Search results for: Islamic social security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12183

Search results for: Islamic social security

11403 Counter-Terrorism and Civil Society in Nigeria

Authors: Emeka Thaddues Njoku

Abstract:

Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.

Keywords: counter-terrorism, civil society organizations, freedom, terrorism

Procedia PDF Downloads 380
11402 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 298
11401 Glimpses into the History of Makkah in the Light of Archaeological Finds

Authors: Heba Aboul-Enein

Abstract:

The blessed Mecca (Makkah) has been attacked as a city without a pre-Islamic history. Many claims have been posited denying the historicity of this holy city, and mythicizing Arabic historical records. Hence, the current paper attempted to shed light on this controversial history of Makkah. To achieve the intended objective, the study recoursed to archaeological, historical, and linguistic evidence, to prove that the holy city existed since the dawn of human history. The data under study include the results of recent excavations; archaeological surveys in Saudi Arabia, academic works of archaeologists, newspaper reports of the latest archaeological discoveries, and the findings of Saudi explorers. In addition, the study examined ancient and contemporary references; western accounts of Makkah, the bible, Jewish, Christian, Islamic, and Arabic references, in an effort to reconcile these texts with the archeological findings. The paper also reviewed the latest results of aerial archeology of the region. The study proved based on archaeological finds, and contrary to fallacious claims, that Makkah is an ancient city that existed and was inhabited by humans in varied historical eras.

Keywords: aerial archaeology, archaeological finds in the Makkan region, archaeological surveys, Western, Jewish and Islamic accounts of Makkah

Procedia PDF Downloads 469
11400 Climate Change and Food Security: The Legal Aspects with Special Focus on the European Union

Authors: M. Adamczak-Retecka, O. Hołub-Śniadach

Abstract:

Dangerous of climate change is now global problem and as such has a strategic priority also for the European Union. Europe and European citizens try to do their best to cut greenhouse gas emissions, moreover they substantially encourage other nations and regions to follow the same way. The European Commission and a number of Member States have developed adaptation strategies in order to help strengthen EU's resilience to the inevitable impacts of climate change. The EU has long been a driving force in international negotiations on climate change and was instrumental in the development of the UN Framework Convention on Climate Change. As the world's leading donor of development aid, the EU also provides substantial funding to help developing countries tackle climate change problem. Global warming influences human health, biodiversity, ecosystems but also many social and economic sectors. The aim of this paper is to focus on impact of claimant change on for food security. Food security challenges are directly related to globalization, climate change. It means that current and future food policy is exposed to all cross-cutting and that must be linked with environmental and climate targets, which supposed to be achieved. In the 7th EAP —The new general Union Environment Action Program to 2020, called “Living well, within the limits of our planet” EU has agreed to step up its efforts to protect natural capital, stimulate resource efficient, low carbon growth and innovation, and safeguard people’s health and wellbeing– while respecting the Earth’s natural limits.

Keywords: climate change, food security, sustainable food consumption, climate governance

Procedia PDF Downloads 175
11399 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 67
11398 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 285
11397 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 296
11396 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 426
11395 Anti-Social Media: Implications of Social Media in the Form of Stressors on Our Daily Lives

Authors: Aimen Batool Bint-E-Rashid, Huma Irfan

Abstract:

This research aims to investigate the role of social media (Snapchat, Facebook, Twitter, etc.) in our daily lives and its implication on our everyday routine in the form of stressors. The study has been validated by a social media survey with 150 social media users belonging to various age groups. The study explores how social media can make an individual anti-social in his or her life offline. To explain the phenomenon, we have proposed and evaluated a model based on social media usage and stressors including burnout and social overload. Results, through correlation and regression tests, have revealed that with increase in social media usage, social overload and burnout also increases. Evidence for the fact that excessive social media usage causes social overload and burnout has been provided in the study.

Keywords: burnout, emotional exhaustion, fatigue, stressors, social networking, social media, social overload

Procedia PDF Downloads 200
11394 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 327
11393 Pre-Service Teacher Education Reforms in India and Pakistan: Challenges and Possibilities

Authors: Jyoti Sharma

Abstract:

India and Pakistan are two strategically important neighboring countries in Asia-Pacific region. Since independence of more than six decades, both, India and Pakistan have transverse different paths, India as a Sovereign, Democratic, Republic Country and Pakistan as Islamic Republic of Pakistan. The advent of democracy in India and Islamic republic in Pakistan resulted in new hopes, aspirations and demands on education. During the six decades after Independence, teacher education in both countries has come a long way from its initial bleak stature to gain an identity as a complex network of institutions and programs. The present paper takes a close look into the paradigm shift in teacher education programs in India and Pakistan and how much the shift is influenced by constitutional frameworks of each country.

Keywords: pre-service teachers, teacher education reforms, India, Pakistan

Procedia PDF Downloads 718
11392 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 151
11391 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 92
11390 A Study on Neighborhood of Dwelling with Historical-Islamic Architectural Elements

Authors: M.J. Seddighi, Moradchelleh, M. Keyvan

Abstract:

The ultimate goal in building a city is to provide pleasant, comfortable and nurturing environment as a context of public life. City environment establishes strong connection with people and their surrounding habitant, acting as relevance in social interactions between citizens itself. Urban environment and appropriate municipal facilities are the only way for proper communication between city and citizens and also citizens themselves.There is a need for complement elements between buildings and constructions to settling city life through which the move, comfort, reactions and anxiety will adjust and reflect the spirit to the city. In the surging development of society, urban’ spaces are encountered evolution, sometimes causing the symbols to fade and waste, and as a result, leading to destroy belongs among humans and their physical liquidate. Houses and living spaces exhibit materialistic reflection of life style. In the other words, way of life makes the symbolic essence of living spaces. In addition, it is of sociocultural factor of lifestyle, consisting the concepts and culture, morality, worldview, and national character. Culture is responsible for some crucial meaningful needs which can be wide because they depend on various causes such as perception and interpretation of believes, philosophy of life, interaction with neighbors and protection against climate and enemies. The bi-lateral relationship between human and nature is the main factor that needs to be properly addressed. It is because of the fact that the approach which is taken against landscape and nature has a pertinent influence on creation and shaping the structure of a house. The first response of human in tackling the environment is to build a “shelter” and place as dwelling. This has been a crucial factor in all time periods. In the proposed study, dwelling in Khorasgan’ Stream, as an area located in one of the important historical city of Iran, has been studied. Khorasgan’ Stream is the basic constituent elements of the present architectural form of Isfahan. The influence of Islamic spiritual culture and neighborhood with the historical elements on the dwelling of the selected location, subsequently on other regions of the town are presented.

Keywords: dwelling, neighborhood, historical, Islamic, architectural elements

Procedia PDF Downloads 410
11389 The Role of Celebrities in the Securitization and Desecuritization of Syrian Migrants on Social Media in Turkiye

Authors: Yelda Yenel, Orkut Acele

Abstract:

This research aims to examine the role of celebrities in the securitization and desecuritization of Syrian migrants in Türkiye on social media platforms. Traditionally, the securitization process has been driven by political actors and mainstream media. However, with the rise of social media, celebrities have emerged as influential actors, contributing to these processes. The topic of Syrian migrants, particularly those arriving in Türkiye after 2011, has sparked national debates, framing them both as a security threat and as a humanitarian issue, thereby dividing public opinion.The primary objective of this study is to analyze celebrities’ discourses about migrants on social media and to explore how these narratives contribute to the processes of securitization (presenting migrants as a threat) and desecuritization (framing migrants within a humanitarian context). This research will focus on social media platforms such as Twitter and Instagram, examining celebrities' posts and analyzing the narratives produced through content and discourse analysis techniques.By investigating how celebrities frame the migrant issue and how these frames resonate with the public, this study seeks to explore the impact of celebrity discourse on the securitization and desecuritization processes. Additionally, it will examine the influence of celebrities on social media users, offering a new perspective on how securitization theory is shaped by the role of celebrities in the digital age.

Keywords: securitization, desecuritization, celebrities, Syrian migrants, social media discourse

Procedia PDF Downloads 13
11388 Marketing Social Innovation: Finding Competitive Advantage in Social Enterprise Methodology

Authors: Ted Gournelos

Abstract:

Marketing approaches in practice and academic literature usually foreground the importance of product and brand awareness in strategy. Decisions emphasize justifications and promotions of existing projects, which has the unintended consequence of pushing marketing, public relations, and other communications to secondary strategies and tactics rather than as inherent pieces of organizational development. In other words, marketers implement what others have already decided. This is a challenge not only for the communications field, but also for the organizations themselves, since integrated communications employees are often the primary, if not the only, touchpoints for client/customer/user research and interaction. Organizations thus become increasingly out of touch, raising the risk of public or human resources crisis and decreasing the focus on opportunities for development and growth. This paper will discuss the potential for social entrepreneurship to refocus marketing and communications professionals on primary strategy, and suggest best practices for developing initiatives not only to impact marketing efforts themselves, but also the guiding organizational approaches to project management, human resources, corporate social responsibility, and research. It will provide a comparative analysis of social media marketing efforts conducted by food security non-governmental organizations from several countries, pointing out both flaws and areas of opportunity for integration with for-profit organizational strategy, and discuss the implications of descriptive, proactive, and interactive messaging.

Keywords: social enterprise, strategy, innovation, social media

Procedia PDF Downloads 317
11387 Islam, Gender and Education in Contemporary Georgia: The Example of Kvemo Kartli

Authors: N. Gelovani, D. Ismailov, S. Bochorishvili

Abstract:

Religious minorities of Georgia include Muslims. Their composition is sufficiently miscellaneous, enclosing both ethnical viewpoint and belonging to the inner Islamic denomination. A majority of Muslims represent Azerbaijanis, who chiefly live in Kvemo Kartli (Bolnisi, Gardabani, Dmanisi, Tetri Tskaro, Marneuli and Tsalka). The catalyst for researchers of Islamic History is the geopolitical interests of Georgia, centuries-old contacts with the Islamic world, the not entirely trivial portion of Islam confessor population, the increasing influence of the Islamic factor in current religious-political processes in the world, the elevating procedure of Muslim religious self-consciousness in the Post-Soviet states, significant challenges of international terrorism, and perspectives of rapid globalization. The rise in the level of religious identity of Muslim citizens of Georgia (first of all of those who are not ethnic Georgians) is noticeable. New mosques have been constructed and, sometimes, even young people are being sent to the religious educational institutions of Muslim countries to gain a higher Islamic education. At a time when gender studies are substantive, the goal of which is to eliminate gender-based discrimination and violence in societies, it is essential in Georgia to conduct researches around the concrete problem – Islamic tradition, woman and education in Georgia. A woman’s right to education is an important indicator of women’s general status in a society. The appropriate resources, innovative analysis of Georgian ethnological materials, and surveying of the population (quantitative and qualitative research reports, working papers), condition the success of these researches. In the presented work, interrelation matters of Islam, gender and education in contemporary Georgia by the example of the Azerbaijani population in Kvemo Kartli during period 1992-2016 are studied. We researched the history of Muslim religious education centers in Tbilisi and Kvemo Kartli (Bolnisi, Gardabani, Dmanisi, Tetri Tskaro, Marneuli and Tsalka) in 1992-2016, on the one hand, and the results of sociological interrogation, on the other. As a result of our investigation, we found that Azeri women in the Kvemo Kartli (Georgia) region mostly receive their education in Georgia and Azerbaijan. Educational and Cultural Institutions are inaccessible for most Azeri women. The main reasons are the absence of educational and religious institutions at their places of residence and state policies towards Georgia’s Muslims. 

Keywords: Islam, gender, Georgia, education

Procedia PDF Downloads 225
11386 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 564
11385 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 471
11384 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 71
11383 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 389
11382 Similarities and Differences in Values of Young Women and Their Parents: The Effect of Value Transmission and Value Change

Authors: J. Fryt, K. Pietras, T. Smolen

Abstract:

Intergenerational similarities in values may be effect of value transmission within families or socio-cultural trends prevailing at a specific point in time. According to salience hypothesis, salient family values may be transmitted more frequently. On the other hand, many value studies reveal that generational shift from social values (conservation and self-transcendence) to more individualistic values (openness to change and self-enhancement) suggest that value transmission and value change are two different processes. The first aim of our study was to describe similarities and differences in values of young women and their parents. The second aim was to determine which value similarities may be due to transmission within families. Ninety seven Polish women aged 19-25 and both their mothers and fathers filled in the Portrait Value Questionaire. Intergenerational similarities in values between women were found in strong preference for benevolence, universalism and self-direction as well as low preference for power. Similarities between younger women and older men were found in strong preference for universalism and hedonism as well as lower preference for security and tradition. Young women differed from older generation in strong preference for stimulation and achievement as well as low preference for conformity. To identify the origin of intergenerational similarities (whether they are the effect of value transmission within families or not), we used the comparison between correlations of values in family dyads (mother-daughter, father-daughter) and distribution of correlations in random intergenerational dyads (random mother-daughter, random father-daughter) as well as peer dyads (random daughter-daughter). Values representing conservation (security, tradition and conformity) as well as benevolence and power were transmitted in families between women. Achievement, power and security were transmitted between fathers and daughters. Similarities in openness to change (self-direction, stimulation and hedonism) and universalism were not stronger within families than in random intergenerational and peer dyads. Taken together, our findings suggest that despite noticeable generation shift from social to more individualistic values, we can observe transmission of parents’ salient values such as security, tradition, benevolence and achievement.

Keywords: value transmission, value change, intergenerational similarities, differences in values

Procedia PDF Downloads 426
11381 The Effect of Climate on Noble Houses of Siraf in the Early Islamic Centuries (Case Study: House N)

Authors: Mohadese Sukhtesaraii, Mohammad Esmail Esmaili Jelodar, Kosar Sookhtesaraii

Abstract:

Throughout history, humans have always wanted to have a shelter to live in, and this need and desire became the beginning of building and architecture. It was necessary to build a shelter and a building, dealing with the surrounding nature. The design and construction of architectural spaces are always influenced by nature, climate, and geographical location, and It is believed clearly see this influence even in the use of materials used in the construction of architectural buildings. The historical port of Siraf is located on the northern coast of the Persian Gulf in Bushehr province and 38 km from Kangan port. Geographically and climatically, Siraf is considered one of the hot and humid areas. The Zagros mountains, which continue from the Iranian plateau to the sea, end at Bandar Siraf; As a result, it creates a strip one kilometer wide by the sea. The location of Siraf in the restrictive conditions of the mountains and the sea has made it impossible to expand the city. The main goal of the current research is to investigate the climate of Siraf and the influence of the region's climate on the architecture and design of residential buildings in Siraf, known as noble houses, in the early Islamic centuries. In this research, it is looking for an answer to the question of how the climatic and geographical conditions have affected the architecture of Siraf buildings. The theoretical framework of this research can be expressed based on the influence of climate on the historical architecture of Bandar Seraf and the spatial analysis of archeology. Also, the research method will be analytical-descriptive and using field and library studies. The authors of the article believe that the architectural spaces of the early Islamic centuries of Siraf city were affected by the climate and geographical location, and the architects started building buildings by considering factors such as the sun's radiation, wind direction, and the position of the mountains and the sea. To use the regional and environmental potential for buildings.

Keywords: hose N, noble hose, islamic era, siraf, climate

Procedia PDF Downloads 81
11380 West Meets Islam in Contemporary World, Leadership Perspective

Authors: Muhamad Rosdi Senam, Khairuddin Abdul Rashid, Azila Ahmad Sarkawi, Rapiah Mohd Zaini

Abstract:

Islam is a way of life than merely a religion that covers all facets of Muslim affairs and lifes. It provides the most comprehensive values, principles and guidance that are based on divine sources to all mankind in all spheres including leadership. Islamic leadership is all encompassing and holistic model of leadership that offers the tauhidic paradigm, spiritual and ethical (akhlaq) dimensions that are absent in the modern conventional leadership theories. Islamic leadership has a glorious history of great success from the era of the Prophet S.A.W. and the following caliphs that had conquered almost one third of the world territory during that time, as their leadership was paragon of excellence that followed to the spirits and teachings of the Qur’an and the Sunnah. As the modern civilisation designed by the West takes place, the modern leadership theories has been dominating the world and literature including those in the Muslim countries. However, it is clear that values and principles derived from Islam and the West are distinct, as the Islamic ones are based on divine, the non-Islamics are not indeed as there are based on human rational and judgement. Recent development in business organisations and literature have seen the tendency towards moral, ethical, even spiritual and positive form of leadership such as servant leadership, ethical leadership, authentic leadership and spiritual leadership that found its root in the Islamic model of leadership.This development has surfaced after series of serious ethical dilemma, corporate scandals and leadership crisis in the West. This paper aims to draw a comparative discussions and analysis between the modern conventional leadership theories with the Islamic leadership by highlighting the key dimensions that distinguish the two. It is suggested in this paper that the core dimensions of Islamic leadership are spiritual dimension, moral and ethical dimension and physical dimension which is also paralleled with the roles of khalifah of Allah on earth; relationship with Allah, relationship with human beings and relationship with the environment respectively. Islam is a way of life than merely a religion that covers all facets of Muslim affairs and lifes. It provides the most comprehensive values, principles and guidance that are based on divine sources to all mankind in all spheres including leadership. Islamic leadership is all encompassing and holistic model of leadership that offers the tauhidic paradigm, spiritual and ethical (akhlaq) dimensions that are absent in the modern conventional leadership theories. Islamic leadership has a glorious history of great success from the era of the Prophet S.A.W. and the following caliphs that had conquered almost one third of the world territory during that time, as their leadership was paragon of excellence that followed to the spirits and teachings of the Qur’an and the Sunnah. As the modern civilisation designed by the West takes place, the modern leadership theories has been dominating the world and literature including those in the Muslim countries. However, it is clear that values and principles derived from Islam and the West are distinct, as the Islamic ones are based on divine, the non-Islamics are not indeed as there are based on human rational and judgement. Recent development in business organisations and literature have seen the tendency towards moral, ethical, even spiritual and positive form of leadership such as servant leadership, ethical leadership, authentic leadership and spiritual leadership that found its root in the Islamic model of leadership.This development has surfaced after series of serious ethical dilemma, corporate scandals and leadership crisis in the West. This paper aims to draw a comparative discussions and analysis between the modern conventional leadership theories with the Islamic leadership by highlighting the key dimensions that distinguish the two. It is suggested in this paper that the core dimensions of Islamic leadership are spiritual dimension, moral and ethical dimension and physical dimension which is also paralleled with the roles of khalifah of Allah on earth; relationship with Allah, relationship with human beings and relationship with the environment respectively.

Keywords: conventional leadership, Islamic leadership, comparative, dimensions

Procedia PDF Downloads 522
11379 Relationships between Social Entrepreneurship, CSR and Social Innovation: In Theory and Practice

Authors: Krisztina Szegedi, Gyula Fülöp, Ádám Bereczk

Abstract:

The shared goal of social entrepreneurship, corporate social responsibility and social innovation is the advancement of society. The business model of social enterprises is characterized by unique strategies based on the competencies of the entrepreneurs, and is not aimed primarily at the maximization of profits, but rather at carrying out goals for the benefit of society. Corporate social responsibility refers to the active behavior of a company, by which it can create new solutions to meet the needs of society, either on its own or in cooperation with other social stakeholders. The objectives of this article are to define concepts, describe and integrate relevant theoretical models, develop a model and introduce some examples of international practice that can inspire initiatives for social development.

Keywords: corporate social responsibility, CSR, social innovation, social entrepreneurship

Procedia PDF Downloads 318
11378 Ethics and Military Defections in Nonviolent Resistance Campaigns

Authors: Adi Levy

Abstract:

Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application.

Keywords: culpability, defections, nonviolence, permissibility

Procedia PDF Downloads 111
11377 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 324
11376 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 368
11375 Harmonization of Conflict Ahadith between Dissociation and Peaceful Co-Existence with Non-Muslims

Authors: Saheed Biodun Qaasim-Badmusi

Abstract:

A lot has been written on peaceful co-existence with non-Muslims in Islam, but little attention is paid to the conflict between Ahadith relating to dissociation from non-Muslims as a kernel of Islamic faith, and the one indicating peaceful co-existence with them. Undoubtedly, proper understanding of seemingly contradictory prophetic traditions is an antidote to the bane of pervasive extremism in our society. This is what calls for need to shed light on ‘Harmonization of Conflict Ahadith between Dissociation and Peaceful Co-existence with Non-Muslims. It is in view of the above that efforts are made in this paper to collate Ahadith pertaining to dissociation from non-Muslims as well as co-existence with them. Consequently, a critical study of their authenticity is briefly explained before proceeding to analysis of their linguistic and contextual meanings. To arrive at the accurate interpretation, harmonization is graphically applied. The result shows that dissociation from non –Muslims as a bedrock of Islamic faith could be explained in Sunnah by prohibition of participating or getting satisfaction from their religious matters, and anti-Islamic activities. Also, freedom of apostasy, ignoring da`wah with wisdom and seeking non-Muslims support against Muslims are frowned upon in Sunnah as phenomenon of dissociation from non –Muslims. All the aforementioned are strictly prohibited in Sunnah whether under the pretext of enhancing peaceful co-existence with non-Muslims or not. While peaceful co-existence with non-Muslims is evidenced in Sunnah by permissibility of visiting the sick among them, exchange of gift with them, forgiving the wrong among them, having good relationship with non-Muslim neighbours, ties of non-Muslim kinship, legal business transaction with them and the like. Finally, the degree of peaceful co-existence with non-Muslims is determined by their attitude towards Islam and Muslims.

Keywords: Ahadith, conflict, co-existence, non-Muslims

Procedia PDF Downloads 142
11374 Digital Literacy Landscape of Islamic Boarding Schools in Indonesia

Authors: Zainuddin Abuhamid Muhammad Ghozali, Andrew Whitworth

Abstract:

Islamic boarding school or pesantren is a distinctive education institution in Indonesia focusing on religious teachings. Its stance in restricting access to the internet raises a question about its students’ development of digital literacy. Inspired by Luckin’s ecology of resource model, this study aims to map out the digital literacy situation of the institution based on the availability of learning resources, such as digital facilities, digital accessibility, and digital competence. This study was carried out through a survey method involving 50 teachers from pesantrens across the nation. The result shows that pesantrens have provided students with digital facilities at a moderate level, yet the accessibility to using them is still limited. They also incorporated digital competencies into their curriculum, with an emphasis on digital ethics. The study also identifies different patterns of pesantrens’ behavior based on types and educational levels, where certain school types and educational levels tend to give a stricter policy compared to others or vice versa. The restriction of digital resources in pesantren indicated that they had done a filtration process to design their learning environment. The filtration was mainly motivated by sociocultural factors, where they drew concern for the negative impact of the internet. Notably, this restriction also contributes to students’ poor development of digital literacy.

Keywords: digital literacy, ecology of resources, Indonesia, Islamic boarding school

Procedia PDF Downloads 65