Search results for: security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5165

Search results for: security awareness

4475 Journey of Silver Workers Post Retirement in India: An Exploratory Study

Authors: Avani Maniar, Shivani Mehta

Abstract:

Population aging is one of the most challenging issues of the twenty-first century, facing both developed and developing countries worldwide. In the developed world, there has already been a substantial amount of research on aging and work to help understand the capacity and potential of older people. They attract ever ones attention. Their existence in human society gives rise to variety of responses, reactions and apprehensions, because it connotes on greater part, to some kind of compulsion or willingness that prompt elderly to decide to work after retirement. Work due to social attention and assurance for security both economical and social. In this age, elderly aspire for psychological security with due attention. But the fact remains that despite age related limitations good number of persons in their age of sixty and beyond were hunting for work that would support them and get them some kind of support and in it turns helps them to remain physically and mentally active. Based on the existing diversities in the ageing process, it may be stated that there is a need to pay greater attention to the increasing awareness on the ageing issues and its socio-economic effects and to promote the development of policies and programmes for dealing with an ageing society. Addressing the needs, wants, and well-being of elderly people is essential for maintaining a healthy productive workforce in an aging society. This paper will draw on the results of the study about reasons of elderly working post retirement, problems faced by them and about the future of retirement to ask how widespread negative attitudes and stereotypes among employers are and whether these attitudes influence behavior towards older employees. The aim of research is not only to point out certain stereotypes concerning the elderly labour force, but also to stress that unless preconditions for overcoming these stereotypes are created and employment opportunities are given to this segment of the labour force, full employment as an ultimate goal of global economic policy cannot be achieved.

Keywords: employers, India, inequality, problems, reasons of working, silver workers

Procedia PDF Downloads 139
4474 Changing the Dynamics of the Regional Water Security in the Mekong River Basin: An Explorative Study Understanding the Cooperation and Conflict from Critical Hydropolitical Perspective

Authors: Richard Grünwald, Wenling Wang, Yan Feng

Abstract:

The presented paper explores the changing dynamics of regional water security in the Mekong River Basin and examines the contemporary water-related challenges from a critical hydropolitical perspective. By drawing on the Lancang-Mekong Cooperation and Conflict Database (LMCCD) recording more than 3000 water-related events within the basin in the last 30 years, we identified several trends changing the dynamics of the regional water security in the Mekong River Basin. Firstly, there is growing politicization of water that is no longer interpreted as abundant. While some scientists blame the rapid basin development, particularly in upstream countries, other researchers consider climate change and cumulative environmental impacts of various water projects as the main culprit for changing the water flow. Secondly, there is an increasing securitization of large-scale hydropower dams with questionable outcomes. Despite hydropower dams raise many controversies, many riparian states push the development at all cost. Such water security dilemma can be especially traced to Laos and Cambodia, which highly invest in the hydropower sector even at the expense of the local environment and good relations with neighbouring countries situated lower on the river. Thirdly, there is a lack of accountable transboundary water governance that will effectively face a looming water crisis. To date, most of the existing cooperation mechanisms are undermined by the geopolitical interests of foreign donors and increasing mistrust to scientific approaches dealing with water insecurity. Our findings are beneficial for the policy-makers and other water experts who want to grasp the broader hydropolitical context in the Mekong River Basin and better understand the new water security threats, including misinterpretation of the hydrological data and legitimization of the pro-development narratives.

Keywords: critical hydropolitics, mekong river, politicization of science, water governance, water security

Procedia PDF Downloads 197
4473 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 165
4472 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 203
4471 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 153
4470 Family Planning Use among Women Living with HIV in Malawi: Analysis from Malawi DHS-2010 Data

Authors: Dereje Habte, Jane Namasasu

Abstract:

Background: The aim of the analysis was to assess the practice of family planning (FP) among HIV-infected women and the influence of women’s awareness of HIV-positive status in the practice of FP. Methods: The analysis was made among 489 non-pregnant, sexually active, fecund women living with HIV. Result: Of the 489 confirmed HIV positive women, 184 (37.6%) reported that they knew they are HIV positive. The number of women with current use and unmet need of any family planning method were found to be 251 (51.2%) and 107 (21.9%) respectively. Women’s knowledge of HIV-positive status (AOR: 2.32(1.54,3.50)), secondary and above education (AOR: 2.36(1.16,4.78)), presence of 3-4 (AOR: 2.60(1.08,6.28)) and more than four alive children (AOR: 3.03(1.18,7.82)) were significantly associated with current use of family planning. Conclusion: Women’s awareness of HIV-positive status was found to significantly predict family planning practice among women living with HIV.

Keywords: family planning, HIV, Malawi, women

Procedia PDF Downloads 583
4469 Post-harvest Handling Practices and Technologies Harnessed by Smallholder Fruit Crop Farmers in Vhembe District, Limpopo Province, South Africa

Authors: Vhahangwele Belemu, Isaac Busayo Oluwatayo

Abstract:

Post-harvest losses pose a serious challenge to smallholder fruit crop farmers, especially in the rural communities of South Africa, affecting their economic livelihoods and food security. This study investigated the post-harvest handling practices and technologies harnessed by smallholder fruit crop farmers in the Vhembe district of Limpopo province, South Africa. Data were collected on a random sample of 224 smallholder fruit crop farmers selected from the four municipalities of the district using a multistage sampling technique. Analytical tools employed include descriptive statistics and the tobit regression model. A descriptive analysis of farmers’ socioeconomic characteristics showed that a sizeable number of these farmers are still in their active working age (mean = 52 years) with more males (63.8%) than their female (36.2%) counterparts. Respondents’ distribution by educational status revealed that only a few of these had no formal education (2.2%), with the majority having secondary education (48.7%). Results of data analysis further revealed that the prominent post-harvest technologies and handling practices harnessed by these farmers include using appropriate harvesting techniques (20.5%), selling at a reduced price (19.6%), transportation consideration (18.3%), cleaning and disinfecting (17.9%), sorting and grading (16.5%), manual cleaning (15.6%) and packaging technique (11.6%) among others. The result of the Tobit regression analysis conducted to examine the determinants of post-harvest technologies and handling practices harnessed showed that age, educational status of respondents, awareness of technology/handling practices, farm size, access to credit, extension contact, and membership of association were the significant factors. The study suggests enhanced awareness creation, access to credit facility and improved access to market as important factors to consider by relevant stakeholders to assist smallholder fruit crop farmers in the study area.

Keywords: fruit crop farmers, handling practices, post harvest losses, smallholder, Vhembe District, South Africa

Procedia PDF Downloads 43
4468 Organic Agriculture in Pakistan: Opportunities, Challenges, and Future Directions

Authors: Sher Ali

Abstract:

Organic agriculture has gained significant momentum globally as a sustainable and environmentally friendly farming practice. In Pakistan, amidst growing concerns about food security, environmental degradation, and health issues related to conventional farming methods, the adoption of organic agriculture presents a promising pathway for agricultural development. This abstract aims to provide an overview of the status, opportunities, challenges, and future directions of organic agriculture in Pakistan. It delves into the current state of organic farming practices, including the extent of adoption, key crops cultivated, and the regulatory framework governing organic certification. Furthermore, the abstract discusses the unique opportunities that Pakistan offers for organic agriculture, such as its diverse agro-climatic zones, rich biodiversity, and traditional farming knowledge. It highlights successful initiatives and case studies that showcase the potential of organic farming to improve rural livelihoods, enhance food security, and promote sustainable agricultural practices. However, the abstract also addresses the challenges hindering the widespread adoption of organic agriculture in Pakistan, ranging from limited awareness and technical know-how among farmers to inadequate infrastructure and market linkages. It emphasizes the need for supportive policies, capacity-building programs, and investment in research and extension services to overcome these challenges and promote the growth of the organic agriculture sector. Lastly, the abstract outlines future directions and recommendations for advancing organic agriculture in Pakistan, including strategies for scaling up production, strengthening certification mechanisms, and fostering collaboration among stakeholders. By shedding light on the opportunities, challenges, and potential of organic agriculture in Pakistan, this abstract aims to contribute to the discourse on sustainable farming practices at the upcoming Agro Conference in the USA. It invites participants to engage in dialogue, share experiences, and explore avenues for collaboration toward promoting organic agriculture for a healthier, more resilient food system.

Keywords: agriculture, challenges, organic, Pakistan

Procedia PDF Downloads 21
4467 The Fadama Initiative: Implications for Human Security and Sustainable Development in Nigeria

Authors: Albert T. Akume, Yahya M. Abdullahi

Abstract:

The impact of poverty on individual and society is grave, hence the efforts by the government to eradicate or alleviate. In Nigeria the various efforts to reduce rural poverty by empowering them and making the process of their development self-sustaining have ended dismally. That notwithstanding, government determination to conquer poverty has not diminish as in the early 1990s the government with financial collaboration from the World Bank and African Development Bank introduced the fadama project. It is against this backdrop that this paper uses the documentary and analytical research methods to examine the implication the fadama development project has for community capacity development and human security in Nigeria. From the analysis it was discovered the fadama project improved household income of fadama farmers, community empowerment, participatory development planning and support for demand driven productive investment in farm and non-farm activities including community infrastructures. Despite this impressive result the fadama project is challenged by conflict especially in northern Nigeria and late delivery of necessary farm consumables that aid improved productivity. It was therefore recommended that the government should strengthen her various state security institutions to proactively mitigate conflicts and to ensure that farm consumables and other support services reach farmers timely.

Keywords: capacity development, empowerment, fadama, human security, poverty reduction, theory of change, sustainable development

Procedia PDF Downloads 464
4466 Instructional Leadership, Information and Communications Technology Competencies and Performance of Basic Education Teachers

Authors: Jay Martin L. Dionaldo

Abstract:

This study aimed to develop a causal model on the performance of the basic education teachers in the Division of Malaybalay City for the school year 2018-2019. This study used the responses of 300 randomly selected basic education teachers of Malaybalay City, Bukidnon. They responded to the three sets of questionnaires patterned from the National Education Association (2018) on instructional leadership of teachers, the questionnaire of Caluza et al., (2017) for information and communications technology competencies and the questionnaire on the teachers’ performance using the Individual Performance Commitment and Review Form (IPCRF) adopted by the Department of Education (DepEd). Descriptive statistics such as mean for the description, correlation for a relationship, regression for the extent influence, and path analysis for the model that best fits teachers’ performance were used. Result showed that basic education teachers have a very satisfactory level of performance. Also, the teachers highly practice instructional leadership practices in terms of coaching and mentoring, facilitating collaborative relationships, and community awareness and engagement. On the other hand, they are proficient users of ICT in terms of technology operations and concepts and basic users in terms of their pedagogical indicators. Furthermore, instructional leadership, coaching and mentoring, facilitating collaborative relationships and community awareness and engagement and information and communications technology competencies; technology operations and concept and pedagogy were significantly correlated toward teachers’ performance. Coaching and mentoring, community awareness and engagement, and technology operations and concept were the best predictors of teachers’ performance. The model that best fit teachers’ performance is anchored on coaching and mentoring of the teachers, embedded with facilitating collaborative relationships, community awareness, and engagement, technology operations, and concepts, and pedagogy.

Keywords: information and communications technology, instructional leadership, coaching and mentoring, collaborative relationship

Procedia PDF Downloads 99
4465 Strengthening the Security of the Thai-Myanmar Border Trade of the People in the Mae Sot Customs Checkpoint Area, Tak Province

Authors: Sakapas Saengchai

Abstract:

A Study on Strengthening the Security of the Thai-Myanmar Border Trade Area of the people in the Mae Sot customs checkpoint area, Tak province, was designed as a qualitative research study. Its objectives were to study the principles of strengthening border trade security and enhancing people's participation. To develop a border trade model that enhances the spatial economy and improves people's quality of life by collecting data using a participant observation method. In-depth interview group chats border checkpoint administrators, Mae Sot customs checkpoint, Tak province, private entrepreneurs, community leaders, and the opening of a community forum to exchange opinions with people in the area. The results of the study found that 1. Security development is to promote crime reduction. Reduce drug trafficking problems Smuggling and human trafficking have been reduced. Including planning and preparation to protect people from terrorism, epidemics, and communicable diseases, including cooperation with Burma on border rules for people and workers, 2. Wealth development is to promote investment. Transport links value chain logistics Cross-border goods and services on the Thai-Myanmar border Both amending regulations and laws to promote fair trade. Emphasis on convenient and fast service as well as promoting the Thai border area to be a tourist attraction that can create prosperity and income for the community in the area By using balanced natural resources, with production and consumption that are environmentally friendly, and emphasizes the participation of the public sector, the private sector, and people from all sectors in the sustainable development of the Thai border.

Keywords: security, border trade, customs, participation, people

Procedia PDF Downloads 157
4464 Energy Security and Sustainable Development: Challenges and Prospects

Authors: Abhimanyu Behera

Abstract:

Over the past few years, energy security and sustainable development have moved rapidly into the global agenda. There are two main reasons: first, the impact of high and often volatile energy prices; second, concerns over environmental sustainability particularly about the global climate. Both issues are critically important in which impressive economic growth has boosted the demand for energy and put corresponding strains on the environment. Energy security is a broad concept that focuses on energy availability and pricing. Specifically, it refers to the ability of the energy supply system i.e. suppliers, transporters, distributors and regulatory, financial and R&D institutions to deliver the amount of competitively priced energy that customers demand, within accepted standards of reliability, timeliness, quality, safety. Traditionally, energy security has been defined in the context of the geopolitical risks to external oil supplies but today it is encompassing all energy forms, all the external and internal links bringing the energy to the final consumer, and all the many ways energy supplies can be disrupted including equipment malfunctions, system design flaws, operator errors, malicious computer activities, deficient market and regulatory frameworks, corporate financial problems, labour actions, severe weather and natural events, aggressive acts (e.g. war, terrorism and sabotage), and geopolitical disruptions. In practice, the most challenging disruptions are those linked to: 1) extreme weather events; 2) mismatched electricity supply and demand; 3) regulatory failures; and 4) concentration of oil and gas resources in certain regions of the world. However, insecure energy supplies inhibit development by raising energy costs and imposing expensive cuts in services when disruptions actually occur. The energy supply sector can best advance sustainable development by producing and delivering secure and environmentally-friendly sources of energy and by increasing the efficiency of energy use. With this objective, this paper seeks to highlight the significance of energy security and sustainable development in today’s world. Moreover, it critically overhauls the major challenges towards sustainability of energy security and what are the major policies are taken to overcome these challenges by Government is lucidly explicated in this paper.

Keywords: energy, policies, security, sustainability

Procedia PDF Downloads 367
4463 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 133
4462 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 23
4461 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 349
4460 Brazilian Public Security: Governability and Constitutional Change

Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari

Abstract:

Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.

Keywords: public security, governability, rule of law, federalism

Procedia PDF Downloads 656
4459 The Role Played by Awareness and Complexity through the Use of a Logistic Regression Analysis

Authors: Yari Vecchio, Margherita Masi, Jorgelina Di Pasquale

Abstract:

Adoption of Precision Agriculture (PA) is involved in a multidimensional and complex scenario. The process of adopting innovations is complex and social inherently, influenced by other producers, change agents, social norms and organizational pressure. Complexity depends on factors that interact and influence the decision to adopt. Farm and operator characteristics, as well as organizational, informational and agro-ecological context directly affect adoption. This influence has been studied to measure drivers and to clarify 'bottlenecks' of the adoption of agricultural innovation. Making decision process involves a multistage procedure, in which individual passes from first hearing about the technology to final adoption. Awareness is the initial stage and represents the moment in which an individual learns about the existence of the technology. 'Static' concept of adoption has been overcome. Awareness is a precondition to adoption. This condition leads to not encountering some erroneous evaluations, arose from having carried out analysis on a population that is only in part aware of technologies. In support of this, the present study puts forward an empirical analysis among Italian farmers, considering awareness as a prerequisite for adoption. The purpose of the present work is to analyze both factors that affect the probability to adopt and determinants that drive an aware individual to not adopt. Data were collected through a questionnaire submitted in November 2017. A preliminary descriptive analysis has shown that high levels of adoption have been found among younger farmers, better educated, with high intensity of information, with large farm size and high labor-intensive, and whose perception of the complexity of adoption process is lower. The use of a logit model permits to appreciate the weight played by the intensity of labor and complexity perceived by the potential adopter in PA adoption process. All these findings suggest important policy implications: measures dedicated to promoting innovation will need to be more specific for each phase of this adoption process. Specifically, they should increase awareness of PA tools and foster dissemination of information to reduce the degree of perceived complexity of the adoption process. These implications are particularly important in Europe where is pre-announced the reform of Common Agricultural Policy, oriented to innovation. In this context, these implications suggest to the measures supporting innovation to consider the relationship between various organizational and structural dimensions of European agriculture and innovation approaches.

Keywords: adoption, awareness, complexity, precision agriculture

Procedia PDF Downloads 122
4458 Environmental Sustainability in Sport: A Review of Current Efforts and Initiatives

Authors: Maryam Mehrabpour

Abstract:

The sports industry has recognized its impact on the natural environment and has taken steps to address relevant environmental issues. Two key initiatives have emerged: reducing the ecological footprint of sports activities and utilizing sports as a platform to raise environmental awareness. This article provides an overview of the scholarly research conducted on environmental sustainability in sports. It highlights various environmental programs implemented by sports organizations worldwide and examines the current state of environmental efforts in the field. The research utilized semi-structured interviews, website analysis, and published documents as data sources, and qualitative analysis methods were employed to identify themes representing the current status of environmental efforts in sports.

Keywords: environmental sustainability, sport industry, ecological footprint, environmental awareness, environmental programs

Procedia PDF Downloads 71
4457 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 247
4456 Signs, Signals and Syndromes: Algorithmic Surveillance and Global Health Security in the 21st Century

Authors: Stephen L. Roberts

Abstract:

This article offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The article traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This article demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This article argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the article also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this article demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice of global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.

Keywords: algorithms, global health, pandemic, surveillance

Procedia PDF Downloads 165
4455 Women and Food Security: Evidence from Bangladesh Demographic Health Survey 2011

Authors: Abdullah Al. Morshed, Mohammad Nahid Mia

Abstract:

Introduction: Food security refers to the availability of food and a person’s access to it. It is a complex sustainable development issue, which is closely related to under-nutrition. Food security, in turn, can widely affect the living standard, and is rooted in poverty and leads to poor health, low productivity, low income, food shortage, and hunger. The study's aim was to identify the most vulnerable women who are in insecure positions. Method: 17,842 married women were selected for analysis from the Bangladesh Demographic and Health Survey 2011. Food security defined as dichotomous variables of skipped meals and eaten less food at least once in the last year. The outcome variables were cross-tabulated with women's socio-demographic characteristics and chi2 test was applied to see the significance. Logistic regression models were applied to identify the most vulnerable groups in terms of food security. Result: Only 18.5% of women said that they ever had to skip meals in the last year. 45.7% women from low socioeconomic status had skip meal for at least once whereas only 3.6% were from women with highest socioeconomic status. Women meal skipping was ranged from 1.4% to 34.2% by their educational status. 22% of women were eaten less food during the last year. The rate was higher among the poorest (51.6%), illiterate (39.9%) and household have no electricity connection (38.1) in compared with richest (4.4%), higher educated (2.0%), and household has electricity connection (14.0%). The logistic regression analysis indicated that household socioeconomic status, and women education show strong gradients to skip meals. Poorest have had higher odds (20.9) than richest and illiterate women had 7.7 higher odds than higher educated. In terms of religion, Christianity was 2.3 times more likely to skip their meals than Islam. On the other hand, a similar trend was observed in our other outcome variable eat less food. Conclusion: In this study we able to identify women with lower economics status and women with no education were mostly suffered group from starvation.

Keywords: food security, hunger, under-nutrition, women

Procedia PDF Downloads 360
4454 AI-Assisted Business Chinese Writing: Comparing the Textual Performances Between Independent Writing and Collaborative Writing

Authors: Stephanie Liu Lu

Abstract:

With the proliferation of artificial intelligence tools in the field of education, it is crucial to explore their impact on language learning outcomes. This paper examines the use of AI tools, such as ChatGPT, in practical writing within business Chinese teaching to investigate how AI can enhance practical writing skills and teaching effectiveness. The study involved third and fourth-year university students majoring in accounting and finance from a university in Hong Kong within the context of a business correspondence writing class. Students were randomly assigned to a control group, who completed business letter writing independently, and an experimental group, who completed the writing with the assistance of AI. In the latter, the AI-assisted business letters were initially drafted by the students issuing commands and interacting with the AI tool, followed by the students' revisions of the draft. The paper assesses the performance of both groups in terms of grammatical expression, communicative effect, and situational awareness. Additionally, the study collected dialogue texts from interactions between students and the AI tool to explore factors that affect text generation and the potential impact of AI on enhancing students' communicative and identity awareness. By collecting and comparing textual performances, it was found that students assisted by AI showed better situational awareness, as well as more skilled organization and grammar. However, the research also revealed that AI-generated articles frequently lacked a proper balance of identity and writing purpose due to limitations in students' communicative awareness and expression during the instruction and interaction process. Furthermore, the revision of drafts also tested the students' linguistic foundation, logical thinking abilities, and practical workplace experience. Therefore, integrating AI tools and related teaching into the curriculum is key to the future of business Chinese teaching.

Keywords: AI-assistance, business Chinese, textual analysis, language education

Procedia PDF Downloads 42
4453 AMBICOM: An Ambient Computing Middleware Architecture for Heterogeneous Environments

Authors: Ekrem Aksoy, Nihat Adar, Selçuk Canbek

Abstract:

Ambient Computing or Ambient Intelligence (AmI) is emerging area in computer science aiming to create intelligently connected environments and Internet of Things. In this paper, we propose communication middleware architecture for AmI. This middleware architecture addresses problems of communication, networking, and abstraction of applications, although there are other aspects (e.g. HCI and Security) within general AmI framework. Within this middleware architecture, any application developer might address HCI and Security issues with extensibility features of this platform.

Keywords: AmI, ambient computing, middleware, distributed-systems, software-defined networking

Procedia PDF Downloads 262
4452 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 364
4451 Addressing Urban Security Challenges in Nigeria through Neighborhood Renewal: A Reflection of Mokola World Bank Slum Upgrading Pilot Project

Authors: Tabiti S. Tabiti, A. M. Jinadu, Daramola Japheth

Abstract:

Urban insecurity is among the challenges militating against sustainable urban governance; in the first place it distorts the peace of urban areas making them unsafe. On the other hand it hinders the effective performance of urban functions. Urban security challenges manifest in different forms such as, street violence, theft and robbery, accidents of different types kidnapping, killings etc.. Efforts to address urban security challenges in Nigeria have been concentrated in legislative, law enforcement and the use of community vigilante groups. However in this study, the place of physical planning strategy through effective neighbourhood renewal as practiced in Mokola is presented as an effective complementary approach for addressing urban insecurity. On this backdrop, the paper recommends the need for gradual rehabilitation of urban slum neighborhoods by the state government in collaboration with World Bank and other development financiers. The local governments should be made autonomy in Nigeria so as to make them more responsible to the people. Other recommendations suggested in the paper include creating enabling environment that will promote economic empowerment and public enlightment on personal and community sanitation. It is certain that if these recommendations are adopted the challenge of urban insecurity will reduce significantly in Nigerian cities.

Keywords: neighbourhood renewal, pilot project, slum upgrading, urban security

Procedia PDF Downloads 425
4450 Mobile Payment over NFC: The M-Check System Case

Authors: Karima Maazouz, Habib Benlahmer, Naceur Achtaich

Abstract:

The realization of mobile payments will make possible new and unforeseen ways of convenience and m-commerce. Mobile payment today benefit from technology and trends. NFC technology is creating a new era of contactless mobile payment. the “M-check” is a mobile payment system provides a new way facilitating transaction with high valued payment and enable new m-commerce. The objective of the paper is to propose a new solution for m-payment. The proposed combination of m-check system and NFC offers acceptable security for payment mobile, client’s satisfaction, and simplifies the process payment between clients and merchants.

Keywords: M-payment, NFC, M-check, M-commerce, security

Procedia PDF Downloads 577
4449 Open Education Resources a Gateway for Accessing Hospitality and Tourism Learning Materials

Authors: Isiya Shinkafi Salihu

Abstract:

Open education resources (OER) are open learning materials in different formats, course content and context to support learning globally. This study investigated the level of awareness of Hospitality and Tourism OER among students in the Department of Tourism and Hotel Management in a University. Specifically, it investigated students’ awareness, use and accessibility of OER in learning. The research design method used was the quantitative approach, using an online questionnaire. The thesis research shows that respondents frequently use OER but with little knowledge of the content and context of the material. Most of the respondents’ have little knowledge about the concept even though they use it. Information and communication technologies are tools for information gathering, social networking and knowledge sharing and transfer. OER are open education materials accessible online such as curriculum, maps, course materials, and videos that users create, adapt, reuse for learning and research. Few of the respondents that used OER in learning faced some challenges such as high cost of data, poor connectivity and lack of proper guidance. The results suggest a lack of awareness of OER among students in the faculty of tourism and the need for support from the teachers in the utilization of OER. The thesis also reveals that some of the international students are accessing the internet as beginners in their studies which require guidance. The research, however, recommends that further studies should be conducted to other faculties.

Keywords: creative commons, open education resources, open licenses, information and communication technology

Procedia PDF Downloads 164
4448 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions

Authors: Siddharth Krishnaswamy

Abstract:

Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.

Keywords: analysis, food security indicators, response, resilience analysis

Procedia PDF Downloads 314
4447 Inclusive Business and Its Contribution to Farmers Wellbeing in Arsi Ethiopia: Empirical Evidence

Authors: Senait G. Worku, Ellen Mangnus

Abstract:

Inclusive business models which integrates low-income people with companies value chain in a commercially viable way has gained momentum for the perceived potential to contribute to poverty alleviation and food security in developing countries. This article investigates the impact of Community Revenue Enhancement through Technology Extension (CREATE) project of Heineken brewery on smallholder farmers’ wellbeing in Arsi zone Oromia regional state of Ethiopia. CREATE is a Public-Private Partnership (PPP) between Ministry of Foreign Affairs of the Netherlands and Heineken N.V. which source malt barely from smallholder farmers in three zones of Oromia. The study assessed the impact of CREATE on malt barley productivity, food security and new asset purchase in Arsi zone by comparing households that participate in the project with non-participating households using propensity score matching method. The finding indicated that households that participated in the CREATE project had higher malt barley productivity and purchased more new assets than non-participating households. However, there is no significant difference on food security status of participating and non-participating households indicating that the project has a profound impact on asset accumulation than on food security improvement.

Keywords: inclusive business, malt barley, propensity score matching, wellbeing

Procedia PDF Downloads 133
4446 Password Cracking on Graphics Processing Unit Based Systems

Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik

Abstract:

Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.

Keywords: GPGPU, password cracking, secret key, user authentication

Procedia PDF Downloads 265