectors direct torque control strategy (12_DTC) using DSPACE TMS 320F2812.The aim of this work is to give an experimental performance analysis of 12_DTC in term of torque, currents distortions and stator flux, to validate simulation results obtained in previous works.Keywords: 12_DTC, DSPACE TMS 320F2812 torque, stator flux, currents distortions, experimental performance analysis
Procedia PDF Downloads 394