Search results for: cyber threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 954

Search results for: cyber threats

174 Sustainable Development Change within Our Environs

Authors: Akinwale Adeyinka

Abstract:

Critical natural resources such as clean ground water, fertile topsoil, and biodiversity are diminishing at an exponential rate, orders of magnitude above that at which they can be regenerated. Based on news on world population record, over 6 billion people on earth, and almost a quarter million added each day, the scale of human activity and environmental impact is unprecedented. Soaring human population growth over the past century has created a visible challenge to earth’s life support systems. In addition, the world faces an onslaught of other environmental threats including degenerated global climate change, global warming, intensified acid rain, stratospheric ozone depletion and health threatening pollution. Overpopulation and the use of deleterious technologies combine to increase the scale of human activities to a level that underlies these entire problems. These intensifying trends cannot continue indefinitely, hopefully, through increased understanding and valuation of ecosystems and their services, earth’s basic life-support system will be protected for the future.To say the fact, human civilization is now the dominant cause of change in the global environment. Now that our relationship to the earth has change so utterly, we have to see that change and understand its implication. These are actually 2 aspects to the challenges which we should believe. The first is to realize that our power to harm the earth can indeed have global and even permanent effects. Second is to realize that the only way to understand our new role as a co-architect of nature is to see ourselves as part of a complex system that does operate according to the same simple rules of cause and effect we are used to. So understanding the physical/biological dimension of earth system is an important precondition for making sensible policy to protect our environment. Because we believe Sustainable Development Is a matter of reconciling respect for the environment, social equity and economic profitability. Also, we strongly believe that environmental protection is naturally about reducing air and water pollution, but it also includes the improvement of the environmental performance of existing process. That is why we should always have it at the heart of our business that the environmental problem is not our effect on the environment so much as our relationship with the environment. We should always think of being environmental friendly in our operation.

Keywords: Stratospheric ozone depletion ion , Climate Change, global warming, social equity and economic profitability

Procedia PDF Downloads 337
173 Transformation of ectA Gene From Halomonas elongata in Tomato Plant

Authors: Narayan Moger, Divya B., Preethi Jambagi, Krishnaveni C. K., Apsana M. R., B. R. Patil, Basvaraj Bagewadi

Abstract:

Salinity is one of the major threats to world food security. Considering the requirement for salt tolerant crop plants in the present study was undertaken to clone and transferred the salt tolerant ectA gene from marine ecosystem into agriculture crop system to impart salinity tolerance. Ectoine is the compatible solute which accumulates in the cell membrane, is known to be involved in salt tolerance activity in most of the Halophiles. The present situation is insisting to development of salt tolerant transgenic lines to combat abiotic stress. In this background, the investigation was conducted to develop transgenic tomato lines by cloning and transferring of ectA gene is an ectoine derivative capable of enzymatic action for the production of acetyl-diaminobutyric acid. The gene ectA is involved in maintaining the osmotic balance of plants. The PCR amplified ectA gene (579bp) was cloned into T/A cloning vector (pTZ57R/T). The construct pDBJ26 containing ectA gene was sequenced by using gene specific forward and reverse primers. Sequence was analyzed using BLAST algorithm to check similarity of ectA gene with other isolates. Highest homology of 99.66 per cent was found with ectA gene sequences of isolates Halomonas elongata with the available sequence information in NCBI database. The ectA gene was further sub cloned into pRI101-AN plant expression vector and transferred into E. coli DH5α for its maintenance. Further pDNM27 was mobilized into A. tumefaciens LBA4404 through tri-parental mating system. The recombinant Agrobacterium containing pDNM27 was transferred into tomato plants through In planta plant transformation method. Out of 300 seedlings, co-cultivated only twenty-seven plants were able to well establish under the greenhouse condition. Among twenty-seven transformants only twelve plants showed amplification with gene specific primers. Further work must be extended to evaluate the transformants at T1 and T2 generations for ectoine accumulation, salinity tolerance, plant growth and development and yield.

Keywords: salinity, computable solutes, ectA, transgenic, in planta transformation

Procedia PDF Downloads 81
172 The Impact of National Social Intervention Programme (NSIP) on Poverty Alleviation and Insecurity in Nigeria (2016 – 2023)

Authors: Opeyemi Awau Adepoju

Abstract:

The task of nation-building for Nigeria, like other developing nations, has continued to be riddled with audacious challenges that kept threatening to consume the state itself. Among the destabilizing factors that are sometimes mutually reinforcing are poverty and insecurity. Nigeria has been bedeviled with poverty since the onset of the 1980s when the country metamorphosed from an agricultural to an oil-based economy coupled with unbridled political corruption and wasteful management of resources by successive governments. The crippling poverty started manifesting in the scourge of criminalities and a general state of insecurity. Poverty gradually becomes the breeder of insecurity and threats to human life in Nigeria. Interestingly, successive governments tended to recognize the destructive tendencies of poverty and took several interventionist initiatives towards abating or slowing down the spate of poverty so as to reverse the trend of insecurity, but none of those initiatives can be adjudged good or enduring legacies. The emergence of the Buhari administration in 2015 provided a new opportunity to tackle poverty and, in turn, insecurity that had permeated every aspect of national life before that year’s presidential elections. Expectedly, the government took ambitious steps through its innovative ideas of intervention through its National Social Intervention Programmes (NSIP). Therefore, this paper is an assessment of the Buhari administration’s initiatives in poverty eradication in Nigeria as one of its strategies to fight insecurity, and the paper adopted a qualitative approach. The theoretical arguments put up by this paper are with respect to the connection between poverty and insecurity sourced from the theory of Relative Deprivation. The paper found that the Buhari administration has done better than any government since 1999 in inventing a social intervention program and that the poverty of the people has been addressed to a notable extent. However, the problem of politicization of intervention programs has continued to be the practice under the administration, and if this is not abated, the post-Buhari era may as well be like the eras before it. The paper recommends legislation that can make poverty ameliorating programs permanent, at least for some years to come, so as to avoid the usual policy summersault at every instance of political transition, which has limited the sustainability of public policies and indeed hindered nation-building efforts in Nigeria.

Keywords: insecurity, poverty alleviation, public policies, social intervention

Procedia PDF Downloads 55
171 Comprehensive Multilevel Practical Condition Monitoring Guidelines for Power Cables in Industries: Case Study of Mobarakeh Steel Company in Iran

Authors: S. Mani, M. Kafil, E. Asadi

Abstract:

Condition Monitoring (CM) of electrical equipment has gained remarkable importance during the recent years; due to huge production losses, substantial imposed costs and increases in vulnerability, risk and uncertainty levels. Power cables feed numerous electrical equipment such as transformers, motors, and electric furnaces; thus their condition assessment is of a very great importance. This paper investigates electrical, structural and environmental failure sources, all of which influence cables' performances and limit their uptimes; and provides a comprehensive framework entailing practical CM guidelines for maintenance of cables in industries. The multilevel CM framework presented in this study covers performance indicative features of power cables; with a focus on both online and offline diagnosis and test scenarios, and covers short-term and long-term threats to the operation and longevity of power cables. The study, after concisely overviewing the concept of CM, thoroughly investigates five major areas of power quality, Insulation Quality features of partial discharges, tan delta and voltage withstand capabilities, together with sheath faults, shield currents and environmental features of temperature and humidity; and elaborates interconnections and mutual impacts between those areas; using mathematical formulation and practical guidelines. Detection, location, and severity identification methods for every threat or fault source are also elaborated. Finally, the comprehensive, practical guidelines presented in the study are presented for the specific case of Electric Arc Furnace (EAF) feeder MV power cables in Mobarakeh Steel Company (MSC), the largest steel company in MENA region, in Iran. Specific technical and industrial characteristics and limitations of a harsh industrial environment like MSC EAF feeder cable tunnels are imposed on the presented framework; making the suggested package more practical and tangible.

Keywords: condition monitoring, diagnostics, insulation, maintenance, partial discharge, power cables, power quality

Procedia PDF Downloads 228
170 Using MALDI-TOF MS to Detect Environmental Microplastics (Polyethylene, Polyethylene Terephthalate, and Polystyrene) within a Simulated Tissue Sample

Authors: Kara J. Coffman-Rea, Karen E. Samonds

Abstract:

Microplastic pollution is an urgent global threat to our planet and human health. Microplastic particles have been detected within our food, water, and atmosphere, and found within the human stool, placenta, and lung tissue. However, most spectrometric microplastic detection methods require chemical digestion which can alter or destroy microplastic particles and makes it impossible to acquire information about their in-situ distribution. MALDI TOF MS (Matrix-assisted laser desorption ionization-time of flight mass spectrometry) is an analytical method using a soft ionization technique that can be used for polymer analysis. This method provides a valuable opportunity to both acquire information regarding the in-situ distribution of microplastics and also minimizes the destructive element of chemical digestion. In addition, MALDI TOF MS allows for expanded analysis of the microplastics including detection of specific additives that may be present within them. MALDI TOF MS is particularly sensitive to sample preparation and has not yet been used to analyze environmental microplastics within their specific location (e.g., biological tissues, sediment, water). In this study, microplastics were created using polyethylene gloves, polystyrene micro-foam, and polyethylene terephthalate cable sleeving. Plastics were frozen using liquid nitrogen and ground to obtain small fragments. An artificial tissue was created using a cellulose sponge as scaffolding coated with a MaxGel Extracellular Matrix to simulate human lung tissue. Optimal preparation techniques (e.g., matrix, cationization reagent, solvent, mixing ratio, laser intensity) were first established for each specific polymer type. The artificial tissue sample was subsequently spiked with microplastics, and specific polymers were detected using MALDI-TOF-MS. This study presents a novel method for the detection of environmental polyethylene, polyethylene terephthalate, and polystyrene microplastics within a complex sample. Results of this study provide an effective method that can be used in future microplastics research and can aid in determining the potential threats to environmental and human health that they pose.

Keywords: environmental plastic pollution, MALDI-TOF MS, microplastics, polymer identification

Procedia PDF Downloads 256
169 The Medieval Byzantine Churches at Trebizond (Trabzon): Promotion of Local Awareness and Conservation through Interpretation and Presentation

Authors: Esra Ceren Kara, Ufuk Seri̇n

Abstract:

The Byzantine Empire, which persisted from the 4th to 15th centuries, covered a significant period in history and bequeathed a significant cultural heritage throughout its territories, including Turkey. However, despite its historical and cultural importance, the approach of the political authorities, which emphasizes the Seljuk and Ottoman heritage, to Byzantium in Turkey is reluctant and problematic. Byzantine history and culture have long been neglected and attained negative connotations. This has led to a lack of awareness and understanding of Byzantine heritage among the public and inadequate conservation efforts. This research aims to address this problem by proposing a reinterpretation and presentation of Byzantine heritage in Turkey that emphasizes its cultural value and presents it to the public as a part of a common cultural heritage in order to accomplish effective conservation, raise awareness and provide a better understanding of the Byzantium. In this article, the ways to interpret, present and integrate the Medieval Byzantine heritage into today’s world are analyzed through the selected case study of Trebizond (Trabzon) with a holistic approach by putting emphasis on the Byzantine religious edifices, churches, chapels and monasteries. Although the vestiges of this period are still intact and in use today, their past is unknown to many of their users. This situation is even more evident in the case of the converted churches, which are now used as mosques or mosque-museums. In the city center of Trebizond, 9 out of 12 religious edifices that are still in use were built during the Medieval Byzantine period and converted into mosques under Ottoman and Turkish rule. Currently, these monuments serve as mosques and mosque-museums. However, with the exception of Hagia Sophia and Girls Monastery, their Byzantine past is obscure to many locals. Thus, the promotion of local awareness and conservation of the Medieval Byzantine heritage in the city is required. With this premise, this research will investigate the values and opportunities offered by the Byzantine cultural heritage in Trebizond and the threats to its conservation, and it will offer proposals for a more effective interpretation and presentation so as to foster local awareness and integration of the Medieval Byzantine heritage.

Keywords: Byzantium/Byzantine, Trebizond, cultural heritage, interpretation and presentation, conservation, religious architecture, converted churches interpretation and presentation

Procedia PDF Downloads 78
168 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses

Authors: John Hardy, Paul Lushenko

Abstract:

he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.

Keywords: gray zone, international security, military operations, national security, strategy

Procedia PDF Downloads 158
167 Managing Maritime Security in the Mediterranean Sea: The Roles of the EU in Tackling Irregular Migration

Authors: Shazwanis Shukri

Abstract:

The Mediterranean Sea, at the crossroads of three continents has always been the focus of pan-European and worldwide attention. Over the past decade, the Mediterranean Sea has become a hotbed for irregular migration particularly from the African continent toward the Europe. Among the major transit routes in the Mediterranean Sea include the Strait of Gibraltar, Canary Island and island of Lampedusa. In recent years, Mediterranean Sea has witnessed significant numbers of accidents and shipwrecks involving the irregular migrants and refugees trying to reach Europe via the sea. The shipwrecks and traffickers exploitation of migrants draw most of the attention particularly for the European Union (EU). This incident has been a wakeup call for the EU and become the top political agenda in the EU policy to tackle irregular migration and human smuggling at sea. EU has repeatedly addressed irregular migration as one of the threats the EU and its citizens may be confronted with and therefore immediate measures are crucial to tackle the crisis. In light of this, various initiatives have been adopted by the EU to strengthen external border control and restrict access to irregular migrants, notably through the enforcement of Frontex and Eunavfor Med. This paper analyses current development of counter-migration operations by the EU in response to migration crisis in the Mediterranean Sea. The analysis is threefold. First, this study examines the patterns and trends of irregular migration’s movements from recent perspective. Second, this study concentrates on the evolution of the EU operations that are in place in the Mediterranean Sea, notably by Frontex and Eunavfor Med to curb the influx of irregular migrants to the European countries, including, among others, Greece and Italy. Third, this study investigates the EU approaches to fight against the proliferation of human trafficking networks at sea. This study is essential to determine the roles of the EU in tackling migration crisis and human trafficking in the Mediterranean Sea and the effectiveness of their counter-migration operations to reduce the number of irregular migrants travelling via the sea. Elite interviews and document analysis were used as a methodology in this study. The study discovers that the EU operations have successfully contributed to reduce the numbers of irregular migrant’s arrival to Europe. The study also shows that the operations were effective to disrupt smugglers business models particularly from Libya. This study provides essential understanding about the roles of the EU not limited to tackle the migration crisis and disrupt trafficking networks, but also pledged to prevent further loss of lives at sea.

Keywords: European union, frontex, irregular migration, Mediterranean sea

Procedia PDF Downloads 328
166 China Global Policy through the Shanghai Cooperation Organization

Authors: Enayatollah Yazdani

Abstract:

In the post-Cold War era, the world is facing a new emerging global order with the rise of multiple actors in the international arena. China, as a rising global power, has great leverage in internal relations. In particular, during the last two decades, China has rapidly transformed its economy into a global leader in advanced technologies. As a rising power and as one of the two major founding members of the Shanghai Cooperation Organization (SCO), China has tried to use this regional organization, which has the potential to become an important political and security organization of the major states located in the vast Eurasian landmass, for its “go global” strategy. In fact, for Beijing, the SCO represents a new and unique cooperation model, reflecting its vision of a multipolar world order. China has used the SCO umbrella as a multilateral platform to address external threats posed by non-state actors on its vulnerable western border; to gain a strong economic and political foothold in Central Asia without putting the Sino-Russian strategic partnership at risk; and to enhance its energy security through large-scale infrastructure investment in, and trade with, the Central Asian member states. In other words, the SCO is one of the successful outcomes of Chines foreign policy in the post-Cold War era. The expansion of multilateral ties all over the world by dint of pursuing institutional strategies as SCO identifies China as a more constructive power. SCO became a new model of cooperation that was formed on the remains of collapsed Soviet system and predetermined China's geopolitical role in the region. As the fast developing effective regional mechanism, SCO now has more of an external impact on the international system and forms a new type of interaction for promoting China's grand strategy of 'peaceful rise.' This paper aims to answer this major question: How the Chinese government has manipulated the SCO for its foreign policy and global and regional influence? To answer this question, the main discussion is that with regard to the SCO capabilities and politico-economic potential, this organization has been used by China as a platform to expand influence beyond its borders.

Keywords: China, the Shanghai Cooperation Organization (SCO), Central Asia, global policy, foreign policy

Procedia PDF Downloads 65
165 Study on Impact of Existence of an Open Boundary Foreign Enclave and a 24-Hours Open Corridor for Foreigners inside Indian Territory

Authors: Debarshi Bhattacharya

Abstract:

In 2015, historic Land Boundary Agreement (LBA) executed between India and Bangladesh finally settled almost seven decades long overdue critical enclave problems of the two neighbouring countries. Enclaves within India and Bangladesh were the awful outcome of the partition of India in 1947. As a dire consequence, the populace within these enclaves enormously suffered from getting basic rights and opportunities and governmental support services till long 67 years after India’s independence and partition. As per LBA, 2015, 51 Bangladeshi (BD) enclaves inside Indian territory and 111 Indian enclaves inside Bangladesh territory were actually transferred to each other. But, by virtue of LBA, 1974 executed earlier between the two countries, one BD enclave situated inside India, namely Dohogram-Angarpota (D-A) twin enclave, had not yet been exchanged by means of LBA, 2015 and it still remains as an integral part, may not be contiguous, of Bangladesh completely surrounded by Indian territory. A study was undertaken through an extensive field survey to assess the impact of the existence of D-A BD enclave inside Indian territory from India’s perspective. Field survey was conducted for the purpose in the form of an interview, group discussion, questionnaire survey, personal interaction etc. to gather information from the Indian people residing adjacent to D-A enclave and Tin Bigha Corridor (TBC), people of D-A enclave, officials of Border Security Forces of India and Bangladesh, public representatives, representatives of political organizations etc. The issue of the existence of D-A BD enclave inside Indian territory seriously brought apprehension of future problems to the people of Kuchlibari Region of Mekhligunj Block, India, on its contiguity with Indian mainland due to 24-hour open access for the BD people through TBC. The anxiety of the local Indian people regarding threats to the national security of India as well as to the law and order issues of the locality due to the open border of D-A BD enclave in the region. On the other hand, it was observed that 24 hours opening of TBC brought significant positive changes to the people of D-A BD enclave in terms of their socio-economic condition and security status.

Keywords: enclave, exchange of enclaves, land boundary agreement, Dohogram-Angarpota (D-A) Bangladeshi (BD) enclave, Tin Bigha Corridor

Procedia PDF Downloads 85
164 Analysis of Social Factors for Achieving Social Resilience in Communities of Indonesia Special Economic Zone as a Strategy for Developing Program Management Frameworks

Authors: Inda Annisa Fauzani, Rahayu Setyawati Arifin

Abstract:

The development of Special Economic Zones in Indonesia cannot be separated from the development of the communities in them. In accordance with the SEZ's objectives as a driver of economic growth, the focus of SEZ development does not only prioritize investment receipts and infrastructure development. The community as one of the stakeholders must also be considered. This becomes a challenge when the development of an SEZ has the potential to have an impact on the community in it. These impacts occur due to changes in the development of the area in the form of changes in the main regional industries and changes in the main livelihoods of the community. As a result, people can feel threats and disturbances. The community as the object of development is required to be able to have resilience in order to achieve a synergy between regional development and community development. A lack of resilience in the community can eliminate the ability to recover from disturbances and difficulty to adapt to changes that occur in their area. Social resilience is the ability of the community to be able to recover from disturbances and changes that occur. The achievement of social resilience occurs when the community gradually has the capacity in the form of coping capacity, adaptive capacity, and transformative capacity. It is hoped that when social resilience is achieved, the community will be able to develop linearly with regional development so that the benefits of this development can have a positive impact on these communities. This study aims to identify and analyze social factors that influence the achievement of social resilience in the community in Special Economic Zones in Indonesia and develop a program framework for achieving social resilience capacity in the community so that it can be used as a strategy to support the successful development of Special Economic Zones in Indonesia that provide benefits to the local community. This study uses a quantitative research method approach. Questionnaires are used as research instruments which are distributed to predetermined respondents. Respondents in this study were determined by using purposive sampling of the people living in areas that were developed into Special Economic Zones. Respondents were given a questionnaire containing questions about the influence of social factors on the achievement of social resilience. As x variables, 42 social factors are provided, while social resilience is used as y variables. The data collected from the respondents is analyzed in SPSS using Spearman Correlation to determine the relation between x and y variables. The correlated factors are then used as the basis for the preparation of programs to increase social resilience capacity in the community.

Keywords: community development, program management, social factor, social resilience

Procedia PDF Downloads 111
163 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 167
162 Digital Twins: Towards an Overarching Framework for the Built Environment

Authors: Astrid Bagireanu, Julio Bros-Williamson, Mila Duncheva, John Currie

Abstract:

Digital Twins (DTs) have entered the built environment from more established industries like aviation and manufacturing, although there has never been a common goal for utilising DTs at scale. Defined as the cyber-physical integration of data between an asset and its virtual counterpart, DT has been identified in literature from an operational standpoint – in addition to monitoring the performance of a built asset. However, this has never been translated into how DTs should be implemented into a project and what responsibilities each project stakeholder holds in the realisation of a DT. What is needed is an approach to translate these requirements into actionable DT dimensions. This paper presents a foundation for an overarching framework specific to the built environment. For the purposes of this research, the UK widely used the Royal Institute of British Architects (RIBA) Plan of Work from 2020 is used as a basis for itemising project stages. The RIBA Plan of Work consists of eight stages designed to inform on the definition, briefing, design, coordination, construction, handover, and use of a built asset. Similar project stages are utilised in other countries; therefore, the recommendations from the interviews presented in this paper are applicable internationally. Simultaneously, there is not a single mainstream software resource that leverages DT abilities. This ambiguity meets an unparalleled ambition from governments and industries worldwide to achieve a national grid of interconnected DTs. For the construction industry to access these benefits, it necessitates a defined starting point. This research aims to provide a comprehensive understanding of the potential applications and ramifications of DT in the context of the built environment. This paper is an integral part of a larger research aimed at developing a conceptual framework for the Architecture, Engineering, and Construction (AEC) sector following a conventional project timeline. Therefore, this paper plays a pivotal role in providing practical insights and a tangible foundation for developing a stage-by-stage approach to assimilate the potential of DT within the built environment. First, the research focuses on a review of relevant literature, albeit acknowledging the inherent constraint of limited sources available. Secondly, a qualitative study compiling the views of 14 DT experts is presented, concluding with an inductive analysis of the interview findings - ultimately highlighting the barriers and strengths of DT in the context of framework development. As parallel developments aim to progress net-zero-centred design and improve project efficiencies across the built environment, the limited resources available to support DTs should be leveraged to propel the industry to reach its digitalisation era, in which AEC stakeholders have a fundamental role in understanding this, from the earliest stages of a project.

Keywords: digital twins, decision-making, design, net-zero, built environment

Procedia PDF Downloads 122
161 Expectations of Unvaccinated Health Workers in Greece and the Question of Trust: A Qualitative Study of Vaccine Hesitancy

Authors: Sideri Katerina, Chanania Eleni

Abstract:

The reasons why people remain unvaccinated, especially health workers, are complex. In Greece, 2 percent of health workers (around 7,000) remain unvaccinated, despite the fact that for this group of people vaccination against COVID-19 is mandatory. In April 2022, the Greek health minister repeated that unvaccinated health care workers will remain suspended from their jobs ‘for as long as the pandemic lasts,’ explaining that the suspension of the workers in question was ‘entirely their choice’ and that health professionals who do not believe in vaccines ‘do not believe in their own science.’ Although policy circles around the world often link vaccine hesitancy to ignorance of science or misinformation, various recently published qualitative studies show that vaccine hesitancy is the result of a combination of factors, which include distrust towards elites and the system of innovation and distrust towards government. In a similar spirit, some commentators warn that labeling hesitancy as “anti-science” is bad politics. In this paper, we worked within the tradition of STS taking the view that people draw upon personal associations to enact and express civic concern with an issue, the enactment of public concern involves the articulation of threats to actors’ way of life, personal values, relationships, lived experiences, broader societal values and institutional structures. To this effect, we have conducted 27 in depth interviews with unvaccinated Greek health workers and we are in the process of conducting 20 more interviews. We have so far found that rather than a question of believing in ‘facts’ vaccine hesitancy reflects deep distrust towards those charged with the making of decisions and pharmaceutical companies and that emotions (rather than rational thinking) play a crucial role in the formation of attitudes and the making of decisions. We need to dig deeper so as to understand the causes of distrust towards technical government and the ways in which public(s) conceive of and want to be part in the politics of innovation. We particularly address the question of the effectiveness of mandatory vaccination of health workers and whether such top-down regulatory measures further polarize society, to finally discuss alternative regulatory approaches and governance structures.

Keywords: vaccine hesitancy, innovation, trust in vaccines, sociology of vaccines, attitude drivers towards scientific information, governance

Procedia PDF Downloads 74
160 Chronic Renal Failure Associated with Heavy Metal Contamination of Drinking Water in Hail, Kingdom of Saudi Arabia

Authors: Elsayed A. M. Shokr, A. Alhazemi, T. Naser, Talal A. Zuhair, Adel A. Zuhair, Ahmed N. Alshamary, Thamer A. Alanazi, Hosam A. Alanazi

Abstract:

The main threats to human health from heavy metals are associated with exposure to Pb, Cd, Cu, Mo, Zn, Ni, Mn Co and Cr. is mainly via intake of drinking water being the most important source in most populations. These metals have been extensively studied and their effects on human health regularly reviewed by international bodies such as the WHO. Heavy metals have been used by humans for thousands of years. Although several adverse health effects of heavy metals have been known for a long time, exposure to heavy metals continues, and is even increasing in some parts of the world, in particular in less developed countries, though emissions have declined in most developed countries over the last 100 years. A strong relationship between contaminated drinking water with heavy metals from some of the stations of water shopping in Hail, KSA and chronic diseases such as renal failure, liver cirrhosis, and chronic anemia has been identified in this study. These diseases are apparently related to contaminant drinking water with heavy metals such as Pb, Cd, Cu, Mo, Zn, Ni, Mn Co and Cr. Renal failure is related to contaminate drinking water with lead and cadmium, liver cirrhosis to copper and molybdenum, and chronic anemia to copper and cadmium. Recent data indicate that adverse health effects of cadmium exposure may occur at lower exposure levels than previously anticipated, primarily in the form of kidney damage but possibly also bone effects and fractures. The general population is primarily exposed to mercury via drinking water being a major source of methyl mercury exposure, and dental amalgam. During the last century lead, cadmium, zinc, iron and arsenic is mainly via intake of drinking water being the most important source in most populations. Long-term exposure to lead, cadmium, zinc, iron and arsenic in drinking-water is mainly related to primarily in the form of kidney damage. Studies of these diseases suggest that abnormal incidence in specific areas is related to toxic materials in the groundwater and thereby led to the contamination of drinking water in these areas.

Keywords: heavy metals, liver functions, kidney functions and chronic renal failure, hail, renal, water

Procedia PDF Downloads 320
159 Effect of Repellent Coatings, Aerosol Protective Liners, and Lamination on the Properties of Chemical/Biological Protective Textiles

Authors: Natalie Pomerantz, Nicholas Dugan, Molly Richards, Walter Zukas

Abstract:

The primary research question to be answered for Chemical/Biological (CB) protective clothing, is how to protect wearers from a range of chemical and biological threats in liquid, vapor, and aerosol form, while reducing the thermal burden. Currently, CB protective garments are hot, heavy, and wearers are limited by short work times in order to prevent heat injury. This study demonstrates how to incorporate different levels of protection on a material level and modify fabric composites such that the thermal burden is reduced to such an extent it approaches that of a standard duty uniform with no CB protection. CB protective materials are usually comprised of several fabric layers: a cover fabric with a liquid repellent coating, a protective layer which is comprised of a carbon-based sorptive material or semi-permeable membrane, and a comfort next-to-skin liner. In order to reduce thermal burden, all of these layers were laminated together to form one fabric composite which had no insulative air gap in between layers. However, the elimination of the air gap also reduced the CB protection of the fabric composite. In order to increase protection in the laminated composite, different nonwoven aerosol protective liners were added, and a super repellent coating was applied to the cover fabric, prior to lamination. Different adhesive patterns were investigated to determine the durability of the laminate with the super repellent coating, and the effect on air permeation. After evaluating the thermal properties, textile properties and protective properties of the iterations of these fabric composites, it was found that the thermal burden of these materials was greatly reduced by decreasing the thermal resistance with the elimination of the air gap between layers. While the level of protection was reduced in laminate composites, the addition of a super repellent coating increased protection towards low volatility agents without impacting thermal burden. Similarly, the addition of aerosol protective liner increased protection without reducing water vapor transport, depending on the nonwoven used, however, the air permeability was significantly decreased. The balance of all these properties and exploration of the trade space between thermal burden and protection will be discussed.

Keywords: aerosol protection, CBRNe protection, lamination, nonwovens, repellent coatings, thermal burden

Procedia PDF Downloads 363
158 Low Energy Technology for Leachate Valorisation

Authors: Jesús M. Martín, Francisco Corona, Dolores Hidalgo

Abstract:

Landfills present long-term threats to soil, air, groundwater and surface water due to the formation of greenhouse gases (methane gas and carbon dioxide) and leachate from decomposing garbage. The composition of leachate differs from site to site and also within the landfill. The leachates alter with time (from weeks to years) since the landfilled waste is biologically highly active and their composition varies. Mainly, the composition of the leachate depends on factors such as characteristics of the waste, the moisture content, climatic conditions, degree of compaction and the age of the landfill. Therefore, the leachate composition cannot be generalized and the traditional treatment models should be adapted in each case. Although leachate composition is highly variable, what different leachates have in common is hazardous constituents and their potential eco-toxicological effects on human health and on terrestrial ecosystems. Since leachate has distinct compositions, each landfill or dumping site would represent a different type of risk on its environment. Nevertheless, leachates consist always of high organic concentration, conductivity, heavy metals and ammonia nitrogen. Leachate could affect the current and future quality of water bodies due to uncontrolled infiltrations. Therefore, control and treatment of leachate is one of the biggest issues in urban solid waste treatment plants and landfills design and management. This work presents a treatment model that will be carried out "in-situ" using a cost-effective novel technology that combines solar evaporation/condensation plus forward osmosis. The plant is powered by renewable energies (solar energy, biomass and residual heat), which will minimize the carbon footprint of the process. The final effluent quality is very high, allowing reuse (preferred) or discharge into watercourses. In the particular case of this work, the final effluents will be reused for cleaning and gardening purposes. A minority semi-solid residual stream is also generated in the process. Due to its special composition (rich in metals and inorganic elements), this stream will be valorized in ceramic industries to improve the final products characteristics.

Keywords: forward osmosis, landfills, leachate valorization, solar evaporation

Procedia PDF Downloads 202
157 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria

Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma

Abstract:

Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.

Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures

Procedia PDF Downloads 111
156 Geochemical Characteristics and Chemical Toxicity: Appraisal of Groundwater Uranium With Other Geogenic Contaminants in Various Districts of Punjab, India

Authors: Tanu Sharma, Bikramjit Singh Bajwa, Inderpreet Kaur

Abstract:

Monitoring of groundwater in Tarn-Taran, Bathinda, Faridkot and Mansa districts of Punjab state, India is essential where this freshwater resource is being over-exploited causing quality deterioration, groundwater depletion and posing serious threats to residents. The present integrated study was done to appraise quality and suitability of groundwater for drinking/irrigation purposes, hydro-geochemical characteristics, source identification and associated health risks. In the present study, groundwater of various districts of Punjab state was found to be heavily contaminated with As followed by U, thus posing high cancerous risks to local residents via ingestion, along with minor contamination of Fe, Mn, Pb and F−. Most health concerns in the study region were due to the elevated concentrations of arsenic in groundwater with average values of 130 µg L-1, 176 µg L-1, 272 µg L-1 and 651 µg L-1 in Tarn-Taran, Bathinda, Faridkot and Mansa districts, respectively, which is quite high as compared to the safe limit as recommended by BIS i.e. 10 µg L-1. In Tarn-Taran, Bathinda, Faridkot and Mansa districts, average uranium contents were found to be 37 µg L-1, 88 µg L-1, 61 µg L-1 and 104 µg L-1, with 51 %, 74 %, 61 % and 71 % samples, respectively, being above the WHO limit of 30 µg L-1 in groundwater. Further, the quality indices showed that groundwater of study region is suited for irrigation but not appropriate for drinking purposes. Hydro-geochemical studies revealed that most of the collected groundwater samples belonged to Ca2+ - Mg2+ - HCO3- type showing dominance of MgCO3 type which indicates the presence of temporary hardness in groundwater. Rock-water reactions and reverse ion exchange were the predominant factors for controlling hydro-geochemistry in the study region. Dissolution of silicate minerals caused the dominance of Na+ ions in the aquifers of study region. Multivariate statistics revealed that along with geogenic sources, contribution of anthropogenic activities such as injudicious application of agrochemicals and domestic waste discharge was also very significant. The results obtained abolished the myth that uranium is only root cause for large number of cancer patients in study region as arsenic and mercury were also present in groundwater at levels that were of health concern to groundwater.

Keywords: uranium, trace elements, multivariate data analysis, risk assessment

Procedia PDF Downloads 71
155 Islamic Finance and Trade Promotion in the African Continental Free Trade Area: An Exploratory Study

Authors: Shehu Usman Rano Aliyu

Abstract:

Despite the significance of finance as a major trade lubricant, evidence in the literature alludes to its scarcity and increasing cost, especially in developing countries where small and medium-scale enterprises are worst affected. The creation of the African Continental Free Trade Area (AFCFTA) in 2018, an organ of the African Union (AU), was meant to serve as a beacon for deepening economic integration through the removal of trade barriers inhibiting intra-African trade and movement of persons, among others. Hence, this research explores the role Islamic trade finance (ITF) could play in spurring intra- and inter-African trade. The study involves six countries; Egypt, Kenya, Malaysia, Morocco, Nigeria, and Saudi Arabia, and employs survey research, a total of 430 sample data, and SmartPLS Structural Equation Modelling (SEM) techniques in its analyses. We find strong evidence that Shari’ah, legal and regulatory compliance issues of the ITF institutions rhythm with the internal, national, and international compliance requirements equally as the unique instruments applied in ITF. In addition, ITF was found to be largely driven by global economic and political stability, socially responsible finance, ethical and moral considerations, risk-sharing, and resilience of the global Islamic finance industry. Further, SMEs, Governments, and Importers are the major beneficiary sectors. By and large, AfCFTA’s protocols align with the principles of ITF and are therefore suited for the proliferation of Islamic finance in the continent. And, while AML/KYC and BASEL requirements, compliance to AAOIFI and IFSB standards, paucity of Shari'ah experts, threats to global security, and increasing global economic uncertainty pose as major impediments, the future of ITF would be shaped by a greater need for institutional and policy support, global economic cum political stability, robust regulatory framework, and digital technology/fintech. The study calls for the licensing of more ITF institutions in the continent, participation of multilateral institutions in ITF, and harmonization of Shariah standards.

Keywords: AfCFTA, islamic trade finance, murabaha, letter of credit, forwarding

Procedia PDF Downloads 56
154 Community Policing: Exploring the Police and Community Participation for Crime Control in Bia West of Ghana

Authors: Bertha Korang Gyimah, Obed Asamoah, Kenross, T. Asamoah

Abstract:

In every human community, crimes or offenses cannot be eliminated, but as crimes are expected, there should be bodies that will control and prevent the crimes. There has been an increasing rate of crime, such as armed robbery, kidnapping, murder, and other forms of violence in the country. Community participation in crime control cannot be left out in Ghana. Several works have been conducted to deal with the importance of community participation in policing, but the causes of communities not fully participating in community policing have been left out. The main aim of the research was to assess the impact of community policing and why the communities are reluctant to partake in community policing to help control crime in Bia West. There have been perceptions about Police that, they expose informant after they give the police tip-off which put the whistleblower life in danger. This has made the community not to get involved in security issues in the community they live in. This situation has posed a serious threat to the Ghana Police Service and its ability to position itself strategically in order to carry out a perfect investigation to bring the perpetrators into custody and to protect their lives and property, as well as the maintenance of law and order. Due to less data on community participation in the Ghana Police Service, the research adopted an interpretative framework to assess the meaning connoted to community policing from the perspectives of the stakeholders themselves. The qualitative research method was used. There was an engagement of the police and community where focus group discussions and individual in-depth interviews were organized in the randomly selected communities in the district. Key informant interviews were used to solicit views of the people why they are reluctant to give information to the police to help them take the perpetrators to book. In the data collected, it was observed that most of the people have been under threats of offenders after they come back from the prisons, it was also observed that some of the unprofessional police personnel’s expose the whistleblowers who put their lives in danger. The data obtained were analyzed using simple Analytical tool SPSS and Excel. Based on the analysis, it was observed that a high number of people in the communities contacted had not made their mind to participate in any security issues. Based on the views of the community, there should be a high level of professionalism in the recruitment system of the Ghana police service to come out with professional police officers who can abide by the rules and regulations governing the profession.

Keywords: community, bia west, Ghana, participation, police

Procedia PDF Downloads 142
153 Bone Mineral Density and Trabecular Bone Score in Ukrainian Women with Obesity

Authors: Vladyslav Povoroznyuk, Nataliia Dzerovych, Larysa Martynyuk, Tetiana Kovtun

Abstract:

Obesity and osteoporosis are the two diseases whose increasing prevalence and high impact on the global morbidity and mortality, during the two recent decades, have gained a status of major health threats worldwide. Obesity purports to affect the bone metabolism through complex mechanisms. Debated data on the connection between the bone mineral density and fracture prevalence in the obese patients are widely presented in literature. There is evidence that the correlation of weight and fracture risk is site-specific. The aim of this study was to evaluate the Bone Mineral Density (BMD) and Trabecular Bone Score (TBS) in the obese Ukrainian women. We examined 1025 40-89-year-old women, divided them into the groups according to their body mass index: Group a included 360 women with obesity whose BMI was ≥30 kg/m2, and Group B – 665 women with no obesity and BMI of < 30 kg/m2. The BMD of total body, lumbar spine at the site L1-L4, femur and forearm were measured by DXA (Prodigy, GEHC Lunar, Madison, WI, USA). The TBS of L1-L4 was assessed by means of TBS iNsight® software installed on our DXA machine (product of Med-Imaps, Pessac, France). In general, obese women had a significantly higher BMD of lumbar spine, femoral neck, proximal femur, total body, and ultradistal forearm (p<0.001) in comparison with women without obesity. The TBS of L1-L4 was significantly lower in obese women compared to non-obese women (p<0.001). The BMD of lumbar spine, femoral neck and total body differed to a significant extent in women of 40-49, 50-59, 60-69, and 70-79 years (p<0.05). At same time, in women aged 80-89 years the BMD of lumbar spine (p=0.09), femoral neck (p=0.22) and total body (p=0.06) barely differed. The BMD of ultradistal forearm was significantly higher in women of all age groups (p<0.05). The TBS of L1-L4 in all the age groups tended to reveal the lower parameters in obese women compared with the non-obese; however, those data were not statistically significant. By contrast, a significant positive correlation was observed between the fat mass and the BMD at different sites. The correlation between the fat mass and TBS of L1-L4 was also significant, although negative. Women with vertebral fractures had a significantly lower body weight, body mass index and total body fat mass in comparison with women without vertebral fractures in their anamnesis. In obese women the frequency of vertebral fractures was 27%, while in women without obesity – 57%.

Keywords: obesity, trabecular bone score, bone mineral density, women

Procedia PDF Downloads 443
152 A Meaning-Making Approach to Understand the Relationship between the Physical Built Environment of the Heritage Sites including the Intangible Values and the Design Development of the Public Open Spaces: Case Study Liverpool Pier Head

Authors: May Newisar, Richard Kingston, Philip Black

Abstract:

Heritage-led regeneration developments have been considered as one of the cornerstones of the economic and social revival of historic towns and cities in the UK. However, this approach has proved its deficiency within the development of Liverpool World Heritage site. This is due to the conflict between sustaining the tangible and intangible values as well as achieving the aimed economic developments. Accordingly, the development of such areas is influenced by a top-down approach which considers heritage as consumable experience and urban regeneration as the economic development for it. This neglects the heritage sites characteristics and values as well as the design criteria for public open spaces that overlap with the heritage sites. Currently, knowledge regarding the relationship between the physical built environment of the heritage sites including the intangible values and the design development of the public open spaces is limited. Public open spaces have been studied from different perspectives such as increasing walkability, a source of social cohesion, provide a good quality of life as well as understanding users’ perception. While heritage sites have been discussed heavily on how to maintain the physical environment, understanding the courses of threats and how to be protected. In addition to users’ experiences and motivations of visiting such areas. Furthermore, new approaches tried to overcome the gap such as the historic urban landscape approach. This approach is focusing on the entire human environment with all its tangible and intangible qualities. However, this research aims to understand the relationship between the heritage sites and public open spaces and how the overlap of the design and development of both could be used as a quality to enhance the heritage sites and improve users’ experience. A meaning-making approach will be used in order to understand and articulate how the development of Liverpool World Heritage site and its value could influence and shape the design of public open space Pier Head in order to attract a different level of tourists to be used as a tool for economic development. Consequently, this will help in bridging the gap between the planning and conservation areas’ policies through an understanding of how flexible is the system in order to adopt alternative approaches for the design and development strategies for those areas.

Keywords: historic urban landscape, environmental psychology, urban governance, identity

Procedia PDF Downloads 131
151 Digital Twins in the Built Environment: A Systematic Literature Review

Authors: Bagireanu Astrid, Bros-Williamson Julio, Duncheva Mila, Currie John

Abstract:

Digital Twins (DT) are an innovative concept of cyber-physical integration of data between an asset and its virtual replica. They have originated in established industries such as manufacturing and aviation and have garnered increasing attention as a potentially transformative technology within the built environment. With the potential to support decision-making, real-time simulations, forecasting abilities and managing operations, DT do not fall under a singular scope. This makes defining and leveraging the potential uses of DT a potential missed opportunity. Despite its recognised potential in established industries, literature on DT in the built environment remains limited. Inadequate attention has been given to the implementation of DT in construction projects, as opposed to its operational stage applications. Additionally, the absence of a standardised definition has resulted in inconsistent interpretations of DT in both industry and academia. There is a need to consolidate research to foster a unified understanding of the DT. Such consolidation is indispensable to ensure that future research is undertaken with a solid foundation. This paper aims to present a comprehensive systematic literature review on the role of DT in the built environment. To accomplish this objective, a review and thematic analysis was conducted, encompassing relevant papers from the last five years. The identified papers are categorised based on their specific areas of focus, and the content of these papers was translated into a through classification of DT. In characterising DT and the associated data processes identified, this systematic literature review has identified 6 DT opportunities specifically relevant to the built environment: Facilitating collaborative procurement methods, Supporting net-zero and decarbonization goals, Supporting Modern Methods of Construction (MMC) and off-site manufacturing (OSM), Providing increased transparency and stakeholders collaboration, Supporting complex decision making (real-time simulations and forecasting abilities) and Seamless integration with Internet of Things (IoT), data analytics and other DT. Finally, a discussion of each area of research is provided. A table of definitions of DT across the reviewed literature is provided, seeking to delineate the current state of DT implementation in the built environment context. Gaps in knowledge are identified, as well as research challenges and opportunities for further advancements in the implementation of DT within the built environment. This paper critically assesses the existing literature to identify the potential of DT applications, aiming to harness the transformative capabilities of data in the built environment. By fostering a unified comprehension of DT, this paper contributes to advancing the effective adoption and utilisation of this technology, accelerating progress towards the realisation of smart cities, decarbonisation, and other envisioned roles for DT in the construction domain.

Keywords: built environment, design, digital twins, literature review

Procedia PDF Downloads 81
150 European Prosecutor's Office: Chances and Threats; Brief to Polish Perspective

Authors: Katarzyna Stoklosa

Abstract:

Introduction: European Public Prosecutor’s Office (EPPO) is an independent office in European Union which was established under the article 86 of the Treaty on the Functioning of the European Union by the Treaty of Lisbon following the method of enhanced cooperation. EPPO is aimed at combating crimes against the EU’s financial interest et fraud against the EU budgets on the one hand, EPPO will give a chance to effective fight with organized criminality, on the other it seems to be a threat for member-states which bound with justice the problem of sovereignty. It is a new institution that will become effective from 2020, which is why it requires prior analysis. Methodology: The author uses statistical and comparative methods by collecting and analyzing the work of current institutions such as Europol, Eurojust, as well as the future impact of EPPO on detection and prosecution of crimes. The author will also conduct questionnaire among students and academic staff involved in the perception of EU institutions and the need to create new entities dealing with inter-agency cooperation in criminal matters. Thanks to these research the author will draw up present ways of cooperation between member-states and changes in fighting with financial crimes which will grow up under new regulation. Major Finding of the Study: Analysis and research show that EPPO is an institution based on the principle of mutual recognition, which often does not work in cooperation between Member States. Distrust and problems with the recognition of judgments of other EU Member States may significantly affect the functioning of EPPO. Poland is not part of the EPPO, because arguments have been raised that the European Public Prosecutor's Office interferes too much with the Member States’ pro-active sovereignty and duplicates competences. The research and analyzes carried out by the author show that EPPO has completely new competences, for example, it may file indictments against perpetrators of financial crimes. However, according to the research carried out by the author, such competences may undermine the sovereignty and the principle of protecting the public order of the EU. Conclusion: After the analysis, it will be possible to set following thesis: EPPO is only possible way to effective fight with organized financial criminality. However in conclusion Polish doubts should not be criticized at all. Institutions as EPPO must properly respect sovereignty of member-states. Even instruments like that cannot provoke political contraventions, because there are no other ways to effective resolving of international criminality problem.

Keywords: criminal trial, economic crimes, European Public Prosecutor's Office, European Union

Procedia PDF Downloads 164
149 The Women-In-Mining Discourse: A Study Combining Corpus Linguistics and Discourse Analysis

Authors: Ylva Fältholm, Cathrine Norberg

Abstract:

One of the major threats identified to successful future mining is that women do not find the industry attractive. Many attempts have been made, for example in Sweden and Australia, to create organizational structures and mining communities attractive to both genders. Despite such initiatives, many mining areas are developing into gender-segregated fly-in/fly out communities dominated by men with both social and economic consequences. One of the challenges facing many mining companies is thus to break traditional gender patterns and structures. To do this increased knowledge about gender in the context of mining is needed. Since language both constitutes and reproduces knowledge, increased knowledge can be gained through an exploration and description of the mining discourse from a gender perspective. The aim of this study is to explore what conceptual ideas are activated in connection to the physical/geographical mining area and to work within the mining industry. We use a combination of critical discourse analysis implying close reading of selected texts, such as policy documents, interview materials, applications and research and innovation agendas, and analyses of linguistic patterns found in large language corpora covering millions of words of contemporary language production. The quantitative corpus data serves as a point of departure for the qualitative analysis of the texts, that is, suggests what patterns to explore further. The study shows that despite technological and organizational development, one of the most persistent discourses about mining is the conception of dangerous and unfriendly areas infused with traditional notions of masculinity ideals and manual hard work. Although some of the texts analyzed highlight gender issues, and describe gender-equalizing initiatives, such as wage-mapping systems, female networks and recruitment efforts for women executives, and thereby render the discourse less straightforward, it is shown that these texts are not unambiguous examples of a counter-discourse. They rather illustrate that discourses are not stable but include opposing discourses, in dialogue with each other. For example, many texts highlight why and how women are important to mining, at the same time as they suggest that gender and diversity are all about women: why mining is a problem for them, how they should be, and what they should do to fit in. Drawing on a constitutive view of discourse, knowledge about such conflicting perceptions of women is a prerequisite for succeeding in attracting women to the mining industry and thereby contributing to the development of future mining.

Keywords: discourse, corpus linguistics, gender, mining

Procedia PDF Downloads 264
148 Evaluating the Ability to Cycle in Cities Using Geographic Information Systems Tools: The Case Study of Greek Modern Cities

Authors: Christos Karolemeas, Avgi Vassi, Georgia Christodoulopoulou

Abstract:

Although the past decades, planning a cycle network became an inseparable part of all transportation plans, there is still a lot of room for improvement in the way planning is made, in order to create safe and direct cycling networks that gather the parameters that positively influence one's decision to cycle. The aim of this article is to study, evaluate and visualize the bikeability of cities. This term is often used as the 'the ability of a person to bike' but this study, however, adopts the term in the sense of bikeability as 'the ability of the urban landscape to be biked'. The methodology used included assessing cities' accessibility by cycling, based on international literature and corresponding walkability methods and the creation of a 'bikeability index'. Initially, a literature review was made to identify the factors that positively affect the use of bicycle infrastructure. Those factors were used in order to create the spatial index and quantitatively compare the city network. Finally, the bikeability index was applied in two case studies: two Greek municipalities that, although, they have similarities in terms of land uses, population density and traffic congestion, they are totally different in terms of geomorphology. The factors suggested by international literature were (a) safety, (b) directness, (c) comfort and (d) the quality of the urban environment. Those factors were quantified through the following parameters: slope, junction density, traffic density, traffic speed, natural environment, built environment, activities coverage, centrality and accessibility to public transport stations. Each road section was graded for the above-mentioned parameters, and the overall grade shows the level of bicycle accessibility (low, medium, high). Each parameter, as well as the overall accessibility levels, were analyzed and visualized through Geographic Information Systems. This paper presents the bikeability index, its' results, the problems that have arisen and the conclusions from its' implementation through Strengths-Weaknesses-Opportunities-Threats analysis. The purpose of this index is to make it easy for researchers, practitioners, politicians, and stakeholders to quantify, visualize and understand which parts of the urban fabric are suitable for cycling.

Keywords: accessibility, cycling, green spaces, spatial data, urban environment

Procedia PDF Downloads 109
147 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 107
146 Resilience and Urban Transformation: A Review of Recent Interventions in Europe and Turkey

Authors: Bilge Ozel

Abstract:

Cities are high-complex living organisms and are subjects to continuous transformations produced by the stress that derives from changing conditions. Today the metropolises are seen like “development engines” of the countries and accordingly they become the centre of better living conditions that encourages demographic growth which constitutes the main reason of the changes. Indeed, the potential for economic advancement of the cities directly represents the economic status of their countries. The term of “resilience”, which sees the changes as natural processes and represents the flexibility and adaptability of the systems in the face of changing conditions, becomes a key concept for the development of urban transformation policies. The term of “resilience” derives from the Latin word ‘resilire’, which means ‘bounce’, ‘jump back’, refers to the ability of a system to withstand shocks and still maintain the basic characteristics. A resilient system does not only survive the potential risks and threats but also takes advantage of the positive outcomes of the perturbations and ensures adaptation to the new external conditions. When this understanding is taken into the urban context - or rather “urban resilience” - it delineates the capacity of cities to anticipate upcoming shocks and changes without undergoing major alterations in its functional, physical, socio-economic systems. Undoubtedly, the issue of coordinating the urban systems in a “resilient” form is a multidisciplinary and complex process as the cities are multi-layered and dynamic structures. The concept of “urban transformation” is first launched in Europe just after World War II. It has been applied through different methods such as renovation, revitalization, improvement and gentrification. These methods have been in continuous advancement by acquiring new meanings and trends over years. With the effects of neoliberal policies in the 1980s, the concept of urban transformation has been associated with economic objectives. Subsequently this understanding has been improved over time and had new orientations such as providing more social justice and environmental sustainability. The aim of this research is to identify the most applied urban transformation methods in Turkey and its main reasons of being selected. Moreover, investigating the lacking and limiting points of the urban transformation policies in the context of “urban resilience” in a comparative way with European interventions. The emblematic examples, which symbolize the breaking points of the recent evolution of urban transformation concepts in Europe and Turkey, are chosen and reviewed in a critical way.

Keywords: resilience, urban dynamics, urban resilience, urban transformation

Procedia PDF Downloads 264
145 Culture Dimensions of Information Systems Security in Saudi Arabia National Health Services

Authors: Saleh Alumaran, Giampaolo Bella, Feng Chen

Abstract:

The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of research on the role and impact of an organisation’s cultural dimensions on information security. This research investigated and analysed the role and impact of cultural dimensions on information security in Saudi Arabia health service. Hypotheses were tested and two surveys were carried out in order to collect data and information from three major hospitals in Saudi Arabia (SA). The first survey identified the main cultural-dimension problems in SA health services and developed an initial information security culture framework model. The second survey evaluated and tested the developed framework model to test its usefulness, reliability and applicability. The model is based on human behaviour theory, where the individual’s attitude is the key element of the individual’s intention to behave as well as of his or her actual behaviour. The research identified six cultural dimensions: Saudi national culture, Saudi health service leadership, employees’ trust, technology, multicultural interactions and employees’ job roles. The research also identified a set of cultural sub-dimensions. These include working values and norms, tribe values and norms, attitudes towards women, power sharing, vision, social interaction, respect and understanding, hospital intra-net, hospital employees’ language(s) used, multi-national culture, communication system, employees’ job satisfaction and job security. The research identified that (a) the human behaviour towards medical information in SA is one of the main threats to information security and one of the main challenges to SA health authority, (b) The current situation of SA hospitals’ IS cultures is falling short in protecting medical information due to the current value and norms towards information security, (c) Saudi national culture and employees’ job role are the main dimensions playing major roles in the employees’ attitude, and technology is the least important dimension playing a role in the employees’ attitudes.

Keywords: cultural dimension, electronic health record, information security, privacy

Procedia PDF Downloads 351