Search results for: national security council
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7075

Search results for: national security council

6325 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 104
6324 Financial Sources and Instruments for Public Grants and Financial Facilities of SMEs in Eu

Authors: Simeon Karafolas, Maciej Woźniak

Abstract:

Mostly of public financing programs at national and regional level are funded from European Union sources. EU can participate directly to a national and regional program (example LEADER initiative, URBAN…) or indirectly by funding regional or national funds. Funds from European Union are provided from EU multiannual financial framework form which the annual budget is programmed. The adjusted program 2007-2013 of the EU considered commitments of almost 1 trillion Euros for the EU-28 countries. Provisions of the new program 2014-2020 consider commitments of more than 1 trillion Euros. Sustainable growth, divided to Cohesion and Competitiveness for Growth an Employment, is one of the two principal categories; the other is the preservation and management of natural resources. Through this financing process SMEs benefited of EU and public sources by receiving grants for their investments. Most of the financial instruments are available indirectly through the national financial intermediaries. Part of them is managed by the European Investment Fund. The paper focuses on the public financing to SMEs by examining case studies on divers forms of public help. It tries to distinguish the efficiency of the examined good practices and therefore try to have some conclusions on the possibility of application to other regions.

Keywords: DIFASS, grants, SMEs, public financing

Procedia PDF Downloads 306
6323 Impact of the Government Ghana Block Farm Program on Rural Households in Northern Ghana

Authors: Antwi Kwaku Dei, Lyford Conrad Power

Abstract:

This paper investigates the outcome of participating in the government of Ghana block farm program on rural households’ farm productivity, income, food security and nutritional status in Northern Ghana using cross-sectional data. Data analysis was done using the Instrumental Variable and the Heckman Selection Bias procedures. Our analysis indicates that participation in the block farm program significantly increased directly the productivity of maize, rice, and soybean by 21.3 percent, 15.8 percent, and 12.3 percent respectively. Also, the program participation was found to increase households’ farm income by 20 percent in northern Ghana. Furthermore, program participation was found to improve household food security and nutrition by 19 percent and 14 percent respectively through income effect. Based on the benefit-cost ratio of 1.59 the results from the study recommends that the program is expanded to other communities in the northern region. Further analysis indicates that rural households’ decision to participate in food security intervention programs is significantly influenced by factors including the gender of the household head, the age of the household head, and household size. Results of the study further show that gender of household head, household size, household monthly income, household assets, women educational status, the age of women, marital status of women, are significant determinants of food security and nutrition status in Northern Ghana.

Keywords: block farm program, farm productivity, , household food security, Northern Ghana

Procedia PDF Downloads 275
6322 Social and Digital Transformation of the Saudi Education System: A Cyberconflict Analysis

Authors: Mai Alshareef

Abstract:

The Saudi government considers the modernisation of the education system as a critical component of the national development plan, Saudi Vision 2030; however, this sudden reform creates tension amongst Saudis. This study examines first the reflection of the social and digital education reform on stakeholders and the general Saudi public, and second, the influence of information and communication technologies (ICTs) on the ethnoreligious conflict in Saudi Arabia. This study employs Cyberconflict theory to examine conflicts in the real world and cyberspace. The findings are based on a qualitative case study methodology that uses netnography, an analysis of 3,750 Twitter posts and semi-structural interviews with 30 individuals, including key actors in the Saudi education sector and Twitter activists during 2019\2020. The methods utilised are guided by thematic analysis to map an understanding of factors that influence societal conflicts in Saudi Arabia, which in this case include religious, national, and gender identity. Elements of Cyberconflict theory are used to better understand how conflicting groups build their identities in connection to their ethnic/religious/cultural differences and competing national identities. The findings correspond to the ethnoreligious components of the Cyberconflict theory. Twitter became a battleground for liberals, conservatives, the Saudi public and elites, and it is used in a novel way to influence public opinion and to challenge the media monopoly. Opposing groups relied heavily on a discourse of exclusion and inclusion and showed ethnic and religious affiliations, national identity, and chauvinism. The findings add to existing knowledge in the cyberconflict field of study, and they also reveal outcomes that are critical to the Saudi Arabian national context.

Keywords: education, cyberconflict, Twitter, national identity

Procedia PDF Downloads 172
6321 Evidence on Scale Economies in National Bank of Pakistan

Authors: Sohail Zafar, Sardar Javaid Iqbal Khan

Abstract:

We use a parametric approach within a translog cost function framework to estimate the economies of scale in National Bank of Pakistan from 1997 to 2013. The results indicate significant economies of scale throughout the sample at aggregates and disaggregates taking in account size subject to stipulation ownership. The factor markets often produce scale inefficiencies in the banking of developing countries like Pakistan such inefficiencies are common due to distortion in factor markets leading to the use of inappropriate factor proportions. The findings suggest that National Bank of Pakistan diversify their asset portfolios that it has cost advantage, therefore, expansion in size should be encouraged under current technology because it appears to be cost effective. In addition, our findings support the implementation of universal banking model in Pakistan.

Keywords: scale economies, cost function, disaggregates, aggregates

Procedia PDF Downloads 318
6320 A Framework for Secure Information Flow Analysis in Web Applications

Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa

Abstract:

Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.

Keywords: web applications security, secure information flow, program dependence graph, database annotation

Procedia PDF Downloads 468
6319 The Communist Party of China’s Approach to Human Rights and the Death Penalty in China since 1979

Authors: Huang Gui

Abstract:

The issues of human rights and death penalty are always drawing attentions from international scholars, critics and observers, activities and Chinese scholars, and most of them looking at these problems are just doing with such legal or political from a single perspective, but the real relationship between Chinese political regime and legislation is often ignored. In accordance with the Constitution of P.R.C., Communist Party of China (CPC) does not merely play a key role in political field, but in legislation and law enforcement as well. Therefore, the legislation has to implement the party’s theory and outlook, and realize the party’s policies. So is the death penalty system, though it is only concrete punishment system. Considering this point, basic upon the introducing the relationship between CPC and legislation, this paper would like to explore the shifting of CPC’s outlook on human rights and the death penalty system changes in different eras. In Maoist era, the issue of human rights was rejected and deemed as an exclusion zone, and the death penalty was unjustifiably imposed; human rights were politically recognized and accepted in Deng era, but CPC has its own viewpoints on it. CPC emphasized on national security and stability in that era, and the individual human rights weren’t taken correspondingly and reasonably account of. The death penalty was abused and deemed as an important measure to control crime. In post-Deng, human rights were gradually developed and recognized. The term of ‘state respect and protect human rights’ is contained in Constitution of P.R.C., and the individual human rights are gradually valued, but the CPC still focus on state security, development, and stability, the individual right to life hasn’t been enough valued like the right to substance. Although the steps of reforming death penalty are taking, there are still 46 crimes punishable by death. CPC should change its outlook and pay more attention to the right to life, and try to abolish death penalty de facto and de jure.

Keywords: criminal law, communist party of China, death penalty, human rights, China

Procedia PDF Downloads 413
6318 Secure and Privacy-Enhanced Blockchain-Based Authentication System for University User Management

Authors: Ali El Ksimi

Abstract:

In today's digital academic environment, secure authentication methods are essential for managing sensitive user data, including that of students and faculty. The rise in cyber threats and data breaches has exposed the vulnerabilities of traditional authentication systems used in universities. Passwords, often the first line of defense, are particularly susceptible to hacking, phishing, and brute-force attacks. While multi-factor authentication (MFA) provides an additional layer of security, it can still be compromised and often adds complexity and inconvenience for users. As universities seek more robust security measures, blockchain technology emerges as a promising solution. Renowned for its decentralization, immutability, and transparency, blockchain has the potential to transform how user management is conducted in academic institutions. In this article, we explore a system that leverages blockchain technology specifically for managing user accounts within a university setting. The system enables the secure creation and management of accounts for different roles, such as administrators, teachers, and students. Each user is authenticated through a decentralized application (DApp) that ensures their data is securely stored and managed on the blockchain. By eliminating single points of failure and utilizing cryptographic techniques, the system enhances the security and integrity of user management processes. We will delve into the technical architecture, security benefits, and implementation considerations of this approach. By integrating blockchain into user management, we aim to address the limitations of traditional systems and pave the way for the future of digital security in education.

Keywords: blockchain, university, authentication, decentralization, cybersecurity, user management, privacy

Procedia PDF Downloads 16
6317 Understanding the Historical Consciousness of Children and Young People

Authors: Kay Carroll

Abstract:

Creating historical consciousness in children and young people is critical to global inclusion and engagement. In a context of international and technological flux, children are confronted with shifting national identities. Within this quantitative study of Australian children and young people, the concept and development of historical consciousness are explored. The analysis reports on how children and young people are connected through national, collective, and personal narratives to understand historically significant events and changes, anchor themselves to universal and intergenerational traditions and norms, be open to divergent perspectives and resilient to perpetual socio-cultural shifts. This paper presents the development and factors that shape national historical consciousness in children and young people using established international frameworks and stages of historical consciousness. This research reports on quantitative surveys conducted with over 680 school children from ages 12 years to 19 years within Australian schools. Concepts of global citizenship, inclusion, and engagement with national historical memory and significance are explored. Findings identify the social benefits of collective and personal historical consciousness and consider the current barriers and enablers in developing a young person’s historical consciousness for the future.

Keywords: curriculum, global citizenship, historical consciousness, significance

Procedia PDF Downloads 189
6316 The Role of Digital Media in the Change of Saudi Nationalism: A Systematic Review and Meta-Analysis

Authors: Alaa Alshaikh

Abstract:

While digital technologies were initially seen as harbingers of globalisation and cosmopolitanism, scholars increasingly acknowledge their role in the rise of nationalism. This paper studies the national identity in light of the digital media in Saudi Arabia. It offers an extensive meta-analysis of the evolution of the national identity on social media. It examines the national identity and its components and deals with the difference between it and digital nationalism, which is formed and affected by the country's fulfillment of the citizen's needs. Hereto a systematic examination of all 40 articles published between October 2016 and December 2022 was conducted. Findings indicate that three characteristics of contemporary nationalism are partly linked to recent shifts in digital communication: diversification, fragmentation, and commodification. The paper concludes by considering the implications of our arguments for future research in the field.

Keywords: meta analysis, Saudi Arabia, nationalism, social media

Procedia PDF Downloads 125
6315 The Renewed Constitutional Roots of Agricultural Law in Hungary in Line with Sustainability

Authors: Gergely Horvath

Abstract:

The study analyzes the special provisions of the highest level of national agricultural legislation in the Fundamental Law of Hungary (25 April 2011) with descriptive, analytic and comparative methods. The agriculturally relevant articles of the constitution are very important, because –in spite of their high level of abstraction– they can determine and serve the practice comprehensively and effectively. That is why the objective of the research is to interpret the concrete sentences and phrases in connection with agriculture compared with the methods of some other relevant constitutions (historical-grammatical interpretation). The major findings of the study focus on searching for the appropriate provisions and approach capable of solving the problems of sustainable food production. The real challenge agricultural law must face with in the future is protecting or conserving its background and subjects: the environment, the ecosystem services and all the 'roots' of food production. In effect, agricultural law is the legal aspect of the production of 'our daily bread' from farm to table. However, it also must guarantee the safe daily food for our children and for all our descendants. In connection with sustainability, this unique, value-oriented constitution of an agrarian country even deals with uncustomary questions in this level of legislation like GMOs (by banning the production of genetically modified crops). The starting point is that the principle of public good (principium boni communis) must be the leading notion of the norm, which is an idea partly outside the law. The public interest is reflected by the agricultural law mainly in the concept of public health (in connection with food security) and the security of supply with healthy food. The construed Article P claims the general protection of our natural resources as a requirement. The enumeration of the specific natural resources 'which all form part of the common national heritage' also means the conservation of the grounds of sustainable agriculture. The reference of the arable land represents the subfield of law of the protection of land (and soil conservation), that of the water resources represents the subfield of water protection, the reference of forests and the biological diversity visualize the specialty of nature conservation, which is an essential support for agrobiodiversity. The mentioned protected objects constituting the nation's common heritage metonymically melt with their protective regimes, strengthening them and forming constitutional references of law. This regimes also mean the protection of the natural foundations of the life of the living and also the future generations, in the name of intra- and intergenerational equity.

Keywords: agricultural law, constitutional values, natural resources, sustainability

Procedia PDF Downloads 164
6314 Transnationalization Strategies of Danish Cinema: Susanne Bier, Lone Scherfig

Authors: Ebru Thwaites Diken

Abstract:

This article analyzes the works of certain directors in Danish cinema, namely Susanne Bier and Lone Sherfig, in the context of transnationalisation of Danish cinema. It looks at how the films' narratives negotiate and reconstruct the local / national / regional and the global. Scholars such as Nestingen & Elkington (2005), Hjort (2010), Higbee and Lim (2010), Bondebjerg and Redvall (2011) address transnationalism of Danish cinema in terms of production and distribution processes and how film making trascends national boundaries. This paper employs a particular understanding of transnationalism - in terms of how ideas and characters travel - to analyze how the storytelling and style has evolved to connect the national, the regional and the global on the basis of the works of these two directors. Strategies such as Hollywoodization - i.e. focus on stardom and classical narration, adhering to conventional European genre formulas, producing Danish films in English language have been identifiable strategies in Danish cinema in the period after the 2000s. Susanne Bier and Lone Scherfig are significant for employing some of these strategies simultaneously. For this reason, this article will look at how these two directors have employed these strategies and negotiated the cultural boundaries and exchanges.

Keywords: danish cinema, transnational cinema, susanne bier, lone scherfig, national cinema

Procedia PDF Downloads 66
6313 Legal Contestation of Non-Legal Norms: The Case of Humanitarian Intervention Norm between 1999 and 2018

Authors: Nazli Ustunes Demirhan

Abstract:

Norms of any nature are subject to pressures of change throughout their lifespans, as they are interpreted and re-interpreted every time they are used rhetorically or practically by international actors. The inevitable contestation of different interpretations may lead to an erosion of the norm, as well as to its strengthening. This paper aims to question the role of formal legality on the change of norm strength, using a norm contestation framework and a multidimensional norm strength conceptualization. It argues that the role of legality is not necessarily linked to the formal legal characteristics of a norm, but is about the legality of the contestation processes. In order to demonstrate this argument, the paper examines the evolutionary path of the humanitarian intervention norm as a case study. Humanitarian intervention, as a norm of very low formal legal characteristics, has been subject to numerous cycles of contestation, demonstrating a fluctuating pattern of norm strength. With the purpose of examining the existence and role of legality in the selected contestation periods from 1999 to 2017, this paper uses process tracing method with a detailed document analysis on the Security Council documents; including decisions, resolutions, meeting minutes, press releases as well as individual country statements. Through the empirical analysis, it is demonstrated that the legality of the contestation processes has a positive effect at least on the authoritativeness dimension of norm strength. This study tries to contribute to the developing dialogue between international relations (IR) and internal law (IL) disciplines with its better-tuned understanding of legality. It connects to further questions in IR/IL nexus, relating to the value added of norm legality, and politics of legalization as well as better international policies for norm reinforcement.

Keywords: humanitarian intervention, legality, norm contestation, norm dynamics, responsibility to protect

Procedia PDF Downloads 142
6312 Nuclear Safety and Security in France in the 1970s: A Turning Point for the Media

Authors: Jandot Aurélia

Abstract:

In France, in the main media, the concern about nuclear safety and security has not really appeared before the beginning of the 1970s. The gradual changes in its perception are studied here through the arguments given in the main French news magazines, linked with several parameters. As this represents a considerable amount of copies and thus of information, are selected here the main articles as well as the main “mental images” aiming to persuade the readers and which have led the public awareness to evolve. Indeed, in the 1970s, in France, these evolutions were not made in one day. Indeed, over the period, many articles were still in favor of nuclear power plants and promoted the technological advances that were made in this field. They had to be taken into account. But, gradually, grew up arguments and mental images discrediting the perception of nuclear technology. Among these were the environmental impacts of this industry, as the question of pollution progressively appeared. So, between 1970 and 1979, the language has changed, as the perceptible objectives of the communication, allowing to discern the deepest intentions of the editorial staffs of the French news magazines. This is all these changes that are emphasized here, over a period when the safety and security concern linked to the nuclear technology, to there a field for specialists, has become progressively a social issue seemingly open to all.

Keywords: environmental impacts, media discourse, nuclear security, public awareness

Procedia PDF Downloads 278
6311 Subjective Well-Being in Individuals Diagnosed with an Autoimmune Disease: Resilience, and Rumination as Moderating Factors

Authors: Renae McNair

Abstract:

Subjective well-being levels were assessed in individuals diagnosed with an autoimmune disease. The current exploratory analysis sought to examine two factors that impact subjective well-being in individuals diagnosed with a chronic health condition. The two factors, resilience, and rumination, were assessed as possible moderators in self-reported levels of subjective well-being were measured. The importance of understanding the psychological state of perceived well-being in an individual diagnosed with an autoimmune disease is important given the impact of the level of subjective well-being on life longevity. In previous research, higher levels of subjective well-being are correlated with longer life longevity, including those individuals who have been diagnosed with an autoimmune disease. Conversely, individuals who report higher levels of negative affect have a shorter length of life longevity. According to the Center for Disease Control (CDC) and a report from the National Health Council, currently, 8-10% of individuals in the United States have been diagnosed with at least one autoimmune disease. Although treatment plans are in place to help manage the physical effects of disease, the psychological state of the person impacts life longevity. Resilience and rumination impact subjective well-being as an outcome in individuals diagnosed with an autoimmune disease. Resilience is the ability to adjust or adapt effectively and positively to unfavorable life conditions or events. Resilience acts as a protective factor in life, allowing those who face adversity to successfully adapt, regardless of the health diagnosis. Rumination is the worry or dwelling on the negative aspects of a given situation. Rumination interrupts the adaptive response, leading to a decrease in well-being. The relationship between resilience and subjective well-being were examined correlated with higher levels of resilience and higher levels of self-reported subjective well-being.

Keywords: subjective well-being, rumination, resilience, autoimmune disease

Procedia PDF Downloads 248
6310 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector

Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar

Abstract:

Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.

Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability

Procedia PDF Downloads 179
6309 Ethnicism and Nigeria's National Development Crisis

Authors: A. E. Agbogu

Abstract:

While scholars have predicted that identity politics (or what is euphemistically referred to as ethnic politics in Nigeria) were a dying phenomenon in other parts of the world, in Nigeria, it has remained the basis of political activity and has indeed become not only the unwritten law of all calculations in the political firmament of the country but also the ultimo ratio. We intend in the paper that follows to explore the reason for this unhealthy development. The paper seeks to offer explanations for the paradoxical reality of the upsurge of ethnic politics in Nigeria when in fact, the phenomenon is apparently on a downward spiral elsewhere in the world, particularly in countries that are at par with Nigeria in terms of national development. The paper is descriptive and qualitative and has relied on available data for its source of materials. Among other things, the paper locates identity politics as a tool in the hands of a national elite that has not transcended the limitations imposes by the shackles of the parsonian particularistic polar attributes which have tended to fixate their weltanschauung or world view on attachments that are unpardonably primordial. In the event, ethnicity becomes a veritable instrument not only for cheap sectional mobilization but also a means for seeking access to the so-called national cake. It is recommended that a way out of this socio-politico malady is the creation of a political arrangement that conduces to the gravitational tendency which will lead to the transfer of loyalties away from the extant ethno-nationalities to the centre.

Keywords: ethnicism, development, crisis, identity politics

Procedia PDF Downloads 280
6308 Being Chinese Online: Discursive (Re)Production of Internet-Mediated Chinese National Identity

Authors: Zhiwei Wang

Abstract:

Much emphasis has been placed on the political dimension of digitised Chinese national(ist) discourses and their embodied national identities, which neglects other important dimensions constitutive of their discursive nature. A further investigation into how Chinese national(ist) discourses are daily (re)shaped online by diverse socio-political actors (especially ordinary users) is crucial, which can contribute to not only deeper understandings of Chinese national sentiments on China’s Internet beyond the excessive focus on their passionate, political-charged facet but also richer insights into the socio-technical ecology of the contemporary Chinese digital (and physical) world. This research adopts an ethnographic methodology, by which ‘fieldsites’ are Sina Weibo and bilibili. The primary data collection method is virtual ethnographic observation on everyday national(ist) discussions on both platforms. If data obtained via observations do not suffice to answer research questions, in-depth online qualitative interviews with ‘key actors’ identified from those observations in discursively (re)producing Chinese national identity on each ‘fieldsite’ will be conducted, to complement data gathered through the first method. Critical discourse analysis is employed to analyse data. During the process of data coding, NVivo is utilised. From November 2021 to December 2022, 35 weeks’ digital ethnographic observations have been conducted, with 35 sets of fieldnotes obtained. The strategy adopted for the initial stage of observations was keyword searching, which means typing into the search box on Sina Weibo and bilibili any keywords related to China as a nation and then observing the search results. Throughout 35 weeks’ online ethnographic observations, six keywords have been employed on Sina Weibo and two keywords on bilibili. For 35 weeks’ observations, textual content created by ordinary users have been concentrated much upon. Based on the fieldnotes of the first week’s observations, multifarious national(ist) discourses on Sina Weibo and bilibili have been found, targeted both at national ‘Others’ and ‘Us’, both on the historical and real-world dimension, both aligning with and differing from or even conflicting with official discourses, both direct national(ist) expressions and articulations of sentiments in the name of presentation of national(ist) attachments but for other purposes. Second, Sina Weibo and bilibili users have agency in interpreting and deploying concrete national(ist) discourses despite the leading role played by the government and the two platforms in deciding on the basic framework of national expressions. Besides, there are also disputes and even quarrels between users in terms of explanations for concrete components of ‘nation-ness’ and (in)direct dissent to officially defined ‘mainstream’ discourses to some extent, though often expressed much more mundanely, discursively and playfully. Third, the (re)production process of national(ist) discourses on Sina Weibo and bilibili depends upon not only technical affordances and limitations of the two sites but also, to a larger degree, some established socio-political mechanisms and conventions in the offline China, e.g., the authorities’ acquiescence of citizens’ freedom in understanding and explaining concrete elements of national discourses while setting the basic framework of national narratives to the extent that citizens’ own national(ist) expressions do not reach political bottom lines and develop into mobilising power to shake social stability.

Keywords: national identity, national(ist) discourse(s), everyday nationhood/nationalism, Chinese nationalism, digital nationalism

Procedia PDF Downloads 83
6307 Use of Galileo Advanced Features in Maritime Domain

Authors: Olivier Chaigneau, Damianos Oikonomidis, Marie-Cecile Delmas

Abstract:

GAMBAS (Galileo Advanced features for the Maritime domain: Breakthrough Applications for Safety and security) is a project funded by the European Space Program Agency (EUSPA) aiming at identifying the search-and-rescue and ship security alert system needs for maritime users (including operators and fishing stakeholders) and developing operational concepts to answer these needs. The general objective of the GAMBAS project is to support the deployment of Galileo exclusive features in the maritime domain in order to improve safety and security at sea, detection of illegal activities and associated surveillance means, resilience to natural and human-induced emergency situations, and develop, integrate, demonstrate, standardize and disseminate these new associated capabilities. The project aims to demonstrate: improvement of the SAR (Search And Rescue) and SSAS (Ship Security Alert System) detection and response to maritime distress through the integration of new features into the beacon for SSAS in terms of cost optimization, user-friendly aspects, integration of Galileo and OS NMA (Open Service Navigation Message Authentication) reception for improved authenticated localization performance and reliability, and at sea triggering capabilities, optimization of the responsiveness of RCCs (Rescue Co-ordination Centre) towards the distress situations affecting vessels, the adaptation of the MCCs (Mission Control Center) and MEOLUT (Medium Earth Orbit Local User Terminal) to the data distribution of SSAS alerts.

Keywords: Galileo new advanced features, maritime, safety, security

Procedia PDF Downloads 91
6306 National Digital Soil Mapping Initiatives in Europe: A Review and Some Examples

Authors: Dominique Arrouays, Songchao Chen, Anne C. Richer-De-Forges

Abstract:

Soils are at the crossing of many issues such as food and water security, sustainable energy, climate change mitigation and adaptation, biodiversity protection, human health and well-being. They deliver many ecosystem services that are essential to life on Earth. Therefore, there is a growing demand for soil information on a national and global scale. Unfortunately, many countries do not have detailed soil maps, and, when existing, these maps are generally based on more or less complex and often non-harmonized soil classifications. An estimate of their uncertainty is also often missing. Thus, there are not easy to understand and often not properly used by end-users. Therefore, there is an urgent need to provide end-users with spatially exhaustive grids of essential soil properties, together with an estimate of their uncertainty. One way to achieve this is digital soil mapping (DSM). The concept of DSM relies on the hypothesis that soils and their properties are not randomly distributed, but that they depend on the main soil-forming factors that are climate, organisms, relief, parent material, time (age), and position in space. All these forming factors can be approximated using several exhaustive spatial products such as climatic grids, remote sensing products or vegetation maps, digital elevation models, geological or lithological maps, spatial coordinates of soil information, etc. Thus, DSM generally relies on models calibrated with existing observed soil data (point observations or maps) and so-called “ancillary co-variates” that come from other available spatial products. Then the model is generalized on grids where soil parameters are unknown in order to predict them, and the prediction performances are validated using various methods. With the growing demand for soil information at a national and global scale and the increase of available spatial co-variates national and continental DSM initiatives are continuously increasing. This short review illustrates the main national and continental advances in Europe, the diversity of the approaches and the databases that are used, the validation techniques and the main scientific and other issues. Examples from several countries illustrate the variety of products that were delivered during the last ten years. The scientific production on this topic is continuously increasing and new models and approaches are developed at an incredible speed. Most of the digital soil mapping (DSM) products rely mainly on machine learning (ML) prediction models and/or the use or pedotransfer functions (PTF) in which calibration data come from soil analyses performed in labs or for existing conventional maps. However, some scientific issues remain to be solved and also political and legal ones related, for instance, to data sharing and to different laws in different countries. Other issues related to communication to end-users and education, especially on the use of uncertainty. Overall, the progress is very important and the willingness of institutes and countries to join their efforts is increasing. Harmonization issues are still remaining, mainly due to differences in classifications or in laboratory standards between countries. However numerous initiatives are ongoing at the EU level and also at the global level. All these progress are scientifically stimulating and also promissing to provide tools to improve and monitor soil quality in countries, EU and at the global level.

Keywords: digital soil mapping, global soil mapping, national and European initiatives, global soil mapping products, mini-review

Procedia PDF Downloads 180
6305 Determinants and Repercussions of International Migration in and Through Libya: Afield Study

Authors: Ihab S. Jweida

Abstract:

Libya is witnessing major shifts in international migration flows resulting frompolitical, economic, social, security and environmental reasons as a result of what it iswitnessing from the elements of a fragile state due to government division, politicalconflicts, security chaos and the spread of terrorist organizations, since the popularuprising in February 2011, which threatens economic, social and security stability andthen The political stability of the Mediterranean basin countries. Therefore, this studycame as a scientific research aimed at analyzing the role of political economy inexplaining international migration with application to the case of Libya during theperiod from 2011-2021. To achieve this objective, the researcher relied on the descriptive approach basedon qualitative and quantitative analysis to analyze studies, reports, and internationalmigration policies in Libya, and conducted an exploratory study based on a personalinterview questionnaire for (670) migrants present in the distribution areas in Libyaand (65) Libyan migrants,

Keywords: international, migration, Libya, case

Procedia PDF Downloads 56
6304 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 263
6303 Gas-Phase Nondestructive and Environmentally Friendly Covalent Functionalization of Graphene Oxide Paper with Amines

Authors: Natalia Alzate-Carvajal, Diego A. Acevedo-Guzman, Victor Meza-Laguna, Mario H. Farias, Luis A. Perez-Rey, Edgar Abarca-Morales, Victor A. Garcia-Ramirez, Vladimir A. Basiuk, Elena V. Basiuk

Abstract:

Direct covalent functionalization of prefabricated free-standing graphene oxide paper (GOP) is considered as the only approach suitable for systematic tuning of thermal, mechanical and electronic characteristics of this important class of carbon nanomaterials. At the same time, the traditional liquid-phase functionalization protocols can compromise physical integrity of the paper-like material up to its total disintegration. To avoid such undesirable effects, we explored the possibility of employing an alternative, solvent-free strategy for facile and nondestructive functionalization of GOP with two representative aliphatic amines, 1-octadecylamine (ODA) and 1,12-diaminododecane (DAD), as well as with two aromatic amines, 1-aminopyrene (AP) and 1,5-diaminonaphthalene (DAN). The functionalization was performed under moderate heating at 150-180 °C in vacuum. Under such conditions, it proceeds through both amidation and epoxy ring opening reactions. Comparative characterization of pristine and amine-functionalized GOP mats was carried out by using Fourier-transform infrared, Raman, and X-ray photoelectron spectroscopy (XPS), thermogravimetric (TGA) and differential thermal analysis, scanning electron and atomic force microscopy (SEM and AFM, respectively). Besides that, we compared the stability in water, wettability, electrical conductivity and elastic (Young's) modulus of GOP mats before and after amine functionalization. The highest content of organic species was obtained in the case of GOP-ODA, followed by GOP-DAD, GOP-AP and GOP-DAN samples. The covalent functionalization increased mechanical and thermal stability of GOP, as well as its electrical conductivity. The magnitude of each effect depends on the particular chemical structure of amine employed, which allows for tuning a given GOP property. Morphological characterization by using SEM showed that, compared to pristine graphene oxide paper, amine-modified GOP mats become relatively ordered layered assemblies, in which individual GO sheets are organized in a near-parallel pattern. Financial support from the National Autonomous University of Mexico (grants DGAPA-IN101118 and IN200516) and from the National Council of Science and Technology of Mexico (CONACYT, grant 250655) is greatly appreciated. The authors also thank David A. Domínguez (CNyN of UNAM) for XPS measurements and Dr. Edgar Alvarez-Zauco (Faculty of Science of UNAM) for the opportunity to use TGA equipment.

Keywords: amines, covalent functionalization, gas-phase, graphene oxide paper

Procedia PDF Downloads 171
6302 ISIS Women Recruitment in Spain and De-Radicalization Programs in Prisons

Authors: Inmaculada Yuste Martinez

Abstract:

Since July 5, 2014, Abubaker al Bagdadi, leader of the Islamic State since 2010 climbed the pulpit of the Great Mosque of Al Nuri of Mosul and proclaimed the Caliphate, the number of fighters who have travelled to Syria to join the Caliphate has increased as never before. Although it is true that the phenomenon of foreign fighters is not a new phenomenon, as it occurred after the Spanish Civil War, Republicans from Ireland and the conflict of the Balkans among others, it is highly relevant the fact that in this case, it has reached figures unknown in Europe until now. The approval of the resolution 2178 (2014) of the Security Council, foreign terrorist fighters placed the subject a priority position on the International agenda. The available data allow us to affirm that women have increasingly assumed operative functions in jihadist terrorism and in the activities linked to it in the development of attacks in the European Union, including minors and young adults. In the case of Spain, one in four of the detainees in 2016 were women, a significant increase compared to 2015. This contrasts with the fact that until 2014 no woman had been prosecuted in Spain for terrorist activities of a jihadist nature. It is fundamental when we talk about the prevention of radicalization and counterterrorism that we do not underestimate the potential threat to the security of countries like Spain that women from the West can assume to the global jihadist movement. This work aims to deepen the radicalization processes of these women and their profiles influencing the female inmate population. It also wants to focus on the importance of creating de-radicalization programs for these inmates since women are a crucial element in radicalization processes. A special focus it is made on young radicalized female inmate population as this target group is the most recoverable and on which it would result more fruitful to intervene. De-radicalization programs must also be designed to fit their profiles and circumstances; a sensitive environment will be prisons and juvenile centers, areas that until now had been unrelated to this problem and which are already hosting the first convicted in judicial offices in Spanish territory. A qualitative research and an empirical and analytical method has been implemented in this work, focused on the cases that took place in Spain of young women and the imaginary that the Islamic State uses for the processes of radicalization for this target group and how it does not fit with their real role in the Jihad, as opposed to other movements in which women do have a real and active role in the armed conflict as YPJ do it as a part of the armed wing of the Democratic Union Party of Syria.

Keywords: caliphate, de-radicalization, foreign fighter, gender perspective, ISIS, jihadism, recruitment

Procedia PDF Downloads 166
6301 Urban Security and Social Sustainability in Cities of Developing Countries

Authors: Taimaz Larimian, Negin Sadeghi

Abstract:

Very little is known about the impacts of urban security on the level of social sustainability within the cities of developing countries. Urban security is still struggling to find its position in the social sustainability agenda, despite the significant role of safety and security on different aspects of peoples’ lives. This paper argues that urban safety and security should be better integrated within the social sustainability framework. With this aim, this study investigates the hypothesized relationship between social sustainability and Crime Prevention through Environmental Design (CPTED) approach at the neighborhood scale. This study proposes a model of key influential dimensions of CPTED analyzed into localized factors and sub-factors. These factors are then prioritized using pairwise comparison logic and fuzzy group Analytic Hierarchy Process (AHP) method in order to determine the relative importance of each factor on achieving social sustainability. The proposed model then investigates social sustainability in six case study neighborhoods of Isfahan city based on residents’ perceptions of safety within their neighborhood. Mixed method of data collection is used by using a self-administered questionnaire to explore the residents’ perceptions of social sustainability in their area of residency followed by an on-site observation to measure the CPTED construct. In all, 150 respondents from selected neighborhoods were involved in this research. The model indicates that CPTED approach has a significant direct influence on increasing social sustainability in neighborhood scale. According to the findings, among different dimensions of CPTED, ‘activity support’ and ‘image/ management’ have the most influence on people’s feeling of safety within studied areas. This model represents a useful designing tool in achieving urban safety and security during the development of more socially sustainable and user-friendly urban areas.

Keywords: crime prevention through environmental design (CPTED), developing countries, fuzzy analytic hierarchy process (FAHP), social sustainability

Procedia PDF Downloads 302
6300 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 314
6299 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)

Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed

Abstract:

The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.

Keywords: DSDV, AODV, DSR NS-2, PDF, push time

Procedia PDF Downloads 430
6298 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 260
6297 Women in Violent Conflicts and the Challenges of Food Security in Northeast Nigeria: The Case of Boko Haram Insurgency

Authors: Grace Modupe Adebo, Ayodeji Oluwamuyiwa Adedapo

Abstract:

Women are key actors in ensuring food security in terms of food availability, food access, and food utilization in the developing economy, however, they suffer mostly during violent conflicts due to their feminist nature of rearing and caring for their children and relatives. The study was embarked upon to access the effects of violent conflicts posed by Boko Haram insurgency on women and food security in the Northeast of Nigeria. The study made use of secondary data. A time series data collected over a 22 years period were used. The data collected were subjected to descriptive statistics and t-test analysis. The findings of the study established a significant difference in food production (availability) before and after the Boko Haram insurgency at the 1% level of significance. The high level of Internally Displaced Person (IDP) with a high proportion of women depicts a very low level of food accessibility as the men and women has fled and uninhabited their place of abode for over a period of four to five years, thus diminishing their economic power, and the means of acquiring food which invariably endanger food stability and utilization. The study confirmed the abduction and changing roles of women as cooks, porters, spies, partners, and sex slaves to Boko Haram troop members, thus affecting their livelihoods and food security. The study recommends hands-on interventions by the governmental, non-governmental and international agencies to terminate the activities of Boko Haram in the area and restore the food production for enhanced food security.

Keywords: Boko Haram insurgency, food accessibility, food production, food utilization, women’s livelihoods

Procedia PDF Downloads 143
6296 Encouraging Girl-Child Education for Better Reproductive Health in Nigeria

Authors: Alikeju F. Maji

Abstract:

The role of girl child education on reproductive health of any nation cannot be over emphasized. Today this has become a global concern because of the awareness that girl child education has direct proven impact on reproductive health and sustainable development of a national. Thus, this paper attempts to re-emphasize and re-awaken the mind of humanity on the undisputable importance of girl-child education as a tool for improving reproductive health in Nigeria. The paper further examine that despite government’s effort in attaining education for all by the year 2015, the numbers of girls attending schools remain abysmally low in Nigeria. The paper noted that if the trend persists, personal health of women and their contribution to national development will reduce. The paper recommends that women in Nigeria should be availed with good educational opportunities to enhance their improved reproductive health, and greater participating in national development.

Keywords: girl-child education, reproductive health, sustainable development, personal health

Procedia PDF Downloads 352