Search results for: energy security policy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14125

Search results for: energy security policy

13405 Application of PSK Modulation in ADS-B 1090 Extended Squitter Authentication

Authors: A-Q. Nguyen. A. Amrhar, J. Zambrano, G. Brown, O.A. Yeste-Ojeda, R. Jr. Landry

Abstract:

Since the presence of Next Generation Air Transportation System (NextGen), Automatic Dependent Surveillance-Broadcast (ADS-B) has raised specific concerns related to the privacy and security, due to its vulnerable, low-level of security and limited payload. In this paper, the authors introduce and analyze the combination of Pulse Amplitude Modulation (PAM) and Phase Shift Keying (PSK) Modulation in conventional ADS-B, forming Secure ADS-B (SADS-B) avionics. In order to demonstrate the potential of this combination, Hardware-in-the-loop (HIL) simulation was used. The tests' results show that, on the one hand, SADS-B can offer five times the payload as its predecessor. This additional payload of SADS-B can be used in various applications, therefore enhancing the ability and efficiency of the current ADS-B. On the other hand, by using the extra phase modulated bits as a digital signature to authenticate ADS-B messages, SADS-B can increase the security of ADS-B, thus ensure a more secure aviation as well. More importantly, SADS-B is compatible with the current ADS-B In and Out. Hence, no significant modifications will be needed to implement this idea. As a result, SADS-B can be considered the most promising approach to enhance the capability and security of ADS-B.

Keywords: ADS-B authentication, ADS-B security, NextGen ADS-B, PSK signature, secure ADS-B

Procedia PDF Downloads 319
13404 Sustaining Efficiency in Electricity Distribution to Enhance Effective Human Security for the Vulnerable People in Ghana

Authors: Anthony Nyamekeh-Armah Adjei, Toshiaki Aoki

Abstract:

The unreliable and poor efficiency of electricity distribution leading to frequent power outages and high losses are the major challenge facing the power distribution sector in Ghana. Distribution system routes electricity from the power generating station at a higher voltage through the transmission grid and steps it down through the low voltage lines to end users. Approximately all electricity problems and disturbances that have increased the call for renewable and sustainable energy in recent years have their roots in the distribution system. Therefore, sustaining electricity distribution efficiency can potentially contribute to the reserve of natural energy resources use in power generation, reducing greenhouse gas emission (GHG), decreasing tariffs for consumers and effective human security. Human Security is a people-centered approach where individual human being is the principal object of concern, focuses on protecting the vital core of all human lives in ways for meeting basic needs that enhance the safety and protection of individuals and communities. The vulnerability is the diminished capacity of an individual or group to anticipate, resist and recover from the effect of natural, human-induced disaster. The research objectives are to explore the causes of frequent power outages to consumers, high losses in the distribution network and the effect of poor electricity distribution efficiency on the vulnerable (poor and ordinary) people that mostly depend on electricity for their daily activities or life to survive. The importance of the study is that in a developing country like Ghana where raising a capital for new infrastructure project is difficult, it would be beneficial to enhance the efficiency that will significantly minimize the high energy losses, reduce power outage, to ensure safe and reliable delivery of electric power to consumers to secure the security of people’s livelihood. The methodology used in this study is both interview and questionnaire survey to analyze the response from the respondents on causes of power outages and high losses facing the electricity company of Ghana (ECG) and its effect on the livelihood on the vulnerable people. Among the outcome of both administered questionnaire and the interview survey from the field were; poor maintenance of existing sub-stations, use of aging equipment, use of poor distribution infrastructure and poor metering and billing system. The main observation of this paper is that the poor network efficiency (high losses and power outages) affects the livelihood of the vulnerable people. Therefore, the paper recommends that policymakers should insist on all regulation guiding electricity distribution to improve system efficiency. In conclusion, there should be decentralization of off-grid solar PV technologies to provide a sustainable and cost-effective, which can increase daily productivity and improve the quality of life of the vulnerable people in the rural communities.

Keywords: electricity efficiency, high losses, human security, power outage

Procedia PDF Downloads 286
13403 Illegal Migration and Refugee Crisis as a Threat to National Security, Economic and Social System: The Bulgarian Case

Authors: Jordan Deliversky

Abstract:

Unlike all conventional forms of migration, migration crisis and migratory processes provide pressure to governments and are being expressed as different phenomenon in relation to nature and forms. The objective of this paper is to present the migration and refugee crisis as revealing numerous challenges faced by authorities responsible for the social and economic stability in Bulgaria as well as those providing conditions for reinforcement of the high level of national security in Bulgaria. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, in the light of the measures provided by the Bulgarian state authorities. The main results show that the society itself is facing the challenge of integrating refugees and migrants, so to be able to comply with the principles and values associated with tolerance to social, religious and cultural differences, and not allowing migrants to become marginalized community. Migration pressure creates a number of risks and threats to the Bulgarian national security. Our country has the capacity and resources to meet these potential threats, as a main factor for minimizing the risks to national security is the improvement of coordination and coherence of actions between various actors serving to the security sector.

Keywords: legislation, migrants, refugees, security, terrorism

Procedia PDF Downloads 343
13402 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 362
13401 The Eco-Efficient Construction: A Review of Embodied Energy in Building Materials

Authors: Francesca Scalisi, Cesare Sposito

Abstract:

The building construction industry consumes a large amount of resources and energy, both during construction (embodied energy) and during the operational phase (operating energy). This paper presents a review of the literature on low carbon and low embodied energy materials in buildings. The embodied energy comprises the energy consumed during the extraction, processing, transportation, construction, and demolition of building materials. While designing a nearly zero energy building, it is necessary to choose and use materials, components, and technologies that allow to reduce the consumption of energy and also to reduce the emissions in the atmosphere during all the Life Cycle Assessment phases. The appropriate choice of building materials can contribute decisively to reduce the energy consumption of the building sector. The increasing worries for the environmental impact of construction materials are witnessed by a lot of studies. The mentioned worries have brought again the attention towards natural materials. The use of more sustainable construction materials and construction techniques represent a major contribution to the eco-efficiency of the construction industry and thus to a more sustainable development.

Keywords: embodied energy, embodied carbon, life cycle assessment, architecture, sustainability, material construction

Procedia PDF Downloads 343
13400 Energy Trends in Rural South Africa: A Case Study of the Mnweni Rural Community in the Province of Kwazulu-Natal

Authors: Noel Chellan

Abstract:

Energy is the life-blood of development. All human societies have been and still are dependent on energy – some societies more than others. With regard to energy in South Africa, previous policies of the apartheid regime neglected the energy needs of poor black communities in general – and rural communities in particular. Since South Africa’s first democratic elections in 1994 – whilst millions of South African households have received electricity from the national electricity grid, there are still many rural communities that are still experiencing challenges in relation to both electricity deprivation as well as provision. This paper looks at the energy-mix of the Mnweni rural community in South Africa and argues that understanding energy is key to understanding the nature and forms of development of any community or country, for that matter. The paper engages with the energy trends in the rural community of Mnweni from the days of apartheid until 2021. It also looks at agricultural practises from an energy perspective. Such an energy perspective will enable one to assess the pace and scale of development in rural Mnweni.

Keywords: rural, energy, development, apartheid

Procedia PDF Downloads 244
13399 Climate Change: Affecting Basic Human Rights in Bangladesh

Authors: Shekh Shadi Rahaman

Abstract:

In Bangladesh, basic human rights more specifically right to food and right to shelter are being adversely affected by the consequences of climate change. Over the last two decades, a considerable number of environmental studies revealed that basic human rights, more specifically, the right to food and right to a shelter are going to be seriously affected by climate change. Agriculture, forestry, and fisheries and livestock, which are most sensitive to climate change, are key sources interconnected with food security and the security of shelter. Consequences of climate change affecting these key sources, and with the change of time, climate change is turning into a gigantic challenge towards ensuring basic human rights in Bangladesh. This study was carried out by employing a general review of literature on climate change, focusing on effects of climate change on basic two major human rights in Bangladesh. Upon analysis of existing researches, it is found very few researches focused on correlating climate change and right to food and right to shelter. This study shows how the consequences of climate change affects food production and abode of people of Bangladesh. This study recommends that tree plantation, floating agricultural practice, co-operation with international organization, developing environment friendly institutions, increased use of renewable energy, proper management of wetlands and forests, shelter for climate induced migrated people, encouraging research and public awareness are key issues to be followed for combating climate change and protecting basic human right to food and shelter.

Keywords: achievements, agriculture and forestry, fisheries and livestock, renewable energy

Procedia PDF Downloads 135
13398 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro

Authors: Safwan Mawlood Hussien

Abstract:

Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.

Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro

Procedia PDF Downloads 119
13397 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 297
13396 Advantages and Disadvantages of Hydroelectric Energy

Authors: Esther Ushike Akashie

Abstract:

No matter who you are, where you are from and irrespective of age and gender, there is a universal need for power and energy. Every year, this need grows even more urgent the more scientific and technological inventions advance. Due to this fact, we find that majority of the research related to energy and power has been focused on finding new and innovative ways to produce power. Furthermore, we observe that because of the environmental state of our world today and the impact of climate change, one of the most explored routes of study has been the use of renewable energies. In this paper, we will be looking at one of the oldest forms of renewable energy, hydroelectric energy. First off, an overview of its history, sources, technical aspects, and applications will be evaluated. After which, we will then proceed to understand the main benefits and drawbacks of this form of renewable energy and offer insights on how it can be better utilized in our world today.

Keywords: hydropower, hydroelectric energy, advantages, disadvantages

Procedia PDF Downloads 143
13395 Solar-Powered Smart Irrigation System as an Adaptation Strategy under Climate Change: A Case Study to Develop Medicinal Security Based on Ancestral Knowledge

Authors: Luisa Cabezas, Karol Leal, Harold Mendoza, Fabio Trochez, Angel Lozada

Abstract:

According to the 2030 Agenda for Sustainable Development Goals (SDG) in which equal importance is given to economic, social, and environmental dimensions where the equality and dignity of each human person is placed at the center of discussion, changing the development concept for one with more responsibility with the environment. It can be found that the energy and food systems are deeply entangled, and they are transversal to the 17 proposed SDG. In this order of ideas, a research project is carried out at Unidad Central del Valle del Cauca (UCEVA) with these two systems in mind, on one hand the energy transition and, on the other hand the transformation of agri-food systems. This project it could be achieved by automation and control irrigation system of medicinal, aromatic, and condimentary plants (MACP) area within the UCEVA Agroecological Farm and located in rural area of Tulua municipality (Valle del Cauca Department, Colombia). This system have allowed to stablish a remote monitoring of MACP area, including MACP moisture measurement, and execute the required system actions. In addition, the electrical system of irrigation control system is powered by a scalable photovoltaic solar energy system based on its specifications. Thus, the developed system automates and control de irrigation system, which is energetically self-sustainable and allows to satisfy the MACP area requirements. Is important to highlight that at MACP area, several medicinal, aromatic, and condimentary plants species are preserved to become primary sources for the pharmaceutical industry and, in many occasions, the only medicines for many communities. Therefore, preserve medicinal plants area would generates medicinal security and preserve cultural heritage as these plants are part of ancestral knowledge that penetrate academic and research communities at UCEVA campus to other society sectors.

Keywords: ancestral knowledge, climate change, medicinal plants, solar energy

Procedia PDF Downloads 235
13394 Overview of Smart Grid Applications in Turkey

Authors: Onur Elma, Giray E. Kıral, Ugur S. Selamoğuları, Mehmet Uzunoğlu, Bulent Vural

Abstract:

Electrical energy has become indispensable for people's lives and with rapidly developing technology and continuously changing living standards the need for the electrical energy has been on the rise. Therefore, both energy generation and efficient use of energy are very important topics. Smart grid concept has been introduced to provide monitoring, energy efficiency, reliability and energy quality. Under smart grid concept, smart homes, which can be considered as key component in smart grid operation, have appeared as another research area. In this study, first, smart grid research in the world will be reviewed. Then, overview of smart grid applications in Turkey will be given.

Keywords: energy efficiency, smart grids, smart home, applications

Procedia PDF Downloads 497
13393 The Crisis in Ukraine and the End of the Post Cold War Security Delusions in Europe

Authors: Georgios Siachamis

Abstract:

The main objective of this paper is to examine how the crisis in Ukraine can change our perception and understanding of the strategic challenges in Europe. It will try also to address the main factors behind the beginning of the conflict in Ukraine, the miscalculations and mistakes that lead towards the escalation of the crisis and what constructive initiatives are needed to be taken in order to avoid further instability in the region. Furthermore, measures in order to develop a more stable relation with Russia are also going to be presented. Finally the implementation of a new strategic outlook for the EU is also going to be analysed.

Keywords: crisis management, European grand strategy, crisis in Ukraine, Russian policy

Procedia PDF Downloads 369
13392 Argentine Immigrant Policy: A Qualitative Analysis of Changes and Trends from 2016 on

Authors: Romeu Bonk Mesquita

Abstract:

Argentina is the South American number 1 country of destiny to intraregional migration flows. This research aims to shed light on the main trends of the Argentine immigrant policy from 2016 on, when Mauricio Marci was elected President, taking the approval of the current and fairly protective of human rights Ley de Migraciones (2003) as an analytical starting point. Foreign Policy Analysis (FPA) serves as the theoretical background, highlighting decision-making processes and institutional designs that encourage or constraint political and social actors. The analysis goes through domestic and international levels, observing how immigration policy is formulated as a public policy and is simultaneously connected to Mercosur and other international organizations, such as the International Organization for Migration (IOM) and the United Nations High Commissioner for Refugees (UNHCR). Thus, the study revolves around the Direccion Nacional de Migraciones, which is the state agency in charge of executing the country’s immigrant policy, as to comprehend how its internal processes and the connections it has with both domestic and international institutions shape Argentina’s immigrant policy formulation and execution. Also, it aims to locate the migration agenda within the country’s contemporary social and political context. The methodology is qualitative, case-based and oriented by process-tracing techniques. Empirical evidence gathered includes official documents and data, media coverage and interviews to key-informants. Recent events, such as the Decreto de Necesidad y Urgencia 70/2017 issued by President Macri, and the return of discursive association between migration and criminality, indicate a trend of nationalization and securitization of the immigration policy in contemporary Argentina.

Keywords: Argentine foreign policy, human rights, immigrant policy, Mercosur

Procedia PDF Downloads 166
13391 Uncertainty in Building Energy Performance Analysis at Different Stages of the Building’s Lifecycle

Authors: Elham Delzendeh, Song Wu, Mustafa Al-Adhami, Rima Alaaeddine

Abstract:

Over the last 15 years, prediction of energy consumption has become a common practice and necessity at different stages of the building’s lifecycle, particularly, at the design and post-occupancy stages for planning and maintenance purposes. This is due to the ever-growing response of governments to address sustainability and reduction of CO₂ emission in the building sector. However, there is a level of uncertainty in the estimation of energy consumption in buildings. The accuracy of energy consumption predictions is directly related to the precision of the initial inputs used in the energy assessment process. In this study, multiple cases of large non-residential buildings at design, construction, and post-occupancy stages are investigated. The energy consumption process and inputs, and the actual and predicted energy consumption of the cases are analysed. The findings of this study have pointed out and evidenced various parameters that cause uncertainty in the prediction of energy consumption in buildings such as modelling, location data, and occupant behaviour. In addition, unavailability and insufficiency of energy-consumption-related inputs at different stages of the building’s lifecycle are classified and categorized. Understanding the roots of uncertainty in building energy analysis will help energy modellers and energy simulation software developers reach more accurate energy consumption predictions in buildings.

Keywords: building lifecycle, efficiency, energy analysis, energy performance, uncertainty

Procedia PDF Downloads 137
13390 Feasibility Study of the Quadcopter Propeller Vibrations for the Energy Production

Authors: Nneka Osuchukwu, Leonid Shpanin

Abstract:

The concept of converting the kinetic energy of quadcopter propellers into electrical energy is considered in this contribution following the feasibility study of the propeller vibrations, theoretical energy conversion, and simulation techniques. Analysis of the propeller vibration performance is presented via graphical representation of calculated and simulated parameters, in order to demonstrate the possibility of recovering the harvested energy from the propeller vibrations of the quadcopter while the quadcopter is in operation. Consideration of using piezoelectric materials in such concept, converting the mechanical energy of the propeller into the electrical energy, is given. Photographic evidence of the propeller in operation is presented and discussed together with experimental results to validate the theoretical concept.

Keywords: energy harvesting, piezoelectric material, propeller vibration, unmanned aerial vehicle

Procedia PDF Downloads 473
13389 The Metabolism of Built Environment: Energy Flow and Greenhouse Gas Emissions in Nigeria

Authors: Yusuf U. Datti

Abstract:

It is becoming increasingly clear that the consumption of resources now enjoyed in the developed nations will be impossible to be sustained worldwide. While developing countries still have the advantage of low consumption and a smaller ecological footprint per person, they cannot simply develop in the same way as other western cities have developed in the past. The severe reality of population and consumption inequalities makes it contentious whether studies done in developed countries can be translated and applied to developing countries. Additional to this disparities, there are few or no metabolism of energy studies in Nigeria. Rather more contentious majority of energy metabolism studies have been done only in developed countries. While researches in Nigeria concentrate on other aspects/principles of sustainability such as water supply, sewage disposal, energy supply, energy efficiency, waste disposal, etc., which will not accurately capture the environmental impact of energy flow in Nigeria, this research will set itself apart by examining the flow of energy in Nigeria and the impact that the flow will have on the environment. The aim of the study is to examine and quantify the metabolic flows of energy in Nigeria and its corresponding environmental impact. The study will quantify the level and pattern of energy inflow and the outflow of greenhouse emissions in Nigeria. This study will describe measures to address the impact of existing energy sources and suggest alternative renewable energy sources in Nigeria that will lower the emission of greenhouse gas emissions. This study will investigate the metabolism of energy in Nigeria through a three-part methodology. The first step involved selecting and defining the study area and some variables that would affect the output of the energy (time of the year, stability of the country, income level, literacy rate and population). The second step involves analyzing, categorizing and quantifying the amount of energy generated by the various energy sources in the country. The third step involves analyzing what effect the variables would have on the environment. To ensure a representative sample of the study area, Africa’s most populous country, with economy that is the second biggest and that is among the top largest oil producing countries in the world is selected. This is due to the understanding that countries with large economy and dense populations are ideal places to examine sustainability strategies; hence, the choice of Nigeria for the study. National data will be utilized unless where such data cannot be found, then local data will be employed which will be aggregated to reflect the national situation. The outcome of the study will help policy-makers better target energy conservation and efficiency programs and enables early identification and mitigation of any negative effects in the environment.

Keywords: built environment, energy metabolism, environmental impact, greenhouse gas emissions and sustainability

Procedia PDF Downloads 183
13388 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security

Authors: Yael Deutsch, Arieh Gavious

Abstract:

The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.

Keywords: game theory, profiling, security, nash equilibrium

Procedia PDF Downloads 109
13387 Aligning the Sustainability Policy Areas for Decarbonisation and Value Addition at an Organisational Level

Authors: Bishal Baniya

Abstract:

This paper proposes the sustainability related policy areas for decarbonisation and value addition at an organizational level. General and public sector organizations around the world are usually significant in terms of consuming resources and producing waste – powered through their massive procurement capacity. However, these organizations also possess huge potential to cut resource use and emission as many of these organizations controls supply chain of goods/services. They can therefore be a trend setter and can easily lead other major economic sectors such as manufacturing, construction and mining, transportation, etc. in pursuit towards paradigm shift for sustainability. Whilst the environmental and social awareness has improved in recent years and they have identified policy areas to improve the organizational environmental performance, value addition to the core business of the organization hasn’t been understood and interpreted correctly. This paper therefore investigates ways to align sustainability policy measures in a way that it creates better value proposition relative to benchmark by accounting both eco and social efficiency. Preliminary analysis shows co-benefits other than resource and cost savings fosters the business cases for organizations and this can be achieved by better aligning the policy measures and engaging stakeholders.

Keywords: policy measures, environmental performance, value proposition, organisational level

Procedia PDF Downloads 150
13386 Cyber Security Situational Awareness among Students: A Case Study in Malaysia

Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa

Abstract:

This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.

Keywords: cyber security awareness, cyber security education, cyber security, school students

Procedia PDF Downloads 302
13385 A Comparative Study of Dividend Policy and Share Price across the South Asian Countries

Authors: Anwar Hussain, Ahmed Imran, Farida Faisal, Fatima Sultana

Abstract:

The present research evaluates a comparative assessment of dividend policy and share price across the South Asian countries including Pakistan, India and Sri-Lanka over the period of 2010 to 2014. Academic writers found that dividend policy and share price relationship is not same in south Asian market due to different reasons. Moreover, Panel Models used = for the evaluation of current study. In addition, Redundant fixed effect Likelihood and Hausman test used for determine of Common, Fixed and Random effect model. Therefore Indian market dividend policies play a fundamental role and significant impact on Market Share Prices. Although, present research found that different as compared to previous study that dividend policy have no impact on share price in Sri-Lanka and Pakistan.

Keywords: dividend policy, share price, South Asian countries, panel data analysis, theories and parameters of dividend

Procedia PDF Downloads 323
13384 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 358
13383 An Institutional Mapping and Stakeholder Analysis of ASEAN’s Preparedness for Nuclear Power Disaster

Authors: Nur Azha Putra Abdul Azim, Denise Cheong, S. Nivedita

Abstract:

Currently, there are no nuclear power reactors among the Association of Southeast Asian Nations (ASEAN) member states (AMS) but there are seven operational nuclear research reactors, and Indonesia is about to construct the region’s first experimental power reactor by the end of the decade. If successful, the experimental power reactor will lay the foundation for the country’s and region’s first nuclear power plant. Despite projecting confidence during the period of nuclear power renaissance in the region in the last decade, none of the AMS has committed to a political decision on the use of nuclear energy and this is largely due to the Fukushima nuclear power accident in 2011. Of the ten AMS, Vietnam, Indonesia and Malaysia have demonstrated the most progress in developing nuclear energy based on the nuclear power infrastructure development assessments made by the International Atomic Energy Agency. Of these three states, Vietnam came closest to building its first nuclear power plant but decided to delay construction further due to safety and security concerns. Meanwhile, Vietnam along with Indonesia and Malaysia continue with their nuclear power infrastructure development and the remaining SEA states, with the exception of Brunei and Singapore, continue to build their expertise and capacity for nuclear power energy. At the current rate of progress, Indonesia is expected to make a national decision on the use of nuclear power by 2023 while Malaysia, the Philippines, and Thailand have included the use of nuclear power in their mid to long-term power development plans. Vietnam remains open to nuclear power but has not placed a timeline. The medium to short-term power development projection in the region suggests that the use of nuclear energy in the region is a matter of 'when' rather than 'if'. In lieu of the prospects for nuclear energy in Southeast Asia (SEA), this presentation will review the literature on ASEAN radiological emergency and preparedness response (EPR) plans and examine ASEAN’s disaster management and emergency framework. Through a combination of institutional mapping and stakeholder analysis methods, which we examine in the context of the international EPR, and nuclear safety and security regimes, we will identify the issues and challenges in developing a regional radiological EPR framework in the SEA. We will conclude with the observation that ASEAN faces serious structural, institutional and governance challenges due to the AMS inherent political structures and history of interstate conflicts, and propose that ASEAN should either enlarge the existing scope of its disaster management and response framework or that its radiological EPR framework should exist as a separate entity.

Keywords: nuclear power, nuclear accident, ASEAN, Southeast Asia

Procedia PDF Downloads 152
13382 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments

Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka

Abstract:

Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.

Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance

Procedia PDF Downloads 51
13381 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism

Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe

Abstract:

National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.

Keywords: counter-terrorism, discourse, Nigeria, security, terrorism

Procedia PDF Downloads 486
13380 The Securitization of the European Migrant Crisis (2015-2016): Applying the Insights of the Copenhagen School of Security Studies to a Comparative Analysis of Refugee Policies in Bulgaria and Hungary

Authors: Tatiana Rizova

Abstract:

The migrant crisis, which peaked in 2015-2016, posed an unprecedented challenge to the European Union’s (EU) newest member states, including Bulgaria and Hungary. Their governments had to formulate sound migration policies with expediency and sensitivity to the needs of millions of people fleeing violent conflicts in the Middle East and failed states in North Africa. Political leaders in post-communist countries had to carefully coordinate with other EU member states on joint policies and solutions while minimizing the risk of alienating their increasingly anti-migrant domestic constituents. Post-communist member states’ governments chose distinct policy responses to the crisis, which were dictated by factors such as their governments’ partisan stances on migration, their views of the European Union, and the decision to frame the crisis as a security or a humanitarian issue. This paper explores how two Bulgarian governments (Boyko Borisov’s second and third government formed during the 43rd and 44th Bulgarian National Assembly, respectively) navigated the processes of EU migration policy making and managing the expectations of their electorates. Based on a comparative analysis of refugee policies in Bulgaria and Hungary during the height of the crisis (2015-2016) and a temporal analysis of refugee policies in Bulgaria (2015-2018), the paper advances the following conclusions. Drawing on insights of the Copenhagen school of security studies, the paper argues that cultural concerns dominated domestic debates in both Bulgaria and Hungary; both governments framed the issue predominantly as a matter of security rather than humanitarian disaster. Regardless of the similarities in issue framing, however, the two governments sought different paths of tackling the crisis. While the Bulgarian government demonstrated its willingness to comply with EU decisions (such as the proposal for mandatory quotas for refugee relocation), the Hungarian government defied EU directives and became a leading voice of dissent inside the EU. The current Bulgarian government (April 2017 - present) appears to be committed to complying with EU decisions and accepts the strategy of EU burden-sharing, while the Hungarian government has continually snubbed the EU’s appeals for cooperation despite the risk of hefty financial penalties. Hungary’s refugee policies have been influenced by the parliamentary representation of the far right-wing party Movement for a Better Hungary (Jobbik), which has encouraged the majority party (FIDESZ) to adopt harsher anti-migrant rhetoric and more hostile policies toward refugees. Bulgaria’s current government is a coalition of the center-right Citizens for a European Development of Bulgaria (GERB) and its far right-wing junior partners – the United Patriots (comprised of three nationalist political parties). The parliamentary presence of Jobbik in Hungary’s parliament has magnified the anti-migrant stance, rhetoric, and policies of Mr. Orbán’s Civic Alliance; we have yet to observe a substantial increase in the anti-migrant rhetoric and policies in Bulgaria’s case. Analyzing responses to the migrant/refugee crisis is a critical opportunity to understand how issues of cultural identity and belonging, inclusion and exclusion, regional integration and disintegration are debated and molded into policy in Europe’s youngest member states in the broader EU context.

Keywords: Copenhagen School, migrant crisis, refugees, security

Procedia PDF Downloads 121
13379 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 356
13378 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 67
13377 The Relationships between Energy Consumption, Carbon Dioxide (CO2) Emissions, and GDP for Egypt: Time Series Analysis, 1980-2010

Authors: Jinhoa Lee

Abstract:

The relationships between environmental quality, energy use and economic output have created growing attention over the past decades among researchers and policy makers. Focusing on the empirical aspects of the role of carbon dioxide (CO2) emissions and energy use in affecting the economic output, this paper is an effort to fulfill the gap in a comprehensive case study at a country level using modern econometric techniques. To achieve the goal, this country-specific study examines the short-run and long-run relationships among energy consumption (using disaggregated energy sources: crude oil, coal, natural gas, electricity), CO2 emissions and gross domestic product (GDP) for Egypt using time series analysis from the year 1980-2010. To investigate the relationships between the variables, this paper employs the Augmented Dickey-Fuller (ADF) test for stationarity, Johansen maximum likelihood method for co-integration and a Vector Error Correction Model (VECM) for both short- and long-run causality among the research variables for the sample. The long-run equilibrium in the VECM suggests some negative impacts of the CO2 emissions and the coal and natural gas use on the GDP. Conversely, a positive long-run causality from the electricity consumption to the GDP is found to be significant in Egypt during the period. In the short-run, some positive unidirectional causalities exist, running from the coal consumption to the GDP, and the CO2 emissions and the natural gas use. Further, the GDP and the electricity use are positively influenced by the consumption of petroleum products and the direct combustion of crude oil. Overall, the results support arguments that there are relationships among environmental quality, energy use, and economic output in both the short term and long term; however, the effects may differ due to the sources of energy, such as in the case of Egypt for the period of 1980-2010.

Keywords: CO2 emissions, Egypt, energy consumption, GDP, time series analysis

Procedia PDF Downloads 615
13376 A History of Taiwan’s Secret Nuclear Program

Authors: Hsiao-ting Lin

Abstract:

This paper analyzes the history of Taiwan’s secret program to develop its nuclear weapons during the Cold War. In July 1971, US President Richard Nixon shocked the world when he announced that his national security adviser Henry Kissinger had made a secret trip to China and that he himself had accepted an invitation to travel to Beijing. This huge breakthrough in the US-PRC relationship was followed by Taipei’s loss of political legitimacy and international credibility as a result of its UN debacle in the fall that year. Confronted with the Nixon White House’s opening to the PRC, leaders in Taiwan felt being betrayed and abandoned, and they were obliged to take countermeasures for the sake of national interest and regime survival. Taipei’s endeavor to create an effective nuclear program, including the possible development of nuclear weapons capabilities, fully demonstrates the government’s resolution to pursue its own national policy, even if such a policy was guaranteed to undermine its relations with the United States. With hindsight, Taiwan’s attempt to develop its own nuclear weapons did not succeed in sabotaging the warming of US-PRC relations. Worse, it was forced to come to a full stop when, in early 1988, the US government pressured Taipei to close related facilities and programs on the island. However, Taiwan’s abortive attempt to develop its nuclear capability did influence Washington’s and Beijing’s handling of their new relationship. There did develop recognition of a common American and PRC interest in avoiding a nuclearized Taiwan. From this perspective, Beijing’s interests would best be served by allowing the island to remain under loose and relatively benign American influence. As for the top leaders on Taiwan, such a policy choice demonstrated how they perceived the shifting dynamics of international politics in the 1960s and 1970s and how they struggled to break free and pursue their own independent national policy within the rigid framework of the US-Taiwan alliance during the Cold War.

Keywords: taiwan, richard nixon, nuclear program, chiang Kai-shek, chiang ching-kuo

Procedia PDF Downloads 131