Search results for: security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5202

Search results for: security awareness

4392 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law

Procedia PDF Downloads 115
4391 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 469
4390 Potentials and Impediments in the Development of Ikeji Festival for Cultural Tourism

Authors: Ifegbo Lawrencia Ifegbo

Abstract:

Nigeria is a country with many ethnic groups and therefore endowed with festival of different types and nature, yet no concerted effort is committed towards their development for cultural tourism. This paper assessed the adequacy of tourism potential of the festivals, and most importantly investigated the impediments surrounding their non-development. Ikeji, a masquerade festival of the people of Arondizuogu clan in Imo State of Nigeria was selected for the study. Ethnographic research using observer-as-participant technique was used for conducting the study. This was supplemented by focused group discussion (FGD), key informant and unstructured interviews. The result revealed that there exist so much potentials like masquerading, cultural dances, native and highlife music, drumming, role reversals and traditional dishes in the festival. It was further deduced that poor supply of amenities and infrastructural facilities, insecurity of life, lack of trained indigenous experts in tourism, lack of awareness and publicity for the festival on the part of the host communities were responsible for the non-development into tourism destinations. The implication of this is that unless the government resolves to provide the needed resources for the development of the enormous festivals, and restores security and peace in the country, cultural tourism will rarely thrive in Nigeria.

Keywords: festivals, cultural tourism, tourism potential, cultural resources, tourism development

Procedia PDF Downloads 322
4389 Breast Cancer Awareness among Female Nurses: Time to Scrub off Assumptions

Authors: Rahy Farooq, Maria Ahmad Khan, Ayesha Isani Majeed

Abstract:

Objective: The main aim of this research is to assess the knowledge, attitude and practices of female nursing staff and nursing students regarding breast cancer, to provide a baseline for monitoring trends of breast cancer awareness in them. Background: Healthcare professionals are a direct source of information for the patients and the general public as a whole. It is, therefore, essential that the information they convey be accurate and helps in building additional awareness. However, clinical experience does not influence the knowledge, attitude and practices regarding breast cancer. Nurses, being the prime part of the healthcare professionals, play a significant role and hence, their awareness regarding this pressing issue is pertinent. Lack of awareness regarding common presenting symptoms or breast cancer risk factors translates to poor breast cancer screening practices and late diagnosis. Methodology: A cross-sectional study of 280 female nurses was conducted at a tertiary care hospital in Islamabad, Pakistan. A pre-tested structured questionnaire with additional variables like cultural barriers to seeking medical help was used. The scores for outcome variables including knowledge, attitude and practices were pre-defined. Data was analyzed using SPSSv23. Results: Of the 280 participants with a mean age of 28.99±9.98 years, 142 (50.7%) were married, and 138 (49.3%) were unmarried. Mean scores were computed to be 6.14±2.93 (out of 12), 0.30±0.7 (out of 3) and 9.53±1.92 (out of 16) for knowledge, attitude and practice respectively. Using independent sample T-test, a statistically significant correlation was found when means for the score of Attitude was compared with age. With a p-value of 0.018, 117 nurses of age more than 30 years, faced more practical, financial, emotional and service barriers as compared to 163 women younger than 30 years of age. Knowledge of age-related lifetime risks was also significantly poor more in single women; with a p-value of 0.006 for identification of correct age as a risk factor and a p-value of 0.005 for correct identification of risk for development of breast cancer in the lifetime of women. By application of Chi-square test, there was a significant correlation between marital status and cultural barriers to seeking medical help, showing that single women (58.7%) shy away from talking about breast cancer considering it a taboo (p-value 0.028) whereas, more married nurses (59.2%) were apprehensive that they might be considered at fault by the society, as compared to 40.8% of single nurses. (p-value 0.038). Conclusion: Owing to the scarcity of awareness among nurses, this study recognizes the need for delivering effective information to the female nurses regarding breast cancer. Educating patients is likely to be effective if the female nurses play their part and have correct attitudes towards breast cancer practices. A better understanding of the knowledge and practices regarding breast cancer among the nursing population will enable high-risk patients to be recognized early. Therefore, we recommend arrangement of special courses and seminars for all healthcare professionals including the nursing staff.

Keywords: breast cancer, cultural barriers, kap, nurses

Procedia PDF Downloads 225
4388 Eating Behavior and Nutritional Status of Pregnant Women Living in Keserwan Lebanon

Authors: Cynthia Zgheib, Yonna Sacre

Abstract:

Pregnancy, this particular moment in the life of a woman, requires monitoring of eating behavior changes. However, the food choices during pregnancy should be varied and healthy, including the consumption of different food groups. Nutritional status is the process of acquisition and consumption of food. Therefore, a varied diet is associated with good nutritional status. This is why the nutrition education is a strategy commonly applied to improve maternal nutrition during pregnancy. Thus, it is crucial to assess 'The eating behavior and nutritional status of pregnant women living in Keserwan Lebanon.' In order to evaluate the association of different persona, socioeconomic and sociodemographic factors with the eating behavior and nutrition in the concerned study category, a cross-sectional descriptive study was conducted on a sample of 150 pregnant women aging between 18 and 40 years randomly selected from the hospitals and clinics located in Keserwan area and equally distributed between different cities and villages of the area according to altitude. The purpose of this study was to evaluate the eating behavior of the concerned population and to compare it to the recommendation of the food guide pyramid, their level of food awareness and finally to analyze their blood tests in order to detect any nutrients deficiency that they may face during the course of their pregnancy. Sociodemographic, lifestyle, eating behaviour, health, eating patterns, awareness, and food frequency questionnaire (FFQ) were collected through a validated questionnaire specifically adapted for the purpose of the study. Statistical analysis was carried out, and multivariate models were used in order to evaluate the association between several independent variables and the eating behaviour and nutritional status of Lebanese pregnant women The final analysis has shown that 48.7% of pregnant women were aged between 30 and 40 years old, 56% had a normal BMI between 18.5 and 24.9, thus age affects the eating behavior, so the older are the pregnant women, and the healthier is their eating behavior. In fact, 80.7% had acceptable food behavior which is based on an equilibrium between both quantity and quality of food, although the recommended foods are foods found in the food pyramid and available in the Lebanese diet. In addition, 68% had an acceptable level of awareness concerning the health importance of good eating habits, therefore, it is positively affecting their food choices. Moreover, 50 % have an acceptable nutritional status which is confirmed by their biological tests. Future governmental or national studies and programs could be settled aiming to increase the awareness about the good eating behaviors and nutritional status of Lebanese pregnant women.

Keywords: eating behavior, nutritional status, level of awareness, pregnant woman

Procedia PDF Downloads 247
4387 Developing Creativity as a Scientific Literacy among IT Engineers towards Sustainability

Authors: Chunfang Zhou

Abstract:

The growing issues of sustainability have increased the discussions on how to foster “green engineers” from diverse perspectives in both contexts of education and organizations. As creativity has been considered as the first stage of innovation process that can also be regarded as a path to sustainability, this paper will particularly propose creativity as a scientific literacy meaning a collection of awareness, ability, and skills about sustainability. From this sense, creativity should be an element in IT engineering education and organizational learning programmes, since IT engineers are one group of key actors in designing, researching and developing social media products that are most important channels of improving public awareness of sustainability. This further leads this paper to discuss by which pedagogical strategies and by which training methods in organizations, creativity and sustainability can be integrated into IT engineering education and IT enterprise innovation process in order to meeting the needs of ‘creative engineers’ in the society changes towards sustainability. Accordingly, this paper contributes to future work on the links between creativity, innovation, sustainability, and IT engineering development both theoretically and practically.

Keywords: creativity, innovation, IT engineers, sustainability

Procedia PDF Downloads 309
4386 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 132
4385 Glycemic Control in Rice Consumption among Households with Diabetes Patients: The Role of Food Security

Authors: Chandanee Wasana Kalansooriya

Abstract:

Dietary behaviour is a crucial factor affecting diabetes control. With increasing rates of diabetes prevalence in Asian countries, examining their dietary patterns, which are largely based on rice, is timely required. It has been identified that higher consumption of some rice varieties is associated with increased risk of type 2 diabetes. Although diabetes patients are advised to consume healthier rice varieties, which contains low glycemic, several conditions, one of which food insecurity, make them difficult to preserve those healthy dietary guidelines. Hence this study tries to investigate how food security affects on making right decisions of rice consumption within diabetes affected households using a sample from Sri Lanka, a country which rice considered as the staple food and records the highest diabetes prevalence rate in South Asia. The study uses data from the Household Income and Expenditure Survey 2016, a nationally representative sample conducted by the Department of Census and Statistics, Sri Lanka. The survey used a two-stage stratified sampling method to cover different sectors and districts of the country and collected micro-data on demographics, health, income and expenditures of different categories. The study uses data from 2547 households which consist of one or more diabetes patients, based on the self-recorded health status. The Household Dietary Diversity Score (HDDS), which constructed based on twelve food groups, is used to measure the level of food security. Rice is categorized into three groups according to their Glycemic Index (GI), high GI, medium GI and low GI, and the likelihood and impact made by food security on each rice consumption categories are estimated using a Two-part Model. The shares of each rice categories out of total rice consumption is considered as the dependent variable to exclude the endogeneity issue between rice consumption and the HDDS. The results indicate that the consumption of medium GI rice is likely to increase with the increasing household food security, but low GI varieties are not. Households in rural and estate sectors are less likely and Tamil ethnic group is more likely to consume low GI rice varieties. Further, an increase in food security significantly decreases the consumption share of low GI rice, while it increases the share of medium GI varieties. The consumption share of low GI rice is largely affected by the ethnic variability. The effects of food security on the likelihood of consuming high GI rice varieties and changing its shares are statistically insignificant. Accordingly, the study concludes that a higher level of food security does not ensure diabetes patients are consuming healthy rice varieties or reducing consumption of unhealthy varieties. Hence policy attention must be directed towards educating people for making healthy dietary choices. Further, the study provides a room for further studies as it reveals considerable ethnic and sectorial differences in making healthy dietary decisions.

Keywords: diabetes, food security, glycemic index, rice consumption

Procedia PDF Downloads 88
4384 An Integrated Cognitive Performance Evaluation Framework for Urban Search and Rescue Applications

Authors: Antonio D. Lee, Steven X. Jiang

Abstract:

A variety of techniques and methods are available to evaluate cognitive performance in Urban Search and Rescue (USAR) applications. However, traditional cognitive performance evaluation techniques typically incorporate either the conscious or systematic aspect, failing to take into consideration the subconscious or intuitive aspect. This leads to incomplete measures and produces ineffective designs. In order to fill the gaps in past research, this study developed a theoretical framework to facilitate the integration of situation awareness (SA) and intuitive pattern recognition (IPR) to enhance the cognitive performance representation in USAR applications. This framework provides guidance to integrate both SA and IPR in order to evaluate the cognitive performance of the USAR responders. The application of this framework will help improve the system design.

Keywords: cognitive performance, intuitive pattern recognition, situation awareness, urban search and rescue

Procedia PDF Downloads 314
4383 Developing an Interpretive Plan for Qubbet El-Hawa North Archaeological Site in Aswan, Egypt

Authors: Osama Amer Mohyeldin Mohamed

Abstract:

Qubbet el-Hawa North (QHN) is an example of an archaeological site in West-Aswan and It has not opened to the public yet and has been under excavation since its discovery in 2013 as a result of the illegal digging that happened in many sites in Egypt because of the unstable situation and the absence of security. The site has the potential to be one of the most attractive sites in Aswan. Moreover, it deserves to be introduced to the visitors in a good manner appropriate to its great significance. Both interpretation and presentation are crucial inseparable tools that communicate the archaeological site's significance to the public and raise their awareness. Moreover, it helps them to understand the past and appreciate archaeological assets. People will never learn or see anything from ancient remains unless it is explained. They would only look at it as ancient and charming. They expect a story, and more than knowledge, authenticity, or even supporting preservation actions, they want to enjoy and be entertained. On the other hand, a lot of archaeologists believe that planning an archaeological site for entertaining visitors deteriorates it and affects its authenticity. Thus, it represents a challenge to design a model for visitors’ experience that meets their expectations and needs while safeguarding the site’s integrity. The article presents a proposal for an interpretation plan for the site of Qubbet el-Hawa North.

Keywords: heritage interpretation and presentation, archaeological site management, qubbet el-hawa North, local community engagement, accessibility

Procedia PDF Downloads 14
4382 Potentials of Ecotourism to Nature Conservation and Improvement of Livelihood of People around Ayikunnugba Waterfalls, Oke-Ila Orangun, Nigeria

Authors: Funmilola Ajani, I. A. Ayodele, O.A. Filade

Abstract:

Tourism has direct, indirect and induced impacts on economic development and the industry is one of the most crucial tradable sectors in the world. The study was therefore carried out to assess the potentials of ecotourism to nature conservation and its contributions to the improvement of the livelihood of Oke- Ila Orangun community. One hundred and fifty residents were chosen by stratified random sampling as respondents. Respondents awareness of ecotourism was assessed using an 8-point scale while respondents acceptance of ecotourism was assessed using a 14-point scale. Contributions to improvement of livelihood of residents and perceived constraints identified by residents to the development of the water fall and socio-economic variables among others were also obtained. Also, in-depth interview was conducted with the king of Ayikunnugba. The data was analyzed using descriptive statistics such as frequency count, mean and percentages. Correlation analysis was used to determine whether or not a relationship exists between two variables at 0.05 level of significance. Perception of respondents based on the awareness of ecotourism and contributions to livelihood development was high (78.3%). A significant relationship exists between acceptance of ecotourism and its contributions to peoples’ livelihood. Also, relationship between constraints encountered by respondents and its contributions to peoples livelihood is highly significant(r =0.546; P =0.00). Majority (71.3%) of the respondents believed that the development of the area will not lead to environmental pollution. Public- Private- Partnership (PPP) is therefore recommended so as to enable the recreation site to meet international standard in terms of development and management.

Keywords: Ayikunnugba water fall, ecotourism constraints, nature conservation, awareness

Procedia PDF Downloads 142
4381 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 225
4380 Continuous Glucose Monitoring Systems and the Improvement in Hypoglycemic Awareness Post-Islet Transplantation: A Single-Centre Cohort Study

Authors: Clare Flood, Shareen Forbes

Abstract:

Background: Type 1 diabetes mellitus (T1DM) is an autoimmune disorder affecting >400,000 people in the UK alone, with the global prevalence expected to double in the next decade. Islet transplant offers a minimally-invasive procedure with very low morbidity and almost no mortality, and is now as effective as whole pancreas transplant. The procedure was introduced to the UK in 2011 for patients with the most severe type 1 diabetes mellitus (T1DM) – those with unstable blood glucose, frequently occurring episodes of severe hypoglycemia and impaired awareness of hypoglycemia (IAH). Objectives: To evaluate the effectiveness of islet transplantation in improving glycemic control, reducing the burden of hypoglycemia and improving awareness of hypoglycemia through a single-centre cohort study at the Royal Infirmary of Edinburgh. Glycemic control and degree of hypoglycemic awareness will be determined and monitored pre- and post-transplantation to determine effectiveness of the procedure. Methods: A retrospective analysis of data collected over three years from the 16 patients who have undergone islet transplantation in Scotland. Glycated haemoglobin (HbA1c) was measured and continuous glucose monitoring systems (CGMS) were utilised to assess glycemic control, while Gold and Clarke score questionnaires tested IAH. Results: All patients had improved glycemic control following transplant, with optimal control seen visually at 3 months post-transplant. Glycemic control significantly improved, as illustrated by percentage time in hypoglycemia in the months following transplant (p=0.0211) and HbA1c (p=0.0426). Improved Clarke (p=0.0034) and Gold (p=0.0001) scores indicate improved glycemic awareness following transplant. Conclusion: While the small sample of islet transplant recipients at the Royal Infirmary of Edinburgh prevents definitive conclusions being drawn, it is indicated that through our retrospective, single-centre cohort study of 16 patients, islet transplant is capable of improving glycemic control, reducing the burden of hypoglycemia and IAH post-transplant. Data can be combined with similar trials at other centres to increase statistical power but from research in Edinburgh, it can be suggested that the minimally invasive procedure of islet transplantation offers selected patients with extremely unstable T1DM the incredible opportunity to regain control of their condition and improve their quality of life.

Keywords: diabetes, islet, transplant, CGMS

Procedia PDF Downloads 262
4379 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 193
4378 Customer Adoption and Attitudes in Mobile Banking in Sri Lanka

Authors: Prasansha Kumari

Abstract:

This paper intends to identify and analyze customer adoption and attitudes towards mobile banking facilities. The study uses six perceived characteristics of innovation that can be used to form a favorable or unfavorable attitude toward an innovation, namely: Relative advantage, compatibility, complexity, trailability, risk, and observability. Collected data were analyzed using Pearson Chi-Square test. The results showed that mobile bank users were predominantly males. There is a growing trend among young, educated customers towards converting to mobile banking in Sri Lanka. The research outcomes suggested that all the six factors are statistically highly significant in influencing mobile banking adoption and attitude formation towards mobile banking in Sri Lanka. The major reasons for adopting mobile banking services are the accessibility and availability of services regardless of time and place. Over the 75 percent of the respondents mentioned that savings in time and effort and low financial costs of conducting mobile banking were advantageous. Issue of security was found to be the most important factor that motivated consumer adoption and attitude formation towards mobile banking. Main barriers to mobile banking were the lack of technological skills, the traditional cash‐carry banking culture, and the lack of awareness and insufficient guidance to using mobile banking.

Keywords: compatibility, complexity, mobile banking, observability, risk

Procedia PDF Downloads 189
4377 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 507
4376 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 159
4375 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks

Authors: Sulemana Ibrahim

Abstract:

Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.

Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks

Procedia PDF Downloads 48
4374 Mental Health Awareness and Help Seeking Among Adolescents in Kerala

Authors: Fathima M. A., Milu Maria Anto

Abstract:

Aim: The current study aims to explore the understanding about Mental Health and the likelihood to seek help for mental health problems among adolescents in the state of Kerala (India). Method: A cross sectional exploratory design was used. Samples were selected using convenience sampling. Ninety nine high school and higher secondary school students who had enrolled in the program “Responsible Adolescents (READ)” organized by MKMS Education from Kerala participated in this study. The data for the present study was collected using google forms prior to the commencement of the READ programme. Open-ended questions were used to explore the understanding of participants about mental health, mental health problems, causes of mental health problems and the role of mental health professionals. The likelihood to seek help (from friends, parents, teachers and mental health professionals) for mental health problems was assessed using a visual analogue scale. Further open-ended questions were used to identify what changes in teachers and parents will make them feel more comfortable to approach them when they need help. Content analysis was used to identify themes and coded data was further analyzed using correlation. Results: The results show that students have a fair idea about what Mental Health is. Even though the majority is familiar with the names of mental health disorders, relatively fewer students identify it as irregularity in mental functions such as thoughts, emotions and behaviors. The students tend to attribute symptoms of mental health problems as the cause of mental health problems. Very few students have the understanding that biological variations and adverse childhood experiences are primary causes for the development of mental health problems. Less than half of the students were aware of the role of psychiatrists and psychologists in mental health treatment. The students were more likely to seek help from parents and friends during distress. They had a medium inclination to seek help from mental health professionals and showed even lower likelihood to seek help from teachers. The majority of the students responded that they would be more comfortable approaching teachers if they were more open-minded and approachable as well as non-judgmental and non-dismissive. Conclusion: Findings show that there is inadequate awareness among adolescents about mental health problems and their causes. There is a lack of understanding about the roles of two main mental health professionals which can pose a big hurdle in accessing adequate help from the appropriate professional at the right time. The low likelihood to seek help from teachers for mental health problems is very concerning. The major barriers reported by the students in seeking help from teachers were the judgmental and dismissive approach. The findings throw light on the current level of awareness about mental health and mental health help-seeking, which can be utilized in framing mental health awareness programs for students as well as teachers.

Keywords: Mental Health Awareness, Adolescent Mental Health, Help Seeking Behavior, School Mental Health

Procedia PDF Downloads 248
4373 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 116
4372 Informal Governance as Response to Institutional Paralysis

Authors: Stefanie Kasparek

Abstract:

The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.

Keywords: agenda-setting, decision-making, international governance, UNSC

Procedia PDF Downloads 183
4371 Awareness and Willingness of Signing 'Consent Form in Palliative Care' in Elderly Patients with End Stage Renal Disease

Authors: Hsueh Ping Peng

Abstract:

End-stage renal disease most commonly occurs in the elderly population. Elderly people are approaching the end of their lives, and when facing major life-threatening situations, apart from aggressive medical treatment, they can also choose treatment methods such as hospice care to improve their quality of life. The purpose of this study was to investigate factors associated with the awareness and willingness to sign hospice and palliative care consent forms in elderly with end-stage renal disease. This study used both quantitative, cross-sectional study designs. In the quantitative section, 110 elderly patients (aged 65 or above) with end-stage renal disease receiving conventional hemodialysis were recruited as study participants from a medical center in Taipei City. Data were collected using structured questionnaires. Study tools included basic demographic data, questionnaires on the awareness and perception of hospice and palliative care, etc. After collecting the data, data analysis was conducted using SPSS 20.0 statistical software, including descriptive statistics, chi-square test, logistic regression, and other inferential statistics. The results showed that the average age of participants was 71.6 years old, more males than females, average years of dialysis was 6.1 years and most subjects rated their self-perceived health status as fair. Results of the study are summarized as follows: Elderly people with end-stage renal disease did not have sufficient knowledge and awareness about hospice and palliative care. Influencing factors included level of education, marital status, years of dialysis and age, etc. Demographic factors influencing the signing of consent forms included gender, marital status, and age, which all showed significant impacts. Factors taken into consideration when signing consent forms included awareness of hospice care, understanding the relevant definitions of hospice care, and understanding that consent may be modified or cancelled at any time; it was predicted that people who knew more about ways to receive hospice care or more related definitions were more willing to sign the consent forms. In the qualitative study section, 10 participants who signed the consent form, five male, and 5 female, between the ages of 65-90, have completed the semi-structured interviews. Analysis of the interviews revealed six themes: (1) passing away peacefully, (2) autonomy on arrangements of life and death, (3) unwillingness to increase family and social burden, (4) friends and relatives’ experience influencing the decision to give consent, (5) sharing information to facilitate the giving of consent, (6) facing each day with ease, to reflect the experience and factors of consideration for elderly with end-stage renal disease when signing consent forms. The results of this study provides the awareness, thoughts and feelings of elderly with end-stage renal disease on signing consent forms, and serve as a future reference for the dialysis unit to enhance the promotion of hospice and palliative care and related caregiving measures, thereby improving the quality of life and care for elderly people with end-stage renal disease.

Keywords: end-stage renal disease, hemodialysis, hospice and palliative care, awareness, willingness

Procedia PDF Downloads 153
4370 Gender issues in Law and society in India

Authors: Sunil Gaikwad

Abstract:

Gender discrimination is a very prevalent and much used word in the legal parlance. , The more socially, culturally, economically and educationally backward the community, the more gender discrimination is seen there. Gender discrimination is a worldwide Phenomena. In India it was more prevalent, due to illiteracy, bad social and religious customs. in Indian family system male child is considered as inheritor of the family clan, support for parents in their old age and girls as the property of others and unnecessary load on parents and on property as the dowry has to be give at her marriage as also some festivals like Raksha Bandhan and Bhau Teej during Deepawali (wherein having brother is compulsory)insist on having a male child in the family, hence most couples try to give birth only to male child at the cost of female child, hence the female feticide was going on a large scale due to which, sex ratio had considerably decreased creating problem for geeting groom for bride groom thereby putting question mark on family system. To redo the damage done to the society due to the female feticide Government of India has enacted various Laws and introduced various welfare schemes for the upliftment of girl child and also launched countrywide awareness campaign to create awareness among people about the importance of girl child and punitive laws for infanticide which is now bearing fruits but still cases of female feticide are coming fore. There is an urgent need to go to the roots of the problem and to find practicable and effective legal and social measures to overcome this issue, and the purpose of this research paper is the same. The research paper discusses in detail the reasons and superstitions that are responsible for the gender discriminations and comes out with effective measures including necessary and effective changes in the existing Laws, effective awareness campaign against religious superstitions for gender equality. For this research paper doctrinal research methodology is used to drive the research to its logical conclusion, for which various primary and secondary sources literature has been perused and studied. It is worth noting that while working on the paper suggestions and recommendations and conclusions have been drawn where it is suggested and concluded that there is an urgent need to re think about the festivals which encourages gender discriminations, to sensitize and create ample of awareness among people by effectively utilizing Radio, Television, Social Media folk arts, public shows and to make existing laws more effective and strict implementation for the purpose and zero tolerance for female feticide.

Keywords: awareness, effective laws, female foeticide, festivals, superstitions

Procedia PDF Downloads 73
4369 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 128
4368 Mobile Cloud Computing: How to Improve

Authors: Abdullah Aljumah, Tariq Ahamad

Abstract:

The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.

Keywords: Cloud Computing, MCC, SAAS, computer interaction

Procedia PDF Downloads 361
4367 ‘Saying’ the Nuclear Power in France: Evolution of the Images and Perceptions of a Sensitive Theme

Authors: Jandot Aurélia

Abstract:

As the nuclear power is a sensitive field leading to controversy, the quality of the communication about it is important. Between 1965 and 1981, in France, this one had gradually changed. This change is studied here in the main French news magazine L’Express, in connection with several parameters. As this represents a huge number of copies and occurrences, thus a considerable amount of information; this paper is focused on the main articles as well as the main “mental images”. These ones are important, as their aim is to direct the thought of the readers, and as they have led the public awareness to evolve. Over this 17 years, two trends are in confrontation: The first one is promoting the perception of the nuclear power, while the second one is discrediting it. These trends are organized in two axes: the evolution of engineering, and the risks. In both cases, the changes in the language allow discerning the deepest intentions of the magazine editing, over a period when the nuclear technology, to there a laboratory object accompanied with mystery and secret, has become a social issue seemingly open to all.

Keywords: French news magazine, mental images, nuclear power, public awareness

Procedia PDF Downloads 294
4366 Climate Change and Food Security in Nigeria: The World Bank Assisted Third National Fadama Development Programme (Nfdp Iii) Approach in Rivers State, Niger Delta, Nigeria

Authors: Temple Probyne Abali

Abstract:

Port Harcourt, Rivers State in the Niger Delta region of Nigeria is bedeviled by the phenomenon of climatechange, posing threat to food security and livelihood. This study examined a 4 decadel (1980-2020) trend of climate change as well as its socio-economic impact on food security in the region. Furthermore, to achieve sustainable food security and livelihood amidst the phenomenon, the study adopted the World Bank Assisted Third National Fadama Development Programme approach. The data source for climate change involved secondary data from Nigeria Meteorological Agency (NIMET). Consequently, the results for climate change over the 4decade period were displayed in tables, charts and maps for the expected changes. Data sources on socio-economic impact of food security and livelihood were acquired through questionnairedesign. A purposive random sampling technique was used in selecting 5 coastal communities inthe region known for viable economic potentials for agricultural development and the resultswere analyzed using Analysis of Variance (ANOVA). The Participatory Rural Appraisal (PRA) technique of the World Bank for needs assessment wasadopted in selecting 5 agricultural sub-project proposals/activities based on groups’ commoneconomic interest from a total of 1,000 farmers each drawn from the 5 communities of differentage groups including men, women, youths and the vulnerable. Based on the farmers’ sub-projectinterests, the various groups’ Strength, Weakness, Opportunities and Threats (SWOT), Problem Listing Matrix, Skill Gap Analysis as well as EIAson their sub-project proposals/activities were analyzed with substantialMonitoring and Evaluation (M & E), using the Specific, Measurable, Attribute, Reliable and Time bound (SMART)approach. Based on the findings from the PRA technique, the farmers recorded considerableincreaseinincomeofover200%withinthe5yearprojectplan(2008-2013).Thestudyrecommends capacity building and advisory services on this PRA innovation. By so doing, there would be a sustainable increase in agricultural production and assured food security in an environmental friendly manner, in line with the United Nation’s Sustainable Development Goals(SDGs).

Keywords: climate change, food security, fadama, world bank, agriculture, sdgs

Procedia PDF Downloads 81
4365 Consideration of Whether Participation in the International '16 Days of Activism against Gender Based Violence' Campaign Is an Effective Teaching Tool for Raising Awareness and Understanding of Gender Based Violence

Authors: Kayliegh Richardson, Ana Speed

Abstract:

The international campaign, '16 Days of Activism against Gender Based Violence', seeks to raise awareness and understanding of gender based violence in a variety of settings. The campaign requires its participants to join in for advancing the right to education and challenging violence, discrimination, and inequality and take into account intersections such as gender, race, ethnicity, religion, sexual orientation, socio-economic status and other social identifiers. The authors of this paper are both clinic supervisors at Northumbria University in Newcastle Upon Tyne, England. As part of their research project, the authors are going to ask final year students on the MLaw degree at Northumbria University to become involved in the campaign by participating in a variety of awareness-raising activities during the course of the 16 days, which runs from 27 November 2017 until 10 December 2017. As part of the campaign, the authors will be running the following activities for students to participate in 1. Documentary showing of Banaz, a love story followed by discussion group. 2. 16 blogs for 16 days. Students will contribute to our family law blog over the 16 days, with articles about gender based violence. 3. Guest lecture on domestic violence (potentially run by a domestic violence organisation) 4. Workshop by Professor Ruth Lewis who will be presenting her innovative research in gender based violence and online abuse. 5. Poster competition - the students are asked to submit a poster about the different forms of gender based violence or proposals for ending violence against women and girls. The research aims are to identify whether participation in the project: 1. increases the students' engagement with issues of gender justice 2. is an effective educational tool for raising the students' awareness and understanding of gender based violence in its many forms. 3. increases the students' understanding of the domestic and international framework for protecting victims (in particular women and children) of gender based violence. After the activities, an impartial, experienced researcher will be holding a focus group with volunteering students to discuss their experiences of participating in the activities and whether they felt that participation in the project achieved the aims set out above. This paper will discuss the activities undertaken by the students and will address the data gathered during the focus group. Finally, the authors will discuss their thoughts on whether awareness of gender-based violence and other international family law issues can be appropriately raised in an educational setting.

Keywords: gender based violence, clinical legal education, international family law, domestic abuse

Procedia PDF Downloads 327
4364 Social Awareness and Praxical Knowledge

Authors: F. Saptouw, L. Reddy

Abstract:

Tertiary institutions are often faced with a challenge when incorporating social awareness into course content. The information campaigns in the media often alienate the viewers and the knowledge is not readily assimilated into the students’ consciousness. This paper will present a discussion of the results of collaborative teaching projects run by the Michaelis School of fine art and the HIV/AIDS, Inclusivity and Change Unit (HAICU) at the University of Cape Town. In these projects the artistic process is employed to generate ‘praxical knowledge’ in the student body about socially relevant issues like HIV-AIDS, Gender-Based Violence (GBV) and sexual identity, specifically LGBTQI. The combination of lectures, group discussions and the creative process has been a very successful way to disseminate information amongst the student population. Evidence of the project’s success will be provided by referencing interviews, focus groups as well as surveys done with the participants. This paper will conclude by arguing for the positive role of practice-led research in developing a socially conscious public.

Keywords: art, education, HIV-AIDS, practice-led research

Procedia PDF Downloads 310
4363 Environmental Awareness on Formal Education Level: A Program Approach through Physical Education Course

Authors: Jocelyn Floresca

Abstract:

This paper aimed to present the by-product of the introduction of environmental ecology awareness on a formal education level utilizing the program course of Physical Education, particularly in the tertiary level. It is based on the premise that the radical need for environmental protection may not only necessarily be the work of people in the pure sciences but also deemed necessary to look into more avenues of the school setting particularly in the field of Physical Education. In the Philippines, most schools’ Physical Education focuses on the advancement of sports, fitness and wellness which are mostly done in the confines of a closed building. The paper dwells into the introduction of Physical Education as an outdoor recreation activity where in the participants of the study had the opportunity to indulge in activities undertaken outside the confines of buildings and going into large areas of the environment. It looked into the individual participant’s environmental social behaviour and effects on the participant’s perceptions in terms of the set objectives of Physical Education before and after the study’s intervention. The study utilized the formal course in Physical Education on nature walks, mountaineering and bird watching as interventions to gain perceptions and understanding. The introduction of the environmental ecology activities as a formal Physical Education course has resulted in deeper awareness that led to understanding the need to protect the environment, appreciation of the value of natural areas and acquiring behaviour for a sustainable use of the environment during the practice of Physical Education. Also, prior to the introduction of environmental ecology in Physical Education as a formal study; participants have no knowledge of what dwells in the identified sites of intervention. Whereas after the study, participants were able to identify various species of birds and plants found in the sites of the study that may lead to further conservation of the particular species.

Keywords: appreciation, conservation, environmental ecology, outdoor

Procedia PDF Downloads 278