Search results for: national security exception
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7118

Search results for: national security exception

6308 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.

Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms

Procedia PDF Downloads 91
6307 The Role of Gender Differences in the Use of National Parks and Forested Areas in Slavonice, Czech Republic Using Quick Response Code

Authors: Chingkheihunba Pebam, Shima Yazdanmehr

Abstract:

This research project aims to study the role that gender has upon the use of National Parks and forested recreation areas in Slavonice, Czech Republic. Furthermore, this study investigate the role and significance that forested areas have upon the daily lives of local residents. This research proposes to observe the users at twenty distinct locations during twelve weeks study period. The study locations are within close proximity to the historic and recreational destination of Slavonice, situated in the southern part of the Czech Republic. This research aims to monitor the frequency of human presence and their associated movements in various recreation and tourism destinations in a discreet manner without disturbing the ecological elements such as wildlife/flora and fauna using uniquely generated Quick Response Codes (QR) for each twenty locations.

Keywords: national park, gender, czech republic, QR code

Procedia PDF Downloads 212
6306 A Novel Parametric Chaos-Based Switching System PCSS for Image Encryption

Authors: Mohamed Salah Azzaz, Camel Tanougast, Tarek Hadjem

Abstract:

In this paper, a new low-cost image encryption technique is proposed and analyzed. The developed chaos-based key generator provides complex behavior and can change it automatically via a random-like switching rule. The designed encryption scheme is called PCSS (Parametric Chaos-based Switching System). The performances of this technique were evaluated in terms of data security and privacy. Simulation results have shown the effectiveness of this technique, and it can thereafter, ready for a hardware implementation.

Keywords: chaos, encryption, security, image

Procedia PDF Downloads 475
6305 Determinants of Household Food Security in Addis Ababa City Administration

Authors: Estibe Dagne Mekonnen

Abstract:

In recent years, the prevalence of undernourishment was 30 percent for sub-Saharan Africa, compared with 16 percent for Asia and the Pacific (Ali, 2011). In Ethiopia, almost 40 percent of the total population in the country and 57 percent of Addis Ababa population lives below the international poverty line of US$ 1.25 per day (UNICEF, 2009). This study aims to analyze the determinant of household food secrity in Addis Ababa city administration. Primary data were collected from a survey of 256 households in the selected sub-city, namely Addis Ketema, Arada, and Kolfe Keranio, in the year 2022. Both Purposive and multi-stage cluster random sampling procedures were employed to select study areas and respondents. Descriptive statistics and order logistic regression model were used to test the formulated hypotheses. The result reveals that out of the total sampled households, 25% them were food secured, 13% were mildly food insecure, 26% were moderately food insecure and 36% were severely food insecure. The study indicates that household family size, house ownership, household income, household food source, household asset possession, household awareness on inflation, household access to social protection program, household access to credit and saving and household access to training and supervision on food security have a positive and significant effect on the likelihood of household food security status. However, marital status of household head, employment sector of household head, dependency ratio and household’s nonfood expenditure has a negative and significant influence on household food security status. The study finally suggests that the government in collaboration with financial institutions and NGO should work on sustaining household food security by creating awareness, providing credit, facilitate rural-urban linkage between producer and consumer and work on urban infrastructure improvement. Moreover, the governments also work closely and monitor consumer good suppliers, if possible find a way to subsidize consumable goods to more insecure households and make them to be food secured. Last but not least, keeping this country’s peace will play a crucial role to sustain food security.

Keywords: determinants, household, food security, order logit model, Addis Ababa

Procedia PDF Downloads 73
6304 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 297
6303 DCT and Stream Ciphers for Improved Image Encryption Mechanism

Authors: T. R. Sharika, Ashwini Kumar, Kamal Bijlani

Abstract:

Encryption is the process of converting crucial information’s unreadable to unauthorized persons. Image security is an important type of encryption that secures all type of images from cryptanalysis. A stream cipher is a fast symmetric key algorithm which is used to convert plaintext to cipher text. In this paper we are proposing an image encryption algorithm with Discrete Cosine Transform and Stream Ciphers that can improve compression of images and enhanced security. The paper also explains the use of a shuffling algorithm for enhancing securing.

Keywords: decryption, DCT, encryption, RC4 cipher, stream cipher

Procedia PDF Downloads 362
6302 Limitations of Recent National Enactments on International Crimes: The Case of Kenya, Uganda and Sudan

Authors: Emma Charlene Lubaale

Abstract:

The International Criminal Court (ICC) operates based on the principle of complementarity. On the basis of this principle, states enjoy the primary right to prosecute international crimes, with the ICC intervening only when a state with jurisdiction over an international crime is unable or unwilling to prosecute. To ably exercise their primary right to prosecute international crimes domestically, a number of states are taking steps to criminalise international crimes in their national laws. Significant to note, many of the laws enacted are not being applied in the prosecution of the international crimes allegedly committed. Kenya, Uganda and Sudan are some notable states where commission of international crimes is documented. All these states have recently enacted laws on international crimes. Kenya enacted the International Crimes Act in 2008, Uganda enacted the International Criminal Court Act in 2010 and in 2007, Sudan made provision for international crimes under its Armed Forces Act. However, in all these three states, the enacted national laws on international crimes have thus far not featured in any of the proceedings before these states’ courts. Instead, these states have either relied on ordinary crimes to prosecute international crimes or not prosecuted international crimes altogether. This paper underscores the limitations of the enacted laws, explaining why, even with efforts taken by these states to enact national laws on international crimes, these laws cannot be relied on to advance accountability for the international crimes. Notably, the laws in Kenya and Uganda do not have retroactive application. In Sudan, despite the 2007 reforms, the structure of military justice in Sudan has the effect of placing certain categories of individuals beyond the reach of international criminal justice. For Kenya and Uganda, it is concluded that the only benefit that flows from these enactments is reliance on them to prosecute future international crimes. For Sudan, the 2007 reforms will only have the desired impact if reforms are equally made to the structure of military justice.

Keywords: complementarity, national laws, Kenya, Sudan, Uganda, international crimes, limitations

Procedia PDF Downloads 282
6301 The Influence of Organisational Culture on the Implementation of Enterprise Resource Planning

Authors: Redha M. Elhuni

Abstract:

The critical key success factors, which have to be targeted with appropriate change management, are the user acceptance and support of a new Enterprise Resource Planning (ERP) system at the early implementation stages. This becomes even more important in Arab context where national and organisational culture with a different value and belief system, resulting in different management styles, might not complement with Western business culture embedded in the predefined standard business processes of existing ERP packages. This study explains and critically evaluates research into national and organizational culture and the influence of different national cultures on the implementation and reengineering process of ERP packages in an Arab context. Using a case study, realized through a quantitative survey testing five of Martinsons’s and Davison’s propositions in a Libyan sample company, confirmed the expected results from the literature review that culture has an impact on the implementation process and that employee empowerment is an unavoidable consequence of an ERP implementation.

Keywords: enterprise resource planning, ERP systems, organisational culture, Arab context

Procedia PDF Downloads 316
6300 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level

Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil

Abstract:

This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.

Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing

Procedia PDF Downloads 372
6299 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 156
6298 Reimagining Urban Food Security Through Informality Practices: The Case of Street Food Vending in Johannesburg, South Africa

Authors: Blessings Masuku

Abstract:

This study positions itself within the nascent of street food vending that plays a crucial role in addressing urban household food security across the urban landscape of South Africa. The study aimed to understand how various forms of infrastructure systems (i.e., energy, water and sanitation, housing, and transport, among others) intersect with food and urban informality and how vendors and households’ choices and decisions made around food are influenced by infrastructure assemblages. This study noted that most of the literature studies on food security have mainly focused on the rural agricultural sector, with limited attention to urban food security, notably the role of informality practices in addressing urban food insecurity at the household level. This study pays close attention to how informal informality practices such as street food vending can be used as a catalyst to address urban poverty and household food security and steer local economies for sustainable livelihoods of the urban poor who live in the periphery of the city in Johannesburg. This study deconstructs the infrastructure needs of street food vendors, and the aim was to understand how such infrastructure needs intersect with food and policy that governs urban informality practices. The study argues that the decisions and choices of informality actors in the city of Johannesburg are chiefly determined by the assemblages of infrastructure, including regulatory frameworks that govern the informal sector in the city of Johannesburg. A qualitative approach that includes surveys (open-ended questions), archival research (i., e policy and other key document reviews), and key interviews mainly with city officials and informality actors. A thematic analysis was used to analyze the data collected. This study contributes to greater debates on urban studies and burgeoning literature on urban food security in many ways that include Firstly, the pivotal role that the informal food sector, notably street food vending, plays within the urban economy to address urban poverty and household food security, therefore questioning the conservative perspectives that view the informal sector as a hindrance to a ‘modern city’ and an annoyance to ‘modern’ urban spaces. Secondly, this study contributes to the livelihood and coping strategies of the urban poor who, despite harsh and restrictive regulatory frameworks, devise various agentive ways to generate incomes and address urban poverty and food insecurities.

Keywords: urban food security, street food vending, informal food sector, infrastructure systems, livelihood strategies, policy framework and governance

Procedia PDF Downloads 62
6297 Effectiveness of Climate Smart Agriculture in Managing Field Stresses in Robusta Coffee

Authors: Andrew Kirabira

Abstract:

This study is an investigation into the effectiveness of climate-smart agriculture (CSA) technologies in improving productivity through managing biotic and abiotic stresses in the coffee agroecological zones of Uganda. The motive is to enhance farmer livelihoods. The study was initiated as a result of the decreasing productivity of the crop in Uganda caused by the increasing prevalence of pests, diseases and abiotic stresses. Despite 9 years of farmers’ application of CSA, productivity has stagnated between 700kg -800kg/ha/yr which is only 26% of the 3-5tn/ha/yr that CSA is capable of delivering if properly applied. This has negatively affected the incomes of the 10.6 million people along the crop value chain which has in essence affected the country’s national income. In 2019/20 FY for example, Uganda suffered a deficit of $40m out of singularly the increasing incidence of one pest; BCTB. The amalgamation of such trends cripples the realization of SDG #1 and #13 which are the eradication of poverty and mitigation of climate change, respectively. In probing CSA’s effectiveness in curbing such a trend, this study is guided by the objectives of; determining the existing farmers’ knowledge and perceptions of CSA amongst the coffee farmers in the diverse coffee agro-ecological zones of Uganda; examining the relationship between the use of CSA and prevalence of selected coffee pests, diseases and abiotic stresses; ascertaining the difference in the market organization and pricing between conventionally and CSA produced coffee; and analyzing the prevailing policy environment concerning the use of CSA in coffee production. The data collection research design is descriptive in nature; collecting data from farmers and agricultural extension workers in the districts of Ntungamo, Iganga and Luweero; each of these districts representing a distinct coffee agroecological zone. Policy custodian officers at district, cooperatives and at the crop’s overseeing national authority were also interviewed.

Keywords: climate change, food security, field stresses, Productivity

Procedia PDF Downloads 57
6296 The Per Capita Income, Energy production and Environmental Degradation: A Comprehensive Assessment of the existence of the Environmental Kuznets Curve Hypothesis in Bangladesh

Authors: Ashique Mahmud, MD. Ataul Gani Osmani, Shoria Sharmin

Abstract:

In the first quarter of the twenty-first century, the most substantial global concern is environmental contamination, and it has gained the prioritization of both the national and international community. Keeping in mind this crucial fact, this study conducted different statistical and econometrical methods to identify whether the gross national income of the country has a significant impact on electricity production from nonrenewable sources and different air pollutants like carbon dioxide, nitrous oxide, and methane emissions. Besides, the primary objective of this research was to analyze whether the environmental Kuznets curve hypothesis holds for the examined variables. After analyzing different statistical properties of the variables, this study came to the conclusion that the environmental Kuznets curve hypothesis holds for gross national income and carbon dioxide emission in Bangladesh in the short run as well as the long run. This study comes to this conclusion based on the findings of ordinary least square estimations, ARDL bound tests, short-run causality analysis, the Error Correction Model, and other pre-diagnostic and post-diagnostic tests that have been employed in the structural model. Moreover, this study wants to demonstrate that the outline of gross national income and carbon dioxide emissions is in its initial stage of development and will increase up to the optimal peak. The compositional effect will then force the emission to decrease, and the environmental quality will be restored in the long run.

Keywords: environmental Kuznets curve hypothesis, carbon dioxide emission in Bangladesh, gross national income in Bangladesh, autoregressive distributed lag model, granger causality, error correction model

Procedia PDF Downloads 150
6295 National Culture, Personal Values, and Supervisors’ Ethical Behavior: Examining a Partial Mediation Model of Merton’s Anomie Theory

Authors: Kristine Tuliao

Abstract:

Although it is of primary concern to ensure that supervisors behave appropriately, research shows that unethical behaviors are prevalent and may cost organizations’ economic and reputational damages. Nevertheless, few studies have considered the roles of the different levels of values in shaping one’s ethicality, and the examination of the possible mediation in the process of their influence has been rarely done. To address this gap, this research employs Merton’s anomie theory in designing a mediation analysis to test the direct impacts of national cultural values on supervisors’ justification of unethical behaviors as well as their indirect impacts through personal values. According to Merton’s writings, individual behaviors are affected by the society’s culture given its role in defining the members’ goals as well as the acceptable methods of attaining those goals. Also, Merton’s framework suggests that individuals develop their personal values depending on the assimilation of their society’s culture. Using data of 9,813 supervisors across 30 countries, results of hierarchical linear modeling (HLM) indicated that national cultural values, specifically assertiveness, performance orientation, in-group collectivism, and humane orientation, positively affect supervisors’ unethical inclination. Some cultural values may encourage unethical tendencies, especially if they urge and pressure individuals to attain purely monetary success. In addition, some of the influence of national cultural values went through personal monetary and non-monetary success values, indicating partial mediation. These findings substantiated the assertions of Merton’s anomie theory that national cultural values influence supervisors’ ethics through their integration with personal values. Given that some of the results contradict Merton’s anomie theory propositions, complementary arguments, such as incomplete assimilation of culture, and the probable impact of job position in perceptions, values, and behaviors, could be the plausible rationale for these outcomes. Consequently, this paper advances the understanding of differences in national and personal values and how these factors impact supervisors’ justification of unethical behaviors. Alongside these contributions, suggestions are presented for the public and organizations to craft policies and procedures that will minimize the tendency of supervisors to commit unethical acts.

Keywords: mediation model, national culture, personal values, supervisors' ethics

Procedia PDF Downloads 198
6294 Modernization from Above: The (re-)Creation of National Identity through Westernization in Mubarak-era Cairo

Authors: Mariam Aref Mahmoud

Abstract:

A myth surrounding the development of Cairo bases itself in the Fatimid era when the city, as we know it today, was built. Surrounding the city was a wall meant to protect the main center from any possible attack. The effects of global hierarchies of power extend further than labor regulations and trade statistics. Beyond that, they form dialectical oppositions between local and global identities within urban space. As such, those in power often aim to claim national identity as what they perceive to be the most nationally beneficial strategy. These claims over perceptions of national identity take over the streets, the advertisements, and the parks and eventually make their way into the different forms of media. Often, these claims take over the main planning goals of the city. Whether it is through the control over which sounds are allowed to be produced in public space, what type of people are encouraged to enter which spaces, or other forms of performing local and national identity, public space, property, and land have often been used as a method to present to both the public and the global population what people in power wish for these spaces to represent. In Egypt, these developments have been changing since the end of colonial rule. In particular, this paper will analyze how Hosni Mubarak, and to a certain extent Anwar el-Sadat, enacted neoliberal designs dedicated towards modernization in order to present an image of a Cairo that is not uniquely Egyptian but essentially Western cosmopolitan - a Cairo that belongs to a globalized world.

Keywords: Egypt, imperialism, westernization, housing

Procedia PDF Downloads 69
6293 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 284
6292 Nigcomsat-1r and Planned HTS Communication Satellite Critical Pillars for Nigeria’s National Digital Economy Policy and Strategy

Authors: Ibrahim Isa Ali (Pantami), Abdu Jaafaru Bambale, Abimbola Alale, Danjuma Ibrahim Ndihgihdah, Muhammad Alkali, Adamu Idris Umar, Moshood Kareem, Samson Olufunmilayo Abodunrin, Muhammad Dokko Zubairu

Abstract:

The National Digital Economy Policy and Strategy, NDEPS document developed by Nigeria’s Federal Ministry of Communications & Digital Economy (FMoCDE) is anchored on 8 pillars for the acceleration of the National Digital Economy for a Digital Nigeria. NIGCOMSAT-1R and the planned HTS communication Satellite are critical assets for supporting the pillars in the drive for sustainable growth and development. This paper discusses on the gains and contribution of the strategy as a solid infrastructure. The paper also highlights these assets’ contribution as platform for Indigenous Content Development & Adoption, Digital Literacy & Skills, and Digital Services Development & Promotion.

Keywords: FMoCDE, HTS, NDEPS, nigcomsat!R, pillars

Procedia PDF Downloads 113
6291 Financing Innovation: Differences across National Innovation Systems

Authors: Núria Arimany Serrat, Xavier Ferràs Hernández, Petra A. Nylund, Eric Viardot

Abstract:

Innovation is an increasingly important antecedent to firm competitiveness and growth. Successful innovation, however, requires a significant financial commitment and the means of financing accessible to the firm may affect its ability to innovate. The access to equity financing such as venture capital has been connected to innovativeness for young firms. For established enterprises, debt financing of innovation may be a more realistic option. Continuous innovation and growth would otherwise require a constant increase of equity. We, therefore, investigate the relation between debt financing and innovation for large firms and hypothesize that those firms that carry more debt will be more innovative. The need for debt financing of innovation may be reduced for very profitable firms, which can finance innovation with cash flow. We thus hypothesize a moderating effect of profitability on the relationship between debt financing and innovation. We carry out an empirical investigation using a longitudinal data set including 167 large European firms over five years, resulting in 835 firm years. We apply generalized least squares (GLS) regression with fixed firm effects to control for firm heterogeneity. The findings support our hypotheses and we conclude that access to debt finding is an important antecedent of innovation, with profitability as a moderating factor. The results do however differ across national innovation systems and we find a strong relationship for British, Dutch, French, and Italian firms but not for German and Spanish entities. We discuss differences in the national systems of innovation and financing which contextualize the variations in the findings and thus make a nuanced contribution to the research in innovation financing. The cross-country differences calls for differentiated advice to managers, institutions, and researchers depending on the national context.

Keywords: innovation, R&D, national innovation systems, financing

Procedia PDF Downloads 531
6290 Perceived Procedural Justice and Organizational Citizenship Behavior: Evidence from a Security Organization

Authors: Noa Nelson, Orit Appel, Rachel Ben-ari

Abstract:

Organizational Citizenship Behavior (OCB) is voluntary employee behavior that contributes to the organization beyond formal job requirements. It can take different forms, such as helping teammates (OCB toward individuals; hence, OCB-I), or staying after hours to attend a task force (OCB toward the organization; hence, OCB-O). Generally, OCB contributes substantially to organizational climate, goals, productivity, and resilience, so organizations need to understand what encourages it. This is particularly challenging in security organizations. Security work is characterized by high levels of stress and burnout, which is detrimental to OCB, and security organizational design emphasizes formal rules and clear hierarchies, leaving employees with less freedom for voluntary behavior. The current research explored the role of Perceived Procedural Justice (PPJ) in enhancing OCB in a security organization. PPJ refers to how fair decision-making processes are perceived to be. It involves the sense that decision makers are objective, attentive to everyone's interests, respectful in their communications and participatory - allowing individuals a voice in decision processes. Justice perceptions affect motivation, and it was specifically suggested that PPJ creates an attachment to one's organization and personal interest in its success. Accordingly, PPJ had been associated with OCB, but hardly any research tested their association with security organizations. The current research was conducted among prison guards in the Israel Prison Service, to test a correlational and a causal association between PPJ and OCB. It differentiated between perceptions of direct commander procedural justice (CPJ), and perceptions of organization procedural justice (OPJ), hypothesizing that CPJ would relate to OCB-I, while OPJ would relate to OCB-O. In the first study, 336 prison guards (305 male) from 10 different prisons responded to questionnaires measuring their own CPJ, OPJ, OCB-I, and OCB-O. Hierarchical linear regression analyses indicated the significance of commander procedural justice (CPJ): It associated with OCB-I and also associated with OPJ, which, in turn, associated with OCB-O. The second study tested CPJ's causal effects on prison guards' OCB-I and OCB-O; 311 prison guards (275 male) from 14 different prisons read scenarios that described either high or low CPJ, and then evaluated the likelihood of that commander's prison guards performing OCB-I and OCB-O. In this study, CPJ enhanced OCB-O directly. It also contributed to OCB-I, indirectly: CPJ enhanced the motivation for collaboration with the commander, which respondents also evaluated after reading scenarios. Collaboration, in turn, associated with OCB-I. The studies demonstrate that procedural justice, especially commander's PJ, promotes OCB in security work environments. This is important because extraordinary teamwork and motivation are needed to deal with emergency situations and with delicate security challenges. Following the studies, the Israel Prison Service implemented personal procedural justice training for commanders and unit level programs for procedurally just decision processes. From a theoretical perspective, the studies extend the knowledge on PPJ and OCB to security work environments and contribute evidence on PPJ's causal effects. They also call for further research, to understand the mechanisms through which different types of PPJ affect different types of OCB.

Keywords: organizational citizenship behavior, perceived procedural justice, prison guards, security organizations

Procedia PDF Downloads 221
6289 The Decline of National Sovereignty in Light of the International Transformations

Authors: Djehich Mohamed Yousri

Abstract:

The national sovereignty of states is now facing a dangerous situation that has witnessed a clear exacerbation of the restrictions that this sovereignty has known for quite some time, if not since the establishment of the sovereign national state in the first place, and things have reached this way to the extent that a group of analysts and commentators are talking about the demise or disappearance of the phenomenon of sovereignty Patriotism, a judgment that some consider exaggerated, although there is agreement on the seriousness of what has afflicted the national sovereignty of medium and small states in particular. In fact, the phenomenon of national sovereignty has not completely ended, as there is still a category of countries that are able to disagree with the American will without disappearing from the world map, as happened with the Soviet Union. China, some European countries, and some countries with leading regional roles are still able to deal with This administration, with rational and complex calculations, makes the restrictions on its sovereignty minimal, or at least draws a red line in front of the vital interests of those countries that the restrictions on sovereignty cannot cross, and it is certain that strengthening internal democratic development in countries will increase their ability to challenge external restrictions. On its sovereignty to the extent that this development creates a cohesive society in the face of external hegemony attempts, as well as to the extent that it eliminates some pretexts for interference in the internal affairs of states, including the claim of a lack of democracy or lack of respect for human rights in it. What led to transformations in the international arena in the wake of globalization and its effects on international aspects, including national sovereignty and the principle of state independence. Which was marred by several currents, which led to affecting it in a negative way, and this is what poor countries suffer from at the expense of rich countries, which led us to research the extent of the presence of national sovereignty on the international arena, and the extent to which the principle of non-interference in affairs is applied or existed. The internal affairs of states, which are stipulated in the Charter of the United Nations in the modern era, the theory of sovereignty has been subjected to substantial criticism and abandonment by many on the grounds that it is inconsistent with the current conditions of the international community. In fact, the theory of sovereignty has been misused to justify internal tyranny and international chaos. This theory has hindered the development of international law, the work of international organizations and the dominance of strong states over weak ones. At the present time, the concept of sovereignty has moved towards direction, as the transformations of the international system in the economic, political and military fields have led to the decline and erosion of the idea of the sovereignty of the national state.

Keywords: sovereignty, intervention, non-interference, globalization, humanitarian intervention

Procedia PDF Downloads 66
6288 Economic Life of Iranians on Instagram and the Disturbance in Politics

Authors: Mohammad Zaeimzade

Abstract:

The development of communication technologies is clearly and rapidly moving towards reducing the distance between the virtual and real worlds. Of course, living in a two-spatial or two-globalized world or any other interpretation that means mixing real and virtual life is still relevant and debatable. In the present age of communication, where social networks have transformed the message equation and turned the audience out of passivity and turned into a user. Platforms have penetrated widely in various aspects of human life, from culture and education and economy. Among the messengers, Instagram, which is one of the most extensive image-based interactive networks, plays a significant role in the new economic life. It doesn't need much explanation that the era of thinking of every messenger as a non-insulating conductor that is just a neutral load has passed. Every messenger has its own economic, political and of course security background, Instagram is no exception to this rule and of course it leaves its effects in bio-economics as well. Iran, as the 19th largest economy in the world, has not been unaffected by new platforms, including Instagram, and their consequences in the economy. Generally, in the policy-making space, there are two simple and inflexible pessimistic or optimistic views on this issue, and each of the holders of these views usually have their own one-dimensional policy recommendations regarding how to deal with Instagram. Prescriptions that are usually very different and sometimes contradictory. In this article, we show that this confusion of policymakers is the result of not accurately describing the reality of its effect, and the reason for this inaccurate description is the existence of a conflict of interests in the eyes of describers and researchers. In this article, we first take a look at the main indicators of the Iranian economy, estimate the role of the digital economy in Iran's economic growth, then study the conflicting descriptions of the Instagram-based digital economy, the statistics that show the tolerance of economic users of Instagram in Iran. 300 thousand to 9 million have been estimated. Finally, we take a look at the government's actions in this matter, especially in the context of street riots in October and November 2022. And we suggest an intermediate idea.

Keywords: digital economy, instagram, conflict of interest, social networks

Procedia PDF Downloads 76
6287 Study and Analysis of the Factors Affecting Road Safety Using Decision Tree Algorithms

Authors: Naina Mahajan, Bikram Pal Kaur

Abstract:

The purpose of traffic accident analysis is to find the possible causes of an accident. Road accidents cannot be totally prevented but by suitable traffic engineering and management the accident rate can be reduced to a certain extent. This paper discusses the classification techniques C4.5 and ID3 using the WEKA Data mining tool. These techniques use on the NH (National highway) dataset. With the C4.5 and ID3 technique it gives best results and high accuracy with less computation time and error rate.

Keywords: C4.5, ID3, NH(National highway), WEKA data mining tool

Procedia PDF Downloads 338
6286 Understanding Europe’s Role in the Area of Liberty, Security, and Justice as an International Actor

Authors: Barrere Sarah

Abstract:

The area of liberty, security, and justice within the European Union is still a work in progress. No one can deny that the EU struggles between a monistic and a dualist approach. The aim of our essay is to first review how the European law is perceived by the rest of the international scene. It will then discuss two main mechanisms at play: the interpretation of larger international treaties and the penal mechanisms of European law. Finally, it will help us understand the role of a penal Europe on the international scene with concrete examples. Special attention will be paid to cases that deal with fundamental rights as they represent an interesting case study in Europe and in the rest of the World. It could illustrate the aforementioned duality currently present in the Union’s interpretation of international public law. On the other hand, it will explore some specific European penal mechanism through mutual recognition and the European arrest warrant in the transnational criminality frame. Concerning the interpretation of the treaties, it will first, underline the ambiguity and the general nature of some treaties that leave the EU exposed to tension and misunderstanding then it will review the validity of an EU act (whether or not it is compatible with the rules of International law). Finally, it will focus on the most complete manifestation of liberty, security and justice through the principle of mutual recognition. Used initially in commercial matters, it has become “the cornerstone” of European construction. It will see how it is applied in judicial decisions (its main event and achieving success is via the European arrest warrant) and how European member states have managed to develop this cooperation.

Keywords: European penal law, international scene, liberty security and justice area, mutual recognition

Procedia PDF Downloads 407
6285 Regulation, Co-Regulation and Self-Regulation of Civil Unmanned Aircrafts in Europe

Authors: M. de Miguel Molina, V. Santamarina Campos, M. V. Segarra Oña, B. de Miguel Molina

Abstract:

Safety and security concerns play a key role during the design of civil UAs (aircraft controlled by a pilot who is not onboard it) by the producers and the offer of different services by the operators. At present, European countries have fragmented regulations about the manufacture and use of civil drones, therefore the European institutions are trying to approach all these regulations into a common one. In this sense, not only law but also ethics can give guidelines to the industry in order to obtain better reports from their clients. With our results, we would like to give advice to the European industry, as well as give new insights to the academia and policymakers.

Keywords: ethics, regulation, safety, security

Procedia PDF Downloads 670
6284 Phillips Curve Estimation in an Emerging Economy: Evidence from Sub-National Data of Indonesia

Authors: Harry Aginta

Abstract:

Using Phillips curve framework, this paper seeks for new empirical evidence on the relationship between inflation and output in a major emerging economy. By exploiting sub-national data, the contribution of this paper is threefold. First, it resolves the issue of using on-target national inflation rates that potentially causes weakening inflation-output nexus. This is very relevant for Indonesia as its central bank has been adopting inflation targeting framework based on national consumer price index (CPI) inflation. Second, the study tests the relevance of mining sector in output gap estimation. The test for mining sector is important to control for the effects of mining regulation and nominal effects of coal prices on real economic activities. Third, the paper applies panel econometric method by incorporating regional variation that help to improve model estimation. The results from this paper confirm the strong presence of Phillips curve in Indonesia. Positive output gap that reflects excess demand condition gives rise to the inflation rates. In addition, the elasticity of output gap is higher if the mining sector is excluded from output gap estimation. In addition to inflation adaptation, the dynamics of exchange rate and international commodity price are also found to affect inflation significantly. The results are robust to the alternative measurement of output gap

Keywords: Phillips curve, inflation, Indonesia, panel data

Procedia PDF Downloads 122
6283 Organic Farming for Sustainable Production of Some Promising Halophytic Species in Saline Environment

Authors: Medhat Tawfik, Ezzat Abd El Lateef, Bahr Amany, Mohamed Magda

Abstract:

Applying organic farming systems in biosaline agriculture is unconventional approach for sustainable use of marginal soil and desert land for planting non-traditional halophytic crops such as Leptochloa fusca, Kochia indica, Sporobolus virginicus and Spartina patens. These plants are highly salt tolerant C4 halophytic forage plants grown well in coastal salt marsh. These halophytic plant will take important place in the farming system, especially in the coastal areas and salt-affected land. We can call it environmentally smart crops because they ensure food security, contribute to energy security, guarantee environmental sustainability, and mitigate the negative impacts of climate change. Organic Agriculture is the most important and widely practiced agro-ecological farming system. It is claimed to be the most sustainable approach and long term adaptation strategy. It promotes soil fertility and diversity at all levels and makes soils less susceptible to erosion. It is also reported to be climate change resilience farming systems as it promotes the proper management of soil, water, biodiversity and local knowledge and provides producers with ecologically sound management decisions. A field experiment was carried out at the Model Farm of National Research Centre, El Tour, South Sinai to study the impact of (Mycorrhiza 1kg/fed., charcoal 4 tons/fed., chicken manure 5 tons/fed., in addition to control treatment) on some growth characters, photosynthetic pigments content, and some physiological aspects i.e. prolind and soluble carbohydrates content, succulence and osmotic pressure values, as well as nutritive values i.e. Crude fat (CF), Acid detergent fiber (ADF), Neutral detergent fiber (NDF), Ether extract (EE) and Nitrogen-free extract (NFE) of five halophytic plant species (Leptochloa fusca, Kochia indica, Sporobolus virginicus and Spartina patens). Our results showed that organic fertilizer treatment enhanced all the previous character as compared with control with superiority to chicken manure over the other treatments.

Keywords: organic agriculture, halophytic plants, saline environment, water security

Procedia PDF Downloads 225
6282 Establishment of Gene Pools for Yield Within the Ghanaian Sweetpotato Parental Germplasm

Authors: John Saaka

Abstract:

The increasing world population poses a threat to food security. To meet current and future food demands, sweetpotato stand a good chance because of its recent food security roles. Concerted efforts are needed for both regional and local level varietal development. Heterosis exploiting breeding scheme (HEBS) is one of the options used to improve yield in some crop species and could be a good approach for sweetpotato improvement in Ghana by establishing heterotic gene pools within a population. To achieve this, 22 parental lines were collected from different sources and put in a full diallel arrangement. A total of 149 families, 20 individual cuttings per family, were taken to the field, including ‘checks’ and parental lines for experimentation in a 1m X 0.3m planting order according to the Westcott design. Results from this study led to the characterization of the selected parents into three main heterotic gene pools based on their suitability for use as male, female or both, respectively. This study serves as a baseline for further characterization of the rest of the germplasm in the Ghanaian sweetpotato breeding program.

Keywords: sweetpotato, heterosis, germplasm, food security

Procedia PDF Downloads 75
6281 Virtual Practical Work as Formation of Physics Concept for Student

Authors: Sepdiana W. Rahmawati, Santi A. P. Anggraini

Abstract:

The world of education has made progress with the various new technologies with help of computer. No exception physics education, especially virtual physics practical work. By doing practical work, memory of physics concept will be more advantageous for student and they will understand the essence of actual physics, not only spiked formula. With help of computers, created a variety of applications that can be used by students to perform virtual practical work and students will start thinking systematically to be able find its own concepts and understand the application of physics.

Keywords: essence of physics, formation concept, physics concept, virtual practical work

Procedia PDF Downloads 406
6280 Evaluation and Analysis of ZigBee-Based Wireless Sensor Network: Home Monitoring as Case Study

Authors: Omojokun G. Aju, Adedayo O. Sule

Abstract:

ZigBee wireless sensor and control network is one of the most popularly deployed wireless technologies in recent years. This is because ZigBee is an open standard lightweight, low-cost, low-speed, low-power protocol that allows true operability between systems. It is built on existing IEEE 802.15.4 protocol and therefore combines the IEEE 802.15.4 features and newly added features to meet required functionalities thereby finding applications in wide variety of wireless networked systems. ZigBee‘s current focus is on embedded applications of general-purpose, inexpensive, self-organising networks which requires low to medium data rates, high number of nodes and very low power consumption such as home/industrial automation, embedded sensing, medical data collection, smart lighting, safety and security sensor networks, and monitoring systems. Although the ZigBee design specification includes security features to protect data communication confidentiality and integrity, however, when simplicity and low-cost are the goals, security is normally traded-off. A lot of researches have been carried out on ZigBee technology in which emphasis has mainly been placed on ZigBee network performance characteristics such as energy efficiency, throughput, robustness, packet delay and delivery ratio in different scenarios and applications. This paper investigate and analyse the data accuracy, network implementation difficulties and security challenges of ZigBee network applications in star-based and mesh-based topologies with emphases on its home monitoring application using the ZigBee ProBee ZE-10 development boards for the network setup. The paper also expose some factors that need to be considered when designing ZigBee network applications and suggest ways in which ZigBee network can be designed to provide more resilient to network attacks.

Keywords: home monitoring, IEEE 802.14.5, topology, wireless security, wireless sensor network (WSN), ZigBee

Procedia PDF Downloads 383
6279 Risk Management Approach for a Secure and Performant Integration of Automated Drug Dispensing Systems in Hospitals

Authors: Hind Bouami, Patrick Millot

Abstract:

Medication dispensing system is a life-critical system whose failure may result in preventable adverse events leading to longer patient stays in hospitals or patient death. Automation has led to great improvements in life-critical systems as it increased safety, efficiency, and comfort. However, critical risks related to medical organization complexity and automated solutions integration can threaten drug dispensing security and performance. Knowledge about the system’s complexity aspects and human machine parameters to control for automated equipment’s security and performance will help operators to secure their automation process and to optimize their system’s reliability. In this context, this study aims to document the operator’s situation awareness about automation risks and parameters involved in automation security and performance. Our risk management approach has been deployed in the North Luxembourg hospital center’s pharmacy, which is equipped with automated drug dispensing systems since 2009. With more than 4 million euros of gains generated, North Luxembourg hospital center’s success story was enabled by the management commitment, pharmacy’s involvement in the implementation and improvement of the automation project, and the close collaboration between the pharmacy and Sinteco’s firm to implement the necessary innovation and organizational actions for automated solutions integration security and performance. An analysis of the actions implemented by the hospital and the parameters involved in automated equipment’s integration security and performance has been made. The parameters to control for automated equipment’s integration security and performance are human aspects (6.25%), technical aspects (50%), and human-machine interaction (43.75%). The implementation of an anthropocentric analysis system before automation would have prevented and optimized the control of risks related to automation.

Keywords: Automated drug delivery systems, Hospitals, Human-centered automated system, Risk management

Procedia PDF Downloads 137