Search results for: security challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7760

Search results for: security challenges

6980 International Trade, Food Security, and Climate Change in an Era of Liberal Trade

Authors: M. Barsa

Abstract:

This paper argues that current liberal trade regimes have had the unfortunate effect of concentrating food production by area and by crop. While such hyper-specialization and standardization might be efficient under ordinary climate conditions, the increasing severity of climate shocks makes such a food production system especially vulnerable. Examining domestic US crop production, and the fact that similar patterns are evident worldwide, this paper explores the vulnerabilities of several major crops and suggests that the academic arguments surrounding increasing liberalization of trade are ill-suited to the climate challenges to come. Indeed, a case can be made that protectionist measures—especially by developing countries whose agricultural sectors are vulnerable to the cheap US and European exports—are increasingly necessary to scatter food production geographically and to retain a resilient diversity of crop varieties.

Keywords: climate change, crop resilience, diversity, international trade

Procedia PDF Downloads 112
6979 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 221
6978 Urban Governance in Major Development Projects: Challenges, Issues and Constraints - Case of Constantine

Authors: Chouabbia Khedidja, Lazri Youcef, Mouhoubi Nedjima

Abstract:

In optics and in ambition to break into the ranks of international metropolis cities, Constantine, a regional metropolis of eastern Algeria, is facing multiple challenges shared between the response to the urban crisis plaguing the city and the creation of territorial attractiveness in the metropolisation process. This ambition cannot be achieve in conditions of poor governance and lack of cooperation especially between the actors involved in major development projects, these last qualified by change and hope carriers to make the city more attractive and pleasant. Thus, governance or good governance has become not only a necessity but also a challenge for the city of Constantine. Through this example of Constantine. We will analyze the challenges facing a metropolis amongst other urban governance and the constraints that affect the smooth running of major development projects when governance is missing or inoperative.

Keywords: urban governance, metropolis, big development project, actors, constantine

Procedia PDF Downloads 442
6977 Managing IT Departments in Higher Education Institutes: Coping with the Exponentially Growing Needs and Expectations

Authors: Balqees A. Al-Thuhli, Ali H. Al-Badi, Khamis Al-Gharbi

Abstract:

Information technology is changing rapidly and the users’ expectations are also growing. Dealing with these changes in information technology, while satisfying the users’ needs and expectations is a big challenge. IT managers need to explore new mechanisms/strategies to enable them to cope with such challenges. The objectives of this research are to identify the significant challenges that might face IT managers in higher education institutes in the face of the high and ever growing customer expectations and to propose possible solutions to cope with such high-speed changes in information technology. To achieve these objectives, interviews with the IT professionals from different higher education institutes in Oman were conducted. In addition, documentation (printed and online) related to these institutions were studied and an intensive literature review of published work was examined. The findings of this research are expected to give a better understanding of the challenges that might face the IT managers at higher education institutes. This acquired understanding is expected to highlight the importance of being adaptable and fast in keeping up with the ever-growing technological changes. Moreover, adopting different tools and technologies could assist IT managers in developing their organisations’ IT policies and strategies.

Keywords: information technology, rapid change, CIO roles, challenges, IT managers, coping mechanisms, users' expectations

Procedia PDF Downloads 250
6976 Water Access and Food Security: A Cross-Sectional Study of SSA Countries in 2017

Authors: Davod Ahmadi, Narges Ebadi, Ethan Wang, Hugo Melgar-Quiñonez

Abstract:

Compared to the other Least Developed Countries (LDCs), major countries in sub-Saharan Africa (SSA) have limited access to the clean water. People in this region, and more specifically females, suffer from acute water scarcity problems. They are compelled to spend too much of their time bringing water for domestic use like drinking and washing. Apart from domestic use, water through affecting agriculture and livestock contributes to the food security status of people in vulnerable regions like SSA. Livestock needs water to grow, and agriculture requires enormous quantities of water for irrigation. The main objective of this study is to explore the association between access to water and individuals’ food security status. Data from 2017 Gallup World Poll (GWP) for SSA were analyzed (n=35,000). The target population in GWP is the entire civilian, non-institutionalized, aged 15 and older population. All samples selection is probability based and nationally representative. The Gallup surveys an average of 1,000 samples of individuals per country. Three questions related to water (i.e., water quality, availability of water for crops and availability of water for livestock) were used as the exposure variables. Food Insecurity Experience Scale (FIES) was used as the outcome variable. FIES measures individuals’ food security status, and it is composed of eight questions with simple dichotomous responses (1=Yes and 0=No). Different statistical analyses such as descriptive, crosstabs and binary logistic regression, form the basis of this study. Results from descriptive analyses showed that more than 50% of the respondents had no access to enough water for crops and livestock. More than 85% of respondents were categorized as “food insecure”. Findings from cross-tabulation analyses showed that food security status was significantly associated with water quality (0.135; P=0.000), water for crops (0.106; P=0.000) and water for livestock (0.112; P=0.000). In regression analyses, the probability of being food insecure increased among people who expressed no satisfaction with water quality (OR=1.884 (OR=1.768-2.008)), not enough water for crops (OR=1.721 (1.616-1.834)) and not enough water for livestock (OR=1.706 (1.819)). In conclusion, it should note that water access affects food security status in SSA.

Keywords: water access, agriculture, livestock, FIES

Procedia PDF Downloads 134
6975 Cities Under Pressure: Unraveling Urban Resilience Challenges

Authors: Sherine S. Aly, Fahd A. Hemeida, Mohamed A. Elshamy

Abstract:

In the face of rapid urbanization and the myriad challenges posed by climate change, population growth, and socio-economic disparities, fostering urban resilience has become paramount. This abstract offers a comprehensive overview of the study on "Urban Resilience Challenges," exploring the background, methodologies, major findings, and concluding insights. The paper unveils a spectrum of challenges encompassing environmental stressors and deep-seated socio-economic issues, such as unequal access to resources and opportunities. Emphasizing their interconnected nature, the study underscores the imperative for holistic and integrated approaches to urban resilience, recognizing the intricate web of factors shaping the urban landscape. Urbanization has witnessed an unprecedented surge, transforming cities into dynamic and complex entities. With this growth, however, comes an array of challenges that threaten the sustainability and resilience of urban environments. This study seeks to unravel the multifaceted urban resilience challenges, exploring their origins and implications for contemporary cities. Cities serve as hubs of economic, social, and cultural activities, attracting diverse populations seeking opportunities and a higher quality of life. However, the urban fabric is increasingly strained by climate-related events, infrastructure vulnerabilities, and social inequalities. Understanding the nuances of these challenges is crucial for developing strategies that enhance urban resilience and ensure the longevity of cities as vibrant and adaptive entities. This paper endeavors to discern strategic guidelines for enhancing urban resilience amidst the dynamic challenges posed by rapid urbanization. The study aims to distill actionable insights that can inform strategic approaches. Guiding the formulation of effective strategies to fortify cities against multifaceted pressures. The study employs a multifaceted approach to dissect urban resilience challenges. A qualitative method will be employed, including comprehensive literature reviews and data analysis of urban vulnerabilities that provided valuable insights into the lived experiences of resilience challenges in diverse urban settings. In conclusion, this study underscores the urgency of addressing urban resilience challenges to ensure the sustained vitality of cities worldwide. The interconnected nature of these challenges necessitates a paradigm shift in urban planning and governance. By adopting holistic strategies that integrate environmental, social, and economic considerations, cities can navigate the complexities of the 21st century. The findings provide a roadmap for policymakers, planners, and communities to collaboratively forge resilient urban futures that withstand the challenges of an ever-evolving urban landscape.

Keywords: resilient principles, risk management, sustainable cities, urban resilience

Procedia PDF Downloads 43
6974 Challenges and Opportunities for Online Consumer Selling Process Development in Coming Years in World

Authors: Prakash Prajapati

Abstract:

E commerce is certainly one of the business alternatives that individual will have to analyze in the forthcoming years. E-commerce is said to bring about arched type conversion in the world for exchange market. Prognosis E-commerce is presenting dreadful business advancement in our country. Endorsed by ascending online user base & mobile phone presentation, Indian e-commerce has been splendid development in the last few years. Conceding India’s analytical dividend and spiraling internet admittance, the sector is contracted to scale higher heights. Although, India’s overall peddle opportunity is consequential, the sector is beset with some deliberate challenges. The current study has been proceeded to explore the present scenario, status & future advancement of e-commerce in India and review the challenges and opportunities of e-commerce in India.

Keywords: online selling, retail selling online, product process, business opportunity

Procedia PDF Downloads 132
6973 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review

Authors: Rashid Mahmood, Muhammad Junaid Sarwar

Abstract:

Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.

Keywords: MANET, IDS, intrusions, signature, detection, prevention

Procedia PDF Downloads 357
6972 Cross Cultural Challenges in International Projects: A Comparative Study between Indian and French

Authors: Niranjani Ruba Pandian

Abstract:

In today’s multicultural global business community, most of the businesses and industries are linked with various countries in which different nationalities have different roles and responsibilities throughout the project. The purpose of this research is to examine the cross-cultural challenges between Indian and French and the ways to minimize these challenges to manage effectively the cross-cultural aspect of human resources for the success of global business in an automotive industry. The conducted study utilized quantitative methodology to analyze the data on Indian and French employees' perceptions of 6 cultural dimensions such as power versus distance, individualism versus collectivism, masculinity versus femininity, uncertainty versus avoidance, pragmatic versus normative and indulgence versus restraint. Employees of 4 multinational companies filled in the questionnaire based on the 5-point Likert scale to present quantitative results. The data was analysed with the correlation and multiple regression statistical analyses. It was found that Indian and French have major gap in uncertainty versus avoidance followed by individualism versus collectivism. However, this article highlights the way to minimize these gaps by adopting certain sequenced methodologies.

Keywords: automotive industry, cross cultural challenges, globalization, global business

Procedia PDF Downloads 451
6971 Testing of Complicated Bus Bar Protection Using Smart Testing Methodology

Authors: K. N. Dinesh Babu

Abstract:

In this paper, the protection of a complicated bus arrangement with a dual bus coupler and bus sectionalizer using low impedance differential protection applicable for very high voltages like 220kV and 400kV is discussed. In many power generation stations, several operational procedures are implemented to utilize the transfer bus as the main bus and to facilitate the maintenance of circuit breakers and current transformers (in each section) without shutting down the bay(s). Owing to this fact, the complications in operational philosophy have thrown challenges for the bus bar protection implementation. Many bus topologies allow any one of the main buses available in the station to be used as an auxiliary bus. In such a system, pre-defined precautions and procedures are made as guidelines, which are followed before assigning any bus as an auxiliary bus. The procedure involves shifting of links, changing rotary switches, insertion of test block, and so on, thereby causing unreliable operation. This kind of unreliable operation or inadvertent procedural lapse may result in the isolation of the bus bar from the grid due to the unpredictable operation of the bus bar protection relay, which is a commonly occurring phenomenon due to manual mistakes. With the sophisticated configuration and implementation of logic in modern intelligent electronic devices, the operator is free to select the transfer arrangement without sacrificing the protection required by a bus differential system for a reliable operation, and labor-intensive processes are completely eliminated. This paper deals with the procedure to test the security logic for such special scenarios using Megger make SMRT, bus bar protection relay to assure system stability and get rid of all the specific operational precautions/procedure.

Keywords: bus bar protection, by-pass isolator, blind spot, breaker failure, intelligent electronic device, end fault, bus unification, directional principle, zones of protection, breaker re-trip, under voltage security, smart megger relay tester

Procedia PDF Downloads 54
6970 The Challenges of Innovation Leadership in the Public Sector

Authors: Shaker A. Aladwan

Abstract:

This paper aims to explore the Barriers to innovation leadership in Jordanian public sector organizations. Qualitative approach was adopted, and content analysis was used to analyze the 18 assessment reports which are extracted from the public innovation award in Jordan, then, 20 semi-structured interviews were conducted with the key persons who are involved with innovation initiatives in the public sector organizations in Jordan. Several Barriersthat face the innovation leadership in the Jordanian public sector organizations. Managerially, the challenges include lack of innovation vision, implementation lack of innovation core values, lack of strategic planning for innovation, bad bureaucracy culture, and excessive centralization. Technically, the challenges include lack of task assignment for employees, lack of resources, lack of innovative training programs, lack of knowledge sharing, and the failure of governments to formulate policies and regulations. most of the studies focused on innovation in the non-public sector organizations, and most of them were conducted in the American and Western countries, which are different in terms of culture, kinds of innovation, barriers, and drivers. Thus, this paper provides new insights into barriers to innovation leadership in the public sector and in a new research context. This paper also provides a theoretical contribution by diagnosing the barriers facing innovation within the context of public administration in developing countries.

Keywords: innovation, excellence award, challenges, public sector, jordan

Procedia PDF Downloads 105
6969 The Food and Nutritional Effects of Smallholders’ Participation in Milk Value Chain in Ethiopia

Authors: Geday Elias, Montaigne Etienne, Padilla Martine, Tollossa Degefa

Abstract:

Smallholder farmers’ participation in agricultural value chain identified as a pathway to get out of poverty trap in Ethiopia. The smallholder dairy activities have a huge potential in poverty reduction through enhancing income, achieving food and nutritional security in the country. However, much less is known about the effects of smallholder’s participation in milk value chain on household food security and nutrition. This paper therefore, aims at evaluating the effects of smallholders’ participation in milk value chain on household food security taking in to account the four pillars of food security measurements (availability, access, utilization and stability). Using a semi-structured interview, a cross sectional farm household data collected from a randomly selected sample of 333 households (170 in Amhara and 163 in Oromia regions).Binary logit and propensity score matching( PSM) models are employed to examine the mechanisms through which smallholder’s participation in the milk value chain affects household food security where crop production, per capita calorie intakes, diet diversity score, and food insecurity access scale are used to measure food availability, access, utilization and stability respectively. Our findings reveal from 333 households, only 34.5% of smallholder farmers are participated in the milk value chain. Limited access to inputs and services, limited access to inputs markets and high transaction costs are key constraints for smallholders’ limited access to the milk value chain. To estimate the true average participation effects of milk value chain for participated households, the outcome variables (food security) of farm households who participated in milk value chain are compared with the outcome variables if the farm households had not participated. The PSM analysis reveals smallholder’s participation in milk value chain has a significant positive effect on household income, food security and nutrition. Smallholder farmers who are participated in milk chain are better by 15 quintals crops production and 73 percent of per capita calorie intakes in food availability and access respectively than smallholder farmers who are not participated in the market. Similarly, the participated households are better in dietary quality by 112 percents than non-participated households. Finally, smallholders’ who are participated in milk value chain are better in reducing household vulnerability to food insecurity by an average of 130 percent than non participated households. The results also shows income earned from milk value chain participation contributed to reduce capital’s constraints of the participated households’ by higher farm income and total household income by 5164 ETB and 14265 ETB respectively. This study therefore, confirms the potential role of smallholders’ participation in food value chain to get out of poverty trap through improving rural household income, food security and nutrition. Therefore, identified the determinants of smallholder participation in milk value chain and the participation effects on food security in the study areas are worth considering as a positive knock for policymakers and development agents to tackle the poverty trap in the study area in particular and in the country in general.

Keywords: effects, food security and nutrition, milk, participation, smallholders, value chain

Procedia PDF Downloads 323
6968 The Food and Nutrition Security in Brazilian Quilombo: The Account of Experiences in Two Titled Territories

Authors: Dyego Ramos Henrique, Viviane Pimentel, Katia Souto, Ana Valéria Mendonça, Andrea Gallassi

Abstract:

Socioeconomic inequalities in Brazil have accentuated the aggravations of poverty among the most vulnerable populations, among which are the quilombola communities. The objective was to reflect on a situation of food and nutritional security in two Brazilian quilombola communities. The data were collected by means of reports of experience through the production of talk wheels in two quilombola communities (Itamatatiua and Mesquita), located in the cities of Alcântara and Cidade Ocidental. Access to health services and health promotion actions were still incipient in the quilombola communities visited. The perceptions of the participants of the quilombolas revealed that there are still repressed demands that have rendered the fulfillment of the principles of equity, universality and integrality, both for access to health and for access and availability of food. They recognize in governmental instances a socioeconomic-cultural valorization and nutritional qualities intrinsic to the foods produced by them. Although they have been used as communities of quilombolas live and their level of access to services and programs, dealing with quilombola communities does not mean dealing with 'isolated groups or a strictly homogeneous population.' It demands a great need of attention in relation to the access and availability of food, besides overcoming barriers that made it an unfeasible valuation of social, economic and cultural precepts, intrinsic to the thought about food and nutritional security in Brazilian quilombos.

Keywords: access to services, food and nutrition security, health promotion, quilombo population

Procedia PDF Downloads 211
6967 The Nexus between Migration and Human Security: The Case of Ethiopian Female Migration to Sudan

Authors: Anwar Hassen Tsega

Abstract:

International labor migration is an integral part of the modern globalized world. However, the phenomenon has its roots in some earlier periods in human history. This paper discusses the relatively new phenomenon of female migration in Africa. In the past, African women migrants were only spouses or dependent family members. But as modernity swept most African societies, with rising unemployment rates, there is evidence everywhere in Africa that women labor migration is a growing phenomenon that deserves to be understood in the context of human security research. This work explores these issues further, focusing on the experience of Ethiopian women labor migrants to Sudan. The migration of Ethiopian people to Sudan is historical; nevertheless, labor migration mainly started since the discovery and subsequent exploration of oil in the Sudan. While the paper is concerned with the human security aspect of the migrant workers, we need to be certain that the migration process will provide with a decent wage, good working conditions, the necessary social security coverage, and labor protection as a whole. However, migration to Sudan is not always safe and female migrants become subject to violence at the hands of brokers, employers and migration officials. For this matter, the paper argued that identifying the vulnerable stages and major problem facing female migrant workers at various stages of migration is a prerequisite to combat the problem and secure the lives of the migrant workers. The major problems female migrants face include extra degrees of gender-based violence, underpayment, various forms of abuse like verbal, physical and sexual and other forms of torture which include beating and slaps. This peculiar situation could be attributed to the fact that most of these women are irregular migrants and fall under the category of unskilled and/or illiterate migrants.

Keywords: Ethiopia, human security, labor migration, Sudan

Procedia PDF Downloads 229
6966 Opacity Synthesis with Orwellian Observers

Authors: Moez Yeddes

Abstract:

The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.

Keywords: security policies, opacity, formal verification, orwellian observation

Procedia PDF Downloads 212
6965 Gendered Appartus of a Military: The Role of Military Wives in Defining Security

Authors: Taarika Singh

Abstract:

Military wives – women married to army officers have largely been recognized as mere supporters or as auxiliaries to military men rather than propagators of thought and ideologies. The military wife (and her participation) is often dismissed as 'private', 'domestic', or 'trivial' and is acknowledged, if at all, only as an (inevitable/normative) entity, seen as a natural product/outcome of militarization. It is because the military wife has come to be constructed and accepted as normative by states and militaries that women of the military are easily ‘trivialised’ and are made to appear to be socially, politically, or theoretically irrelevantand/or insignificant. This paper, using ethnography-- structured and semi-structured interviews -- makes a gendered analysis of militarization, by bringing the military wife to the forefront and placing her at the nexus of the military and state apparatus. Moving away from gendered analyses that focus on the impact of militarization on women or draw attention to the ways in which militarization has been challenged/resisted by women, the paper pays attention to the centrality of women in shaping, validating, and perpetuating militarization, patriarchal control, and gendered hierarchies. The paper will demonstrate how military wives accept and comply with patriarchy as an institutional form of social organization that extends beyond the family and kinship relations into the military as an organization of the state. The paper will draw attention to the ways in which military norms, patriarchal values, and belief systems shape the social personhood, identity, and worldview of military wives; as a consequence of which, women play a central role in upholding and reproducing social inequalities and hierarchies; in shaping social status, and power relationships amongst men and women within and outside the military. The paper will allude to the processes and ideologies via which womena) accept and reproducemen as exclusive holders of power, status, and privilege; and b) recognize international relations, politics, andmatters related to security to be male dominated arenas inviting overwhelming masculine participation. In doing so, the paper will argue that women of the military play a critical role in perpetuating and upholding gendered meanings associated with the notion of and discourse around security. The paper will illustratehow military wives accept and assume security to be inherently a gendered idea -- a masculine notion, a male dominated arena, as something granted by men. In other words, the paper will demonstrate how the militarization of the military wives and the perpetuation of militarization by military wives plays a crucial role in propagating and perpetuating security to be a masculine notion or a male dominated arena. The paper will then question the degree to which such gendered analyses can shape the broader meanings, definitions, and discourses around security, matters related to security, and security threats.

Keywords: gender, militarisation, security, women

Procedia PDF Downloads 132
6964 Impact of Crises on Official Statistics: Environmental Statistics at Statistical Centre for the Cooperation Council for the Arab Countries of the Gulf during the COVID-19 Pandemic: A Case Study

Authors: Ibtihaj Al-Siyabi

Abstract:

The crisis of COVID-19 posed enormous challenges to the statistical providers. While official statistics were disrupted by the pandemic and related containment measures, there was a growing and pressing need for real-time data and statistics to inform decisions. This paper gives an account of the way the pandemic impacted the operations of the National Statistical Offices (NSOs) in general in terms of data collection and methods used and the main challenges encountered by them based on international surveys. It highlights the performance of the Statistical Centre for the Cooperation Council for the Arab Countries of the Gulf, GCC-STAT, and its responsiveness to the pandemic placing special emphasis on environmental statistics. The paper concludes by confirming the GCC-STAT’s resilience and success in facing the challenges.

Keywords: NSO, COVID-19, statistics, crisis, pandemic

Procedia PDF Downloads 111
6963 Ethics and Military Defections in Nonviolent Resistance Campaigns

Authors: Adi Levy

Abstract:

Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application.

Keywords: culpability, defections, nonviolence, permissibility

Procedia PDF Downloads 100
6962 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.

Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms

Procedia PDF Downloads 73
6961 Examining the Market Challenges That Constrain the Proper Sales of Farming Produces Amongst the Small-Scale Farms

Authors: Simiso Fisokuhle Nyandeni

Abstract:

Climate change has turned out to be a pandemic that has drawn the attention of many countries’ households around the globe, especially those whose livelihood and economic status depend on agricultural productivity. Hence, the agricultural sector is regarded as the sector that is most dependent on climate conditions for its productivity/harvest, yet in recent years this sector has been experiencing drought. However, adaptation seems to be a tool that every farmer looks upon as a solution to their challenges as their productivity keeps on being vulnerable to climate effects. Thus, exposure/access to the market seems to be a major challenge that faces especially small-scale farmers. We, therefore, examine the small-scale farmers’ constraints or challenges towards getting access to the market for them to get proper sales of their farming products. As a result, the adaptation capacity of every farm household varies on the financial status.

Keywords: climate change, small-scale farming, agriculture sector, adaptation

Procedia PDF Downloads 67
6960 A Novel Parametric Chaos-Based Switching System PCSS for Image Encryption

Authors: Mohamed Salah Azzaz, Camel Tanougast, Tarek Hadjem

Abstract:

In this paper, a new low-cost image encryption technique is proposed and analyzed. The developed chaos-based key generator provides complex behavior and can change it automatically via a random-like switching rule. The designed encryption scheme is called PCSS (Parametric Chaos-based Switching System). The performances of this technique were evaluated in terms of data security and privacy. Simulation results have shown the effectiveness of this technique, and it can thereafter, ready for a hardware implementation.

Keywords: chaos, encryption, security, image

Procedia PDF Downloads 458
6959 Determinants of Household Food Security in Addis Ababa City Administration

Authors: Estibe Dagne Mekonnen

Abstract:

In recent years, the prevalence of undernourishment was 30 percent for sub-Saharan Africa, compared with 16 percent for Asia and the Pacific (Ali, 2011). In Ethiopia, almost 40 percent of the total population in the country and 57 percent of Addis Ababa population lives below the international poverty line of US$ 1.25 per day (UNICEF, 2009). This study aims to analyze the determinant of household food secrity in Addis Ababa city administration. Primary data were collected from a survey of 256 households in the selected sub-city, namely Addis Ketema, Arada, and Kolfe Keranio, in the year 2022. Both Purposive and multi-stage cluster random sampling procedures were employed to select study areas and respondents. Descriptive statistics and order logistic regression model were used to test the formulated hypotheses. The result reveals that out of the total sampled households, 25% them were food secured, 13% were mildly food insecure, 26% were moderately food insecure and 36% were severely food insecure. The study indicates that household family size, house ownership, household income, household food source, household asset possession, household awareness on inflation, household access to social protection program, household access to credit and saving and household access to training and supervision on food security have a positive and significant effect on the likelihood of household food security status. However, marital status of household head, employment sector of household head, dependency ratio and household’s nonfood expenditure has a negative and significant influence on household food security status. The study finally suggests that the government in collaboration with financial institutions and NGO should work on sustaining household food security by creating awareness, providing credit, facilitate rural-urban linkage between producer and consumer and work on urban infrastructure improvement. Moreover, the governments also work closely and monitor consumer good suppliers, if possible find a way to subsidize consumable goods to more insecure households and make them to be food secured. Last but not least, keeping this country’s peace will play a crucial role to sustain food security.

Keywords: determinants, household, food security, order logit model, Addis Ababa

Procedia PDF Downloads 44
6958 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 277
6957 Management of Soil Borne Plant Diseases Using Agricultural Waste Residues as Green Waste and Organic Amendment

Authors: Temitayo Tosin Alawiye

Abstract:

Plant disease control is important in maintaining plant vigour, grain quantity, abundance of food, feed, and fibre produced by farmers all over the world. Farmers make use of different methods in controlling these diseases but one of the commonly used method is the use of chemicals. However, the continuous and excessive usages of these agrochemicals pose a danger to the environment, man and wildlife. The more the population growth the more the food security challenge which leads to more pressure on agronomic growth. Agricultural waste also known as green waste are the residues from the growing and processing of raw agricultural products such as fruits, vegetables, rice husk, corn cob, mushroom growth medium waste, coconut husk. They are widely used in land bioremediation, crop production and protection which include disease control. These agricultural wastes help the crop by improving the soil fertility, increase soil organic matter and reduce in many cases incidence and severity of disease. The objective was to review the agricultural waste that has worked effectively against certain soil-borne diseases such as Fusarium oxysporum, Pythiumspp, Rhizoctonia spp so as to help minimize the use of chemicals. Climate change is a major problem of agriculture and vice versa. Climate change and agriculture are interrelated. Change in climatic conditions is already affecting agriculture with effects unevenly distributed across the world. It will increase the risk of food insecurity for some vulnerable groups such as the poor in Sub Saharan Africa. The food security challenge will become more difficult as the world will need to produce more food estimated to feed billions of people in the near future with Africa likely to be the biggest hit. In order to surmount this hurdle, smallholder farmers in Africa must embrace climate-smart agricultural techniques and innovations which includes the use of green waste in agriculture, conservative agriculture, pasture and manure management, mulching, intercropping, etc. Training and retraining of smallholder farmers on the use of green energy to mitigate the effect of climate change should be encouraged. Policy makers, academia, researchers, donors, and farmers should pay more attention to the use of green energy as a way of reducing incidence and severity of soilborne plant diseases to solve looming food security challenges.

Keywords: agricultural waste, climate change, green energy, soil borne plant disease

Procedia PDF Downloads 258
6956 DCT and Stream Ciphers for Improved Image Encryption Mechanism

Authors: T. R. Sharika, Ashwini Kumar, Kamal Bijlani

Abstract:

Encryption is the process of converting crucial information’s unreadable to unauthorized persons. Image security is an important type of encryption that secures all type of images from cryptanalysis. A stream cipher is a fast symmetric key algorithm which is used to convert plaintext to cipher text. In this paper we are proposing an image encryption algorithm with Discrete Cosine Transform and Stream Ciphers that can improve compression of images and enhanced security. The paper also explains the use of a shuffling algorithm for enhancing securing.

Keywords: decryption, DCT, encryption, RC4 cipher, stream cipher

Procedia PDF Downloads 343
6955 Quantitative, Qualitative, and Technological Challenges for Higher Education in Jordan Critical Analytical Study

Authors: Habes Moh’d Khalifeh Hatamleh, Shukri Refai Ibrahim Marashdh

Abstract:

The study came with the aim of identifying the most prominent quantitative, qualitative, and technological challenges facing the higher education system in Jordan as a dilemma in light of the technological revolution that had a radical contribution to changing the face of science and knowledge in various fields of higher education in Jordan. Human societies that require the adoption of scientific research and its basics as a clear entrance aimed at serving the community and upgrading it civilly. The number of private and public universities has increased, and many students have been accepted for all levels of study in the bachelor’s, higher diploma, master’s and doctoral programs, and the quantitative growth has been accompanied by many negatives, which requires renewal and development in the field of higher education, which led to the emergence of many challenges, and the qualitative challenge in terms of relevance, quality and goodness constitutes an important requirement for the improvement of teaching, scientific research and services in light of the social demand for higher education, in order to reach the quality. The real challenge facing our country is to enter the civilization of advanced technology, which has become the main factor and the starting point for preparing staff capable of accomplishing this transformation and creating an appropriate educational environment for the student to help him to use the sources of knowledge. This study can provide a set of recommendations and proposals that may contribute to addressing challenges and contributing to improving educational outcomes in light of the requirements of the labor market and the needs of society.

Keywords: quantitative, qualitative, technological, challenges, higher education

Procedia PDF Downloads 63
6954 Quantitative, Qualitative, and Technological Challenges for Higher Education in Jordan Critical Analytical Study

Authors: Habes Moh’d Khalifeh Hatamleh, Shukri Refai Ibrahim Marashdh

Abstract:

The study came with the aim of identifying the most prominent quantitative, qualitative, and technological challenges facing the higher education system in Jordan as a dilemma in light of the technological revolution that had a radical contribution to changing the face of science and knowledge in various fields of higher education in Jordan. Human societies that require the adoption of scientific research and its basics as a clear entrance aimed at serving the community and upgrading it civilly. The number of private and public universities has increased, and many students have been accepted for all levels of study in the bachelor’s, higher diploma, master’s and doctoral programs, and the quantitative growth has been accompanied by many negatives, which requires renewal and development in the field of higher education, which led to the emergence of many challenges, and the qualitative challenge in terms of relevance, quality and goodness constitutes an important requirement for the improvement of teaching, scientific research and services in light of the social demand for higher education, in order to reach the quality. The real challenge facing our country is to enter the civilization of advanced technology, which has become the main factor and the starting point for preparing staff capable of accomplishing this transformation and creating an appropriate educational environment for the student to help him to use the sources of knowledge. This study can provide a set of recommendations and proposals that may contribute to addressing challenges and contributing to improving educational outcomes in light of the requirements of the labor market and the needs of society.

Keywords: quantitative, qualitative, technological, challenges, higher education

Procedia PDF Downloads 61
6953 Scalable Blockchain Solutions for NGOs: Enhancing Financial Transactions and Accountability

Authors: Aarnav Singh, Jayesh Ghatate, Tarush Pandey

Abstract:

Non-Governmental Organizations (NGOs) play a crucial role in addressing societal challenges, relying heavily on financial transactions to fund their impactful initiatives. However, traditional financial systems can be cumbersome and lack transparency, hindering the efficiency and trustworthiness of NGO operations. The Ethereum main-net, while pioneering the decentralized finance landscape, grapples with inherent scalability challenges, restricting its transaction throughput to a range of 15-45 transactions per second (TPS). This limitation poses substantial obstacles for NGOs engaging in swift and dynamic financial transactions critical to their operational efficiency. This research is a comprehensive exploration of the intricacies of these scalability challenges and delves into the design and implementation of a purpose-built blockchain system explicitly crafted to surmount these constraints.

Keywords: non-governmental organizations, decentralized system, zero knowledge Ethereum virtual machine, decentralized application

Procedia PDF Downloads 43
6952 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level

Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil

Abstract:

This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.

Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing

Procedia PDF Downloads 339
6951 Reimagining Urban Food Security Through Informality Practices: The Case of Street Food Vending in Johannesburg, South Africa

Authors: Blessings Masuku

Abstract:

This study positions itself within the nascent of street food vending that plays a crucial role in addressing urban household food security across the urban landscape of South Africa. The study aimed to understand how various forms of infrastructure systems (i.e., energy, water and sanitation, housing, and transport, among others) intersect with food and urban informality and how vendors and households’ choices and decisions made around food are influenced by infrastructure assemblages. This study noted that most of the literature studies on food security have mainly focused on the rural agricultural sector, with limited attention to urban food security, notably the role of informality practices in addressing urban food insecurity at the household level. This study pays close attention to how informal informality practices such as street food vending can be used as a catalyst to address urban poverty and household food security and steer local economies for sustainable livelihoods of the urban poor who live in the periphery of the city in Johannesburg. This study deconstructs the infrastructure needs of street food vendors, and the aim was to understand how such infrastructure needs intersect with food and policy that governs urban informality practices. The study argues that the decisions and choices of informality actors in the city of Johannesburg are chiefly determined by the assemblages of infrastructure, including regulatory frameworks that govern the informal sector in the city of Johannesburg. A qualitative approach that includes surveys (open-ended questions), archival research (i., e policy and other key document reviews), and key interviews mainly with city officials and informality actors. A thematic analysis was used to analyze the data collected. This study contributes to greater debates on urban studies and burgeoning literature on urban food security in many ways that include Firstly, the pivotal role that the informal food sector, notably street food vending, plays within the urban economy to address urban poverty and household food security, therefore questioning the conservative perspectives that view the informal sector as a hindrance to a ‘modern city’ and an annoyance to ‘modern’ urban spaces. Secondly, this study contributes to the livelihood and coping strategies of the urban poor who, despite harsh and restrictive regulatory frameworks, devise various agentive ways to generate incomes and address urban poverty and food insecurities.

Keywords: urban food security, street food vending, informal food sector, infrastructure systems, livelihood strategies, policy framework and governance

Procedia PDF Downloads 50