Search results for: European security
3591 The Political Economy of Green Trade in the Context of US-China Trade War: A Case Study of US Biofuels and Soybeans
Authors: Tonghua Li
Abstract:
Under the neoliberal corporate food regime, biofuels are a double-edged sword that exacerbates tensions between national food security and trade in green agricultural products. Biofuels have the potential to help achieve green sustainable development goals, but they threaten food security by exacerbating competition for land and changing global food trade patterns. The U.S.-China trade war complicates this debate. Under the influence of different political and corporate coordination mechanisms in China and the US, trade disputes can have different impacts on sustainable agricultural practices. This paper develops an actor-centred ‘network governance framework’ focusing on trade in soybean and corn-based biofuels to explain how trade wars can change the actions of governmental and non-governmental actors in the context of oligopolistic competition and market concentration in agricultural trade. There is evidence that the US-China trade decoupling exacerbates the conflict between national security, free trade in agriculture, and the realities and needs of green and sustainable energy development. The US government's trade policies reflect concerns about China's relative gains, leading to a loss of trade profits, making it impossible for the parties involved to find a balance between the three objectives and, consequently, to get into a biofuels and soybean industry dilemma. Within the setting of prioritizing national security and strategic interests, the government has replaced the dominant position of large agribusiness in the neoliberal food system, and the goal of environmental sustainability has been marginalized by high politics. In contrast, China faces tensions in the trade war between food security self-sufficiency policy and liberal sustainable trade, but the state-capitalist model ensures policy coordination and coherence in trade diversion and supply chain adjustment. Despite ongoing raw material shortages and technological challenges, China remains committed to playing a role in global environmental governance and promoting green trade objectives.Keywords: food security, green trade, biofuels, soybeans, US-China trade war
Procedia PDF Downloads 103590 The Role of Data Protection Officer in Managing Individual Data: Issues and Challenges
Authors: Nazura Abdul Manap, Siti Nur Farah Atiqah Salleh
Abstract:
For decades, the misuse of personal data has been a critical issue. Malaysia has accepted responsibility by implementing the Malaysian Personal Data Protection Act 2010 to secure personal data (PDPA 2010). After more than a decade, this legislation is set to be revised by the current PDPA 2023 Amendment Bill to align with the world's key personal data protection regulations, such as the European Union General Data Protection Regulations (GDPR). Among the other suggested adjustments is the Data User's appointment of a Data Protection Officer (DPO) to ensure the commercial entity's compliance with the PDPA 2010 criteria. The change is expected to be enacted in parliament fairly soon; nevertheless, based on the experience of the Personal Data Protection Department (PDPD) in implementing the Act, it is projected that there will be a slew of additional concerns associated with the DPO mandate. Consequently, the goal of this article is to highlight the issues that the DPO will encounter and how the Personal Data Protection Department should respond to this subject. The study result was produced using a qualitative technique based on an examination of the current literature. This research reveals that there are probable obstacles experienced by the DPO, and thus, there should be a definite, clear guideline in place to aid DPO in executing their tasks. It is argued that appointing a DPO is a wise measure in ensuring that the legal data security requirements are met.Keywords: guideline, law, data protection officer, personal data
Procedia PDF Downloads 783589 Family Firms Performance: Examining the Impact of Digital and Technological Capabilities using Partial Least Squares Structural Equation Modeling and Necessary Condition Analysis
Authors: Pedro Mota Veiga
Abstract:
This study comprehensively evaluates the repercussions of innovation, digital advancements, and technological capabilities on the operational performance of companies across fifteen European Union countries following the initial wave of the COVID-19 pandemic. Drawing insights from longitudinal data sourced from the 2019 World Bank business surveys and subsequent 2020 World Bank COVID-19 follow-up business surveys, our extensive examination involves a diverse sample of 5763 family businesses. In exploring the relationships between these variables, we adopt a nuanced approach to assess the impact of innovation and digital and technological capabilities on performance. This analysis unfolds along two distinct perspectives: one rooted in necessity and the other insufficiency. The methodological framework employed integrates partial least squares structural equation modeling (PLS-SEM) with condition analysis (NCA), providing a robust foundation for drawing meaningful conclusions. The findings of the study underscore a positive influence on the performance of family firms stemming from both technological capabilities and digital advancements. Furthermore, it is pertinent to highlight the indirect contribution of innovation to enhanced performance, operating through its impact on digital capabilities. This research contributes valuable insights to the broader understanding of how innovation, coupled with digital and technological capabilities, can serve as pivotal factors in shaping the post-COVID-19 landscape for businesses across the European Union. The intricate analysis of family businesses, in particular adds depth to the comprehension of the dynamics at play in diverse economic contexts within the European Union.Keywords: digital capabilities, technological capabilities, family firms performance, innovation, NCA, PLS-SEM
Procedia PDF Downloads 633588 The Food and Nutritional Effects of Smallholders’ Participation in Milk Value Chain in Ethiopia
Authors: Geday Elias, Montaigne Etienne, Padilla Martine, Tollossa Degefa
Abstract:
Smallholder farmers’ participation in agricultural value chain identified as a pathway to get out of poverty trap in Ethiopia. The smallholder dairy activities have a huge potential in poverty reduction through enhancing income, achieving food and nutritional security in the country. However, much less is known about the effects of smallholder’s participation in milk value chain on household food security and nutrition. This paper therefore, aims at evaluating the effects of smallholders’ participation in milk value chain on household food security taking in to account the four pillars of food security measurements (availability, access, utilization and stability). Using a semi-structured interview, a cross sectional farm household data collected from a randomly selected sample of 333 households (170 in Amhara and 163 in Oromia regions).Binary logit and propensity score matching( PSM) models are employed to examine the mechanisms through which smallholder’s participation in the milk value chain affects household food security where crop production, per capita calorie intakes, diet diversity score, and food insecurity access scale are used to measure food availability, access, utilization and stability respectively. Our findings reveal from 333 households, only 34.5% of smallholder farmers are participated in the milk value chain. Limited access to inputs and services, limited access to inputs markets and high transaction costs are key constraints for smallholders’ limited access to the milk value chain. To estimate the true average participation effects of milk value chain for participated households, the outcome variables (food security) of farm households who participated in milk value chain are compared with the outcome variables if the farm households had not participated. The PSM analysis reveals smallholder’s participation in milk value chain has a significant positive effect on household income, food security and nutrition. Smallholder farmers who are participated in milk chain are better by 15 quintals crops production and 73 percent of per capita calorie intakes in food availability and access respectively than smallholder farmers who are not participated in the market. Similarly, the participated households are better in dietary quality by 112 percents than non-participated households. Finally, smallholders’ who are participated in milk value chain are better in reducing household vulnerability to food insecurity by an average of 130 percent than non participated households. The results also shows income earned from milk value chain participation contributed to reduce capital’s constraints of the participated households’ by higher farm income and total household income by 5164 ETB and 14265 ETB respectively. This study therefore, confirms the potential role of smallholders’ participation in food value chain to get out of poverty trap through improving rural household income, food security and nutrition. Therefore, identified the determinants of smallholder participation in milk value chain and the participation effects on food security in the study areas are worth considering as a positive knock for policymakers and development agents to tackle the poverty trap in the study area in particular and in the country in general.Keywords: effects, food security and nutrition, milk, participation, smallholders, value chain
Procedia PDF Downloads 3433587 The Food and Nutrition Security in Brazilian Quilombo: The Account of Experiences in Two Titled Territories
Authors: Dyego Ramos Henrique, Viviane Pimentel, Katia Souto, Ana Valéria Mendonça, Andrea Gallassi
Abstract:
Socioeconomic inequalities in Brazil have accentuated the aggravations of poverty among the most vulnerable populations, among which are the quilombola communities. The objective was to reflect on a situation of food and nutritional security in two Brazilian quilombola communities. The data were collected by means of reports of experience through the production of talk wheels in two quilombola communities (Itamatatiua and Mesquita), located in the cities of Alcântara and Cidade Ocidental. Access to health services and health promotion actions were still incipient in the quilombola communities visited. The perceptions of the participants of the quilombolas revealed that there are still repressed demands that have rendered the fulfillment of the principles of equity, universality and integrality, both for access to health and for access and availability of food. They recognize in governmental instances a socioeconomic-cultural valorization and nutritional qualities intrinsic to the foods produced by them. Although they have been used as communities of quilombolas live and their level of access to services and programs, dealing with quilombola communities does not mean dealing with 'isolated groups or a strictly homogeneous population.' It demands a great need of attention in relation to the access and availability of food, besides overcoming barriers that made it an unfeasible valuation of social, economic and cultural precepts, intrinsic to the thought about food and nutritional security in Brazilian quilombos.Keywords: access to services, food and nutrition security, health promotion, quilombo population
Procedia PDF Downloads 2273586 The Nexus between Migration and Human Security: The Case of Ethiopian Female Migration to Sudan
Authors: Anwar Hassen Tsega
Abstract:
International labor migration is an integral part of the modern globalized world. However, the phenomenon has its roots in some earlier periods in human history. This paper discusses the relatively new phenomenon of female migration in Africa. In the past, African women migrants were only spouses or dependent family members. But as modernity swept most African societies, with rising unemployment rates, there is evidence everywhere in Africa that women labor migration is a growing phenomenon that deserves to be understood in the context of human security research. This work explores these issues further, focusing on the experience of Ethiopian women labor migrants to Sudan. The migration of Ethiopian people to Sudan is historical; nevertheless, labor migration mainly started since the discovery and subsequent exploration of oil in the Sudan. While the paper is concerned with the human security aspect of the migrant workers, we need to be certain that the migration process will provide with a decent wage, good working conditions, the necessary social security coverage, and labor protection as a whole. However, migration to Sudan is not always safe and female migrants become subject to violence at the hands of brokers, employers and migration officials. For this matter, the paper argued that identifying the vulnerable stages and major problem facing female migrant workers at various stages of migration is a prerequisite to combat the problem and secure the lives of the migrant workers. The major problems female migrants face include extra degrees of gender-based violence, underpayment, various forms of abuse like verbal, physical and sexual and other forms of torture which include beating and slaps. This peculiar situation could be attributed to the fact that most of these women are irregular migrants and fall under the category of unskilled and/or illiterate migrants.Keywords: Ethiopia, human security, labor migration, Sudan
Procedia PDF Downloads 2513585 Gender Differences in E-Society: The Case of Slovenia
Authors: Mitja Dečman
Abstract:
The ever-increasing presence and use of information and communication technology (ICT) influences the different social relationships of today's society. Gender differences are especially important from the viewpoint of modern society since ICT can either deepen the existing inequalities or diminish them. In a developed Western world, gender equality has been a well-focused area for decades in many parts of society including education, employment or politics and has led to a decrease in the inequality of women and men in these and other areas. The area of digital equality, or inequality for that matter, is one of the areas where gender differences still exist in many countries of the world. The research presented in this paper focuses on Slovenia, one of the smallest EU member states, being an average achiever in the area of e-society according to the many different European benchmarking indexes. On the other hand, Slovenia is working in an alignment with many European gender equality guidelines and showing good results. The results of our research are based on the analysis of survey data from 2014 to 2017 dealing with Slovenian citizens and their households and the use of ICT. Considering gender issues, the synthesis showed that cultural differences influence some measured ICT indicators but on the other hand the differences are low and only sometimes statistically significant.Keywords: digital divide, gender inequality, Slovenia, e-society
Procedia PDF Downloads 1683584 Renewed Urban Waterfront: Spatial Conditions of a Contemporary Urban Space Typology
Authors: Beate Niemann, Fabian Pramel
Abstract:
The formerly industrially or militarily used Urban Waterfront is a potential area for urban development. Extensive interventions in the urban space come along with the development of these previously inaccessible areas in the city. The development of the Urban Waterfront in the European City is not subject to any recognizable urban paradigm. In this study, the development of the Urban Waterfront as a new urban space typology is analyzed by case studies of Urban Waterfront developments in European Cities. For humans, perceptible spatial conditions are categorized and it is identified whether the themed Urban Waterfront Developments are congruent or incongruent urban design interventions and which deviations the Urban Waterfront itself induce. As congruent urban design, a design is understood, which fits in the urban fabric regarding its similar spatial conditions to the surrounding. Incongruent urban design, however, shows significantly different conditions in its shape. Finally, the spatial relationship of the themed Urban Waterfront developments and their associated environment are compared in order to identify contrasts between new and old urban space. In this way, conclusions about urban design paradigms of the new urban space typology are tried to be drawn.Keywords: composition, congruence, identity, paradigm, spatial condition, urban design, urban development, urban waterfront
Procedia PDF Downloads 4443583 Opacity Synthesis with Orwellian Observers
Authors: Moez Yeddes
Abstract:
The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.Keywords: security policies, opacity, formal verification, orwellian observation
Procedia PDF Downloads 2263582 A Snapshot of Agricultural Waste in the European Union
Authors: Margarida Soares, Zlatina Genisheva, Lucas Nascimento, André Ribeiro, Tiago Miranda, Eduardo Pereira, Joana Carvalho
Abstract:
In the current global context, we face a significant challenge: the rapid population increase combined with the pressing need for sustainable management of agro-industrial waste. Beyond understanding how population growth impacts waste generation, it is essential to first identify the primary types of waste produced and the countries responsible to guide targeted actions. This study presents key statistical data on waste production from the agriculture, forestry, and fishing sectors across the European Union, alongside information on the agricultural areas dedicated to crop production in each European Union country. These insights will form the basis for future research into waste production by crop type and country to improve waste management practices and promote recovery methods that are vital for environmental sustainability. The agricultural sector must stay at the forefront of scientific and technological advancements to meet climate change challenges, protect the environment, and ensure food and health security. The study's findings indicate that population growth significantly increases pressure on natural resources, leading to a rise in agro-industrial waste production. EUROSTAT data shows that, in 2020, the agriculture, forestry, and fishing sectors produced over 21 million tons of waste. Spain emerged as the largest producer, contributing nearly 30% of the EU's total waste in these sectors. Furthermore, five countries—Spain, the Netherlands, France, Sweden, and Germany—were responsible for producing more than two-thirds of the waste from these sectors. Regarding agricultural land use, the data for 2020 revealed that around two-thirds of the total agricultural area was concentrated in six countries: France, Spain, Germany, Poland, Romania, and Italy. Regarding waste production per capita, the Netherlands had the highest figures in the EU for 2020. The data presented in this study highlights the urgent need for action in managing agricultural waste in the EU. As population growth continues to drive up demand for agricultural products, waste generation will inevitably rise unless significant changes are made in managing of agro-industrial waste. The countries must lead the way in adopting technological waste management strategies that focus on reducing, reusing, and recycling waste to benefit both the environment and society. Equally important is the need to promote collaborative efforts between governments, industries, and research institutions to develop and implement technologies that transform waste into valuable resources. The insights from this study are critical for informing future strategies to improve the management and valorization of waste from the agro-industrial sector. One of the most promising approaches is adopting circular economy principles to create closed-loop systems that minimize environmental impacts. By rethinking waste as a valuable resource rather than a by-product, agricultural industries can contribute to more sustainable practices that support both environmental health and economic growth.Keywords: agricultural area, agricultural waste, circular economy, environmental challenges, population growth
Procedia PDF Downloads 173581 Gendered Appartus of a Military: The Role of Military Wives in Defining Security
Authors: Taarika Singh
Abstract:
Military wives – women married to army officers have largely been recognized as mere supporters or as auxiliaries to military men rather than propagators of thought and ideologies. The military wife (and her participation) is often dismissed as 'private', 'domestic', or 'trivial' and is acknowledged, if at all, only as an (inevitable/normative) entity, seen as a natural product/outcome of militarization. It is because the military wife has come to be constructed and accepted as normative by states and militaries that women of the military are easily ‘trivialised’ and are made to appear to be socially, politically, or theoretically irrelevantand/or insignificant. This paper, using ethnography-- structured and semi-structured interviews -- makes a gendered analysis of militarization, by bringing the military wife to the forefront and placing her at the nexus of the military and state apparatus. Moving away from gendered analyses that focus on the impact of militarization on women or draw attention to the ways in which militarization has been challenged/resisted by women, the paper pays attention to the centrality of women in shaping, validating, and perpetuating militarization, patriarchal control, and gendered hierarchies. The paper will demonstrate how military wives accept and comply with patriarchy as an institutional form of social organization that extends beyond the family and kinship relations into the military as an organization of the state. The paper will draw attention to the ways in which military norms, patriarchal values, and belief systems shape the social personhood, identity, and worldview of military wives; as a consequence of which, women play a central role in upholding and reproducing social inequalities and hierarchies; in shaping social status, and power relationships amongst men and women within and outside the military. The paper will allude to the processes and ideologies via which womena) accept and reproducemen as exclusive holders of power, status, and privilege; and b) recognize international relations, politics, andmatters related to security to be male dominated arenas inviting overwhelming masculine participation. In doing so, the paper will argue that women of the military play a critical role in perpetuating and upholding gendered meanings associated with the notion of and discourse around security. The paper will illustratehow military wives accept and assume security to be inherently a gendered idea -- a masculine notion, a male dominated arena, as something granted by men. In other words, the paper will demonstrate how the militarization of the military wives and the perpetuation of militarization by military wives plays a crucial role in propagating and perpetuating security to be a masculine notion or a male dominated arena. The paper will then question the degree to which such gendered analyses can shape the broader meanings, definitions, and discourses around security, matters related to security, and security threats.Keywords: gender, militarisation, security, women
Procedia PDF Downloads 1443580 Design and Implementation of a Geodatabase and WebGIS
Authors: Sajid Ali, Dietrich Schröder
Abstract:
The merging of internet and Web has created many disciplines and Web GIS is one these disciplines which is effectively dealing with the geospatial data in a proficient way. Web GIS technologies have provided an easy accessing and sharing of geospatial data over the internet. However, there is a single platform for easy and multiple accesses of the data lacks for the European Caribbean Association (Europaische Karibische Gesselschaft - EKG) to assist their members and other research community. The technique presented in this paper deals with designing of a geodatabase using PostgreSQL/PostGIS as an object oriented relational database management system (ORDBMS) for competent dissemination and management of spatial data and Web GIS by using OpenGeo Suite for the fast sharing and distribution of the data over the internet. The characteristics of the required design for the geodatabase have been studied and a specific methodology is given for the purpose of designing the Web GIS. At the end, validation of this Web based geodatabase has been performed over two Desktop GIS software and a web map application and it is also discussed that the contribution has all the desired modules to expedite further research in the area as per the requirements.Keywords: desktop GISSoftware, European Caribbean association, geodatabase, OpenGeo suite, postgreSQL/PostGIS, webGIS, web map application
Procedia PDF Downloads 3413579 Ethics and Military Defections in Nonviolent Resistance Campaigns
Authors: Adi Levy
Abstract:
Military and security personnel defections during nonviolent resistance (NVR) campaigns are recognized as an effective way of undermining the regime’s power, but they also may generate moral dilemmas that contradict the moral standing of NVR tactics. NVR campaigns have been primarily praised for their adherence to moral and legal norms, yet some of NVR tactics raise serious ethical concerns. This paper focuses on NVR tactics that seek to promote defections and disobedience within military and security personnel to sustain their campaign. Academic literature regarding NVR tactics indicates that compared to violent forms of resistance, defections are more likely to occur when security forces confront nonviolent activists. Indeed, defections play a strategically fundamental role in nonviolent campaigns, particularly against authoritarian regimes, as it enables activists to undermine the regime’s central pillars of support. This study examines the events of the Arab Spring and discusses the ethical problems that arise in nonviolent activists’ promotion of defections and disobedience. The cases of Syria and Egypt suggest that the strategic promotion of defections and disobedience was significantly effective in sustaining the campaign. Yet, while such defections enhance nonviolent activists’ resilience, how they are promoted can be morally contentious and the consequences can be dire. Defections are encouraged by social, moral and emotional appeals that use the power disparities between unarmed civilians and powerful regimes to affect soldiers and security personnel’s process of decision-making. In what is commonly referred to as dilemma action, nonviolent activists deliberately entangle security forces in a moral dilemma that compels them to follow a moral code to protect unarmed civilians. In this way, activists sustain their struggle and even gain protection. Nonviolent activists are likely to be completely defeated when confronted with armed forces. Therefore they rely on the military and security personnel’s moral conscious of convincing them to refrain from using force against them. While this is effective, it also leaves soldiers and security forces exposed to the implications and punishments that might follow their disobedience or defection. As long as they remain nonviolent, activists enjoy civilian immunity despite using morally contentious tactics. But the severe implications brought upon defectors. As a result, demand a deep examination of this tactic’s moral permissibility and a discussion that assesses culpability for the moral implications of its application.Keywords: culpability, defections, nonviolence, permissibility
Procedia PDF Downloads 1193578 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives
Authors: Obinna Emmanuel Nkomadu
Abstract:
Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms
Procedia PDF Downloads 923577 A Novel Parametric Chaos-Based Switching System PCSS for Image Encryption
Authors: Mohamed Salah Azzaz, Camel Tanougast, Tarek Hadjem
Abstract:
In this paper, a new low-cost image encryption technique is proposed and analyzed. The developed chaos-based key generator provides complex behavior and can change it automatically via a random-like switching rule. The designed encryption scheme is called PCSS (Parametric Chaos-based Switching System). The performances of this technique were evaluated in terms of data security and privacy. Simulation results have shown the effectiveness of this technique, and it can thereafter, ready for a hardware implementation.Keywords: chaos, encryption, security, image
Procedia PDF Downloads 4763576 Determinants of Household Food Security in Addis Ababa City Administration
Authors: Estibe Dagne Mekonnen
Abstract:
In recent years, the prevalence of undernourishment was 30 percent for sub-Saharan Africa, compared with 16 percent for Asia and the Pacific (Ali, 2011). In Ethiopia, almost 40 percent of the total population in the country and 57 percent of Addis Ababa population lives below the international poverty line of US$ 1.25 per day (UNICEF, 2009). This study aims to analyze the determinant of household food secrity in Addis Ababa city administration. Primary data were collected from a survey of 256 households in the selected sub-city, namely Addis Ketema, Arada, and Kolfe Keranio, in the year 2022. Both Purposive and multi-stage cluster random sampling procedures were employed to select study areas and respondents. Descriptive statistics and order logistic regression model were used to test the formulated hypotheses. The result reveals that out of the total sampled households, 25% them were food secured, 13% were mildly food insecure, 26% were moderately food insecure and 36% were severely food insecure. The study indicates that household family size, house ownership, household income, household food source, household asset possession, household awareness on inflation, household access to social protection program, household access to credit and saving and household access to training and supervision on food security have a positive and significant effect on the likelihood of household food security status. However, marital status of household head, employment sector of household head, dependency ratio and household’s nonfood expenditure has a negative and significant influence on household food security status. The study finally suggests that the government in collaboration with financial institutions and NGO should work on sustaining household food security by creating awareness, providing credit, facilitate rural-urban linkage between producer and consumer and work on urban infrastructure improvement. Moreover, the governments also work closely and monitor consumer good suppliers, if possible find a way to subsidize consumable goods to more insecure households and make them to be food secured. Last but not least, keeping this country’s peace will play a crucial role to sustain food security.Keywords: determinants, household, food security, order logit model, Addis Ababa
Procedia PDF Downloads 753575 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography
Authors: Merad Boudia Omar Rafik, Feham Mohammed
Abstract:
Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysisKeywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption
Procedia PDF Downloads 3003574 DCT and Stream Ciphers for Improved Image Encryption Mechanism
Authors: T. R. Sharika, Ashwini Kumar, Kamal Bijlani
Abstract:
Encryption is the process of converting crucial information’s unreadable to unauthorized persons. Image security is an important type of encryption that secures all type of images from cryptanalysis. A stream cipher is a fast symmetric key algorithm which is used to convert plaintext to cipher text. In this paper we are proposing an image encryption algorithm with Discrete Cosine Transform and Stream Ciphers that can improve compression of images and enhanced security. The paper also explains the use of a shuffling algorithm for enhancing securing.Keywords: decryption, DCT, encryption, RC4 cipher, stream cipher
Procedia PDF Downloads 3633573 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level
Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil
Abstract:
This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing
Procedia PDF Downloads 3793572 Reimagining Urban Food Security Through Informality Practices: The Case of Street Food Vending in Johannesburg, South Africa
Authors: Blessings Masuku
Abstract:
This study positions itself within the nascent of street food vending that plays a crucial role in addressing urban household food security across the urban landscape of South Africa. The study aimed to understand how various forms of infrastructure systems (i.e., energy, water and sanitation, housing, and transport, among others) intersect with food and urban informality and how vendors and households’ choices and decisions made around food are influenced by infrastructure assemblages. This study noted that most of the literature studies on food security have mainly focused on the rural agricultural sector, with limited attention to urban food security, notably the role of informality practices in addressing urban food insecurity at the household level. This study pays close attention to how informal informality practices such as street food vending can be used as a catalyst to address urban poverty and household food security and steer local economies for sustainable livelihoods of the urban poor who live in the periphery of the city in Johannesburg. This study deconstructs the infrastructure needs of street food vendors, and the aim was to understand how such infrastructure needs intersect with food and policy that governs urban informality practices. The study argues that the decisions and choices of informality actors in the city of Johannesburg are chiefly determined by the assemblages of infrastructure, including regulatory frameworks that govern the informal sector in the city of Johannesburg. A qualitative approach that includes surveys (open-ended questions), archival research (i., e policy and other key document reviews), and key interviews mainly with city officials and informality actors. A thematic analysis was used to analyze the data collected. This study contributes to greater debates on urban studies and burgeoning literature on urban food security in many ways that include Firstly, the pivotal role that the informal food sector, notably street food vending, plays within the urban economy to address urban poverty and household food security, therefore questioning the conservative perspectives that view the informal sector as a hindrance to a ‘modern city’ and an annoyance to ‘modern’ urban spaces. Secondly, this study contributes to the livelihood and coping strategies of the urban poor who, despite harsh and restrictive regulatory frameworks, devise various agentive ways to generate incomes and address urban poverty and food insecurities.Keywords: urban food security, street food vending, informal food sector, infrastructure systems, livelihood strategies, policy framework and governance
Procedia PDF Downloads 633571 National Plans for Recovery and Resilience between National Recovery and EU Cohesion Objectives: Insights from European Countries
Authors: Arbolino Roberta, Boffardi Raffaele
Abstract:
Achieving the highest effectiveness for the National Plans for Recovery and Resilience (NPRR) while strengthening the objectives of cohesion and reduction of intra-EU unbalances is only possible by means of strategic, coordinated, and coherent policy planning. Therefore, the present research aims at assessing and quantifying the potential impact of NPRRs across the twenty-seven European Member States in terms of economic convergence, considering disaggregated data on industrial, construction, and service sectors. The first step of the research involves a performance analysis of the main macroeconomic indicators describing the trends of twenty-seven EU economies before the pandemic outbreak. Subsequently, in order to define the potential effect of the resources allocated, we perform an impact analysis of previous similar EU investment policies, estimating national-level sectoral elasticity associated with the expenditure of the 2007-2013 and 2014-2020 Cohesion programmes funds. These coefficients are then exploited to construct adjustment scenarios. Finally, convergence analysis is performed on the data used for constructing scenarios in order to understand whether the expenditure of funds might be useful to foster economic convergence besides driving recovery. The results of our analysis show that the allocation of resources largely mirrors the aims of the policy framework underlying the NPRR, thus reporting the largest investments in both those sectors most affected by the economic shock (services) and those considered fundamental for the digital and green transition. Notwithstanding an overall positive effect, large differences exist among European countries, while no convergence process seems to be activated or fostered by these interventions.Keywords: NPRR, policy evaluation, cohesion policy, scenario Nalsysi
Procedia PDF Downloads 833570 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 2853569 Perceived Procedural Justice and Organizational Citizenship Behavior: Evidence from a Security Organization
Authors: Noa Nelson, Orit Appel, Rachel Ben-ari
Abstract:
Organizational Citizenship Behavior (OCB) is voluntary employee behavior that contributes to the organization beyond formal job requirements. It can take different forms, such as helping teammates (OCB toward individuals; hence, OCB-I), or staying after hours to attend a task force (OCB toward the organization; hence, OCB-O). Generally, OCB contributes substantially to organizational climate, goals, productivity, and resilience, so organizations need to understand what encourages it. This is particularly challenging in security organizations. Security work is characterized by high levels of stress and burnout, which is detrimental to OCB, and security organizational design emphasizes formal rules and clear hierarchies, leaving employees with less freedom for voluntary behavior. The current research explored the role of Perceived Procedural Justice (PPJ) in enhancing OCB in a security organization. PPJ refers to how fair decision-making processes are perceived to be. It involves the sense that decision makers are objective, attentive to everyone's interests, respectful in their communications and participatory - allowing individuals a voice in decision processes. Justice perceptions affect motivation, and it was specifically suggested that PPJ creates an attachment to one's organization and personal interest in its success. Accordingly, PPJ had been associated with OCB, but hardly any research tested their association with security organizations. The current research was conducted among prison guards in the Israel Prison Service, to test a correlational and a causal association between PPJ and OCB. It differentiated between perceptions of direct commander procedural justice (CPJ), and perceptions of organization procedural justice (OPJ), hypothesizing that CPJ would relate to OCB-I, while OPJ would relate to OCB-O. In the first study, 336 prison guards (305 male) from 10 different prisons responded to questionnaires measuring their own CPJ, OPJ, OCB-I, and OCB-O. Hierarchical linear regression analyses indicated the significance of commander procedural justice (CPJ): It associated with OCB-I and also associated with OPJ, which, in turn, associated with OCB-O. The second study tested CPJ's causal effects on prison guards' OCB-I and OCB-O; 311 prison guards (275 male) from 14 different prisons read scenarios that described either high or low CPJ, and then evaluated the likelihood of that commander's prison guards performing OCB-I and OCB-O. In this study, CPJ enhanced OCB-O directly. It also contributed to OCB-I, indirectly: CPJ enhanced the motivation for collaboration with the commander, which respondents also evaluated after reading scenarios. Collaboration, in turn, associated with OCB-I. The studies demonstrate that procedural justice, especially commander's PJ, promotes OCB in security work environments. This is important because extraordinary teamwork and motivation are needed to deal with emergency situations and with delicate security challenges. Following the studies, the Israel Prison Service implemented personal procedural justice training for commanders and unit level programs for procedurally just decision processes. From a theoretical perspective, the studies extend the knowledge on PPJ and OCB to security work environments and contribute evidence on PPJ's causal effects. They also call for further research, to understand the mechanisms through which different types of PPJ affect different types of OCB.Keywords: organizational citizenship behavior, perceived procedural justice, prison guards, security organizations
Procedia PDF Downloads 2213568 Quality of Romanian Food Products on Rapid Alert System for Food and Feed Notifications
Authors: Silvius Stanciu
Abstract:
Romanian food products sold on European markets have been accused of several non-conformities of quality and safety. Most products incriminated last period were those of animal origin, especially meat and meat products. The study proposed an analysis of the notifications made by network members through Rapid Alert System for Food and Feed on products originating in Romania. As a source of information, the Rapid Alert System portal and the official communications of the National Sanitary Veterinary and Food Safety Authority were used. The research results showed that nearly a quarter of network notifications were rejected and were withdrawn by the European Authority. Although national authorities present these issues as success stories of national quality policies, the large number of notifications related to the volume of exported products is worrying. The paper is of practical and applicative importance for both the business environment and the academic environment, laying the basis for a wider research on the quality differences between Romanian and imported products.Keywords: food, quality, RASFF, Rapid Alert System for Food and Feed, Romania
Procedia PDF Downloads 1603567 Encouraging Skills and Entrepreneurial Spirit to Improve Employability of Young Artists
Authors: Olga Lasaga, Carmen Parra
Abstract:
Within the EU 'New Skills for New Jobs' initiative, the art and music sector is considered one of the most vulnerable. Its graduates are faced with the threat of the dole or of not finding work in the sector in which they trained. In this regard, an increasing number of students are graduating every year from European Conservatories and Fine Arts Centres, while the number of job opportunities in this sector has stagnated or decreased. Moreover, the traditional teaching of these institutes does not favour the acquisition of basic skills, such as team building, entrepreneurship, marketing, website design and the design of events, which are among the most important facets of project management and are precisely those aspects that are often most related to the improvement of employability in the art world. To remedy this situation, the results of the European Erasmus+ OMEGA project (Opening More Employment Gates for Art and Music Students) are presented. The OMEGA project aims to increase the employability of art and music students by equipping them with additional skills needed for the search for work. As a result of this project, a manual has been created, a pilot course has been designed and taught, and a comparative study has been conducted on the state of play of the participating countries.Keywords: artists, employability, entrepreneurship, musicians, skills
Procedia PDF Downloads 2453566 Islamic Extremist Groups' Usage of Populism in Social Media to Radicalize Muslim Migrants in Europe
Authors: Muhammad Irfan
Abstract:
The rise of radicalization within Islam has spawned a new era of global terror. The battlefield Successes of ISIS and the Taliban are fuelled by an ideological war waged, largely and successfully, in the media arena. This research will examine how Islamic extremist groups are using media modalities and populist narratives to influence migrant Muslim populations in Europe towards extremism. In 2014, ISIS shocked the world in exporting horrifically graphic forms of violence on social media. Their Muslim support base was largely disgusted and reviled. In response, they reconfigured their narrative by introducing populist 'hooks', astutely portraying the Muslim populous as oppressed and exploited by unjust, corrupt autocratic regimes and Western power structures. Within this crucible of real and perceived oppression, hundreds of thousands of the most desperate, vulnerable and abused migrants left their homelands, risking their lives in the hope of finding peace, justice, and prosperity in Europe. Instead, many encountered social stigmatization, detention and/or discrimination for being illegal migrants, for lacking resources and for simply being Muslim. This research will examine how Islamic extremist groups are exploiting the disenfranchisement of these migrant populations and using populist messaging on social media to influence them towards violent extremism. ISIS, in particular, formulates specific encoded messages for newly-arriving Muslims in Europe, preying upon their vulnerability. Violence is posited, as a populist response, to the tyranny of European oppression. This research will analyze the factors and indicators which propel Muslim migrants along the spectrum from resilience to violence extremism. Expected outcomes are identification of factors which influence vulnerability towards violent extremism; an early-warning detection framework; predictive analysis models; and de-radicalization frameworks. This research will provide valuable tools (practical and policy level) for European governments, security stakeholders, communities, policy-makers, and educators; it is anticipated to contribute to a de-escalation of Islamic extremism globally.Keywords: populism, radicalization, de-radicalization, social media, ISIS, Taliban, shariah, jihad, Islam, Europe, political communication, terrorism, migrants, refugees, extremism, global terror, predictive analysis, early warning detection, models, strategic communication, populist narratives, Islamic extremism
Procedia PDF Downloads 1193565 Establishment of Gene Pools for Yield Within the Ghanaian Sweetpotato Parental Germplasm
Authors: John Saaka
Abstract:
The increasing world population poses a threat to food security. To meet current and future food demands, sweetpotato stand a good chance because of its recent food security roles. Concerted efforts are needed for both regional and local level varietal development. Heterosis exploiting breeding scheme (HEBS) is one of the options used to improve yield in some crop species and could be a good approach for sweetpotato improvement in Ghana by establishing heterotic gene pools within a population. To achieve this, 22 parental lines were collected from different sources and put in a full diallel arrangement. A total of 149 families, 20 individual cuttings per family, were taken to the field, including ‘checks’ and parental lines for experimentation in a 1m X 0.3m planting order according to the Westcott design. Results from this study led to the characterization of the selected parents into three main heterotic gene pools based on their suitability for use as male, female or both, respectively. This study serves as a baseline for further characterization of the rest of the germplasm in the Ghanaian sweetpotato breeding program.Keywords: sweetpotato, heterosis, germplasm, food security
Procedia PDF Downloads 773564 Evaluation and Analysis of ZigBee-Based Wireless Sensor Network: Home Monitoring as Case Study
Authors: Omojokun G. Aju, Adedayo O. Sule
Abstract:
ZigBee wireless sensor and control network is one of the most popularly deployed wireless technologies in recent years. This is because ZigBee is an open standard lightweight, low-cost, low-speed, low-power protocol that allows true operability between systems. It is built on existing IEEE 802.15.4 protocol and therefore combines the IEEE 802.15.4 features and newly added features to meet required functionalities thereby finding applications in wide variety of wireless networked systems. ZigBee‘s current focus is on embedded applications of general-purpose, inexpensive, self-organising networks which requires low to medium data rates, high number of nodes and very low power consumption such as home/industrial automation, embedded sensing, medical data collection, smart lighting, safety and security sensor networks, and monitoring systems. Although the ZigBee design specification includes security features to protect data communication confidentiality and integrity, however, when simplicity and low-cost are the goals, security is normally traded-off. A lot of researches have been carried out on ZigBee technology in which emphasis has mainly been placed on ZigBee network performance characteristics such as energy efficiency, throughput, robustness, packet delay and delivery ratio in different scenarios and applications. This paper investigate and analyse the data accuracy, network implementation difficulties and security challenges of ZigBee network applications in star-based and mesh-based topologies with emphases on its home monitoring application using the ZigBee ProBee ZE-10 development boards for the network setup. The paper also expose some factors that need to be considered when designing ZigBee network applications and suggest ways in which ZigBee network can be designed to provide more resilient to network attacks.Keywords: home monitoring, IEEE 802.14.5, topology, wireless security, wireless sensor network (WSN), ZigBee
Procedia PDF Downloads 3853563 The European Pharmacy Market: The Density and its Influencing Factors
Authors: Selina Schwaabe
Abstract:
Community pharmacies deliver high-quality health care and are responsible for medication safety. During the pandemic, accessibility to the nearest pharmacy became more essential to get vaccinated against Covid-19 and to get medical aid. The government's goal is to ensure nationwide, reachable, and affordable medical health care services by pharmacies. Therefore, the density of community pharmacies matters. Overall, the density of community pharmacies is fluctuating, with slightly decreasing tendencies in some countries. So far, the literature has shown that changes in the system affect prices and density. However, a European overview of the development of the density of community pharmacies and its triggers is still missing. This research is essential to counteract against decreasing density consulting in a lack of professional health care through pharmacies. The analysis focuses on liberal versus regulated market structures, mail-order prescription drug regulation, and third-party ownership consequences. In a panel analysis, the relative influence of the measures is examined across 27 European countries over the last 21 years. In addition, the paper examines seven selected countries in depth, selected for the substantial variance in their pharmacy system: Germany, Austria, Portugal, Denmark, Sweden, Finland and Poland. Overall, the results show that regulated pharmacy markets have over 10.75 pharmacies/100.000 inhabitants more than liberal markets. Further, mail-order prescription drugs decrease the density by -17.98 pharmacies/100.000 inhabitants. Countries allowing third-party ownership have 7.67 pharmacies/100.000 inhabitants more. The results are statistically significant at a 0.001 level. The output of this analysis recommends regulated pharmacy markets, with a ban on mail-order prescription drugs allowing third-party ownership to support nationwide medical health care through community pharmacies.Keywords: community pharmacy, market conditions, pharmacy, pharmacy market, pharmacy lobby, prescription, e-prescription, ownership structures
Procedia PDF Downloads 1343562 Risk Management Approach for a Secure and Performant Integration of Automated Drug Dispensing Systems in Hospitals
Authors: Hind Bouami, Patrick Millot
Abstract:
Medication dispensing system is a life-critical system whose failure may result in preventable adverse events leading to longer patient stays in hospitals or patient death. Automation has led to great improvements in life-critical systems as it increased safety, efficiency, and comfort. However, critical risks related to medical organization complexity and automated solutions integration can threaten drug dispensing security and performance. Knowledge about the system’s complexity aspects and human machine parameters to control for automated equipment’s security and performance will help operators to secure their automation process and to optimize their system’s reliability. In this context, this study aims to document the operator’s situation awareness about automation risks and parameters involved in automation security and performance. Our risk management approach has been deployed in the North Luxembourg hospital center’s pharmacy, which is equipped with automated drug dispensing systems since 2009. With more than 4 million euros of gains generated, North Luxembourg hospital center’s success story was enabled by the management commitment, pharmacy’s involvement in the implementation and improvement of the automation project, and the close collaboration between the pharmacy and Sinteco’s firm to implement the necessary innovation and organizational actions for automated solutions integration security and performance. An analysis of the actions implemented by the hospital and the parameters involved in automated equipment’s integration security and performance has been made. The parameters to control for automated equipment’s integration security and performance are human aspects (6.25%), technical aspects (50%), and human-machine interaction (43.75%). The implementation of an anthropocentric analysis system before automation would have prevented and optimized the control of risks related to automation.Keywords: Automated drug delivery systems, Hospitals, Human-centered automated system, Risk management
Procedia PDF Downloads 138