Search results for: transformation and security challenges
8761 An Investigation of Challenges in Implementing Sustainable Supply Chain Management for Construction Industry in Thailand by Interpretive Structural Model Approach
Authors: Shaolan Zou, Kullapa Soratana
Abstract:
Construction industry faces tremendous challenges in sustainability issue in recent years. Building materials, generally, are non-recyclable with short service life time, leading to economic loss. Building sites also cause social issues, e.g. noise, hazardous substances, and particulate matters. Sustainable supply chain management (SSCM) has been recognized as an appropriate method to balance three pillars of sustainability: environment, economy, and society. However, most of construction companies cannot successfully adopt SSCM due to numerous challenges. In this study, a list of challenges in implementing SSCM was collected from peer-reviewed literature on sustainable implementation. A building materials company in Thailand, which has successfully adopted SSCM for almost two decades and established the sustainable development committee since 1995, was used as a case study. Management-level representatives in sustainability department of the company were interviewed, mainly, to examine which challenges on the list complies with the company’s condition when adopting SSCM. The interview result was analyzed by interpretive structural model (ISM) with sustainability experts’ opinions to identify top 5 influential challenges. The results could assist a building construction company in assigning appropriate strategies to overcome most influential barriers, as well as in using as a reference or guidance for other construction companies adopting SSCM.Keywords: sustainable supply chain management, challenges, construction industry, interpretive structural model
Procedia PDF Downloads 1818760 Thermal Effects of Phase Transitions of Cerium and Neodymium
Authors: M. Khundadze, V. Varazashvili, N. Lejava, R. Jorbenadze
Abstract:
Phase transitions of cerium and neodymium are investigated by using high temperature scanning calorimeter (HT-1500 Seteram). For cerium two types of transformation are detected: at 350-372 K - hexagonal close packing (hcp) - face-centered cubic lattice (fcc) transition, and in 880-960K the face-centered cubic lattice (fcc) transformation into body-centered cubic lattice (bcc). For neodymium changing of hexagonal close packing (hcp) into body-centered cubic lattice (bcc) is detected at 1093-1113K. The thermal characteristics of transitions – enthalpy, entropy, temperature domains – are reported.Keywords: cerium, calorimetry, neodymium, enthalpy of phase transitions, neodymium
Procedia PDF Downloads 3698759 Reflections on Opportunities and Challenges for Systems Engineering
Authors: Ali E. Abbas
Abstract:
This paper summarizes some of the discussions that occurred in a workshop in West Virginia, U.S.A which was sponsored by the National Science Foundation (NSF) in February 2016. The goal of the workshop was to explore the opportunities and challenges for applying systems engineering in large enterprises, and some of the issues that still persist. The main topics of the discussion included challenges with elaboration and abstraction in large systems, interfacing physical and social systems, and the need for axiomatic frameworks for large enterprises. We summarize these main points of discussion drawing parallels with decision making in organizations to instigate research in these discussion areas.Keywords: decision analysis, systems engineering, framing, value creation
Procedia PDF Downloads 3298758 Definition of a Computing Independent Model and Rules for Transformation Focused on the Model-View-Controller Architecture
Authors: Vanessa Matias Leite, Jandira Guenka Palma, Flávio Henrique de Oliveira
Abstract:
This paper presents a model-oriented development approach to software development in the Model-View-Controller (MVC) architectural standard. This approach aims to expose a process of extractions of information from the models, in which through rules and syntax defined in this work, assists in the design of the initial model and its future conversions. The proposed paper presents a syntax based on the natural language, according to the rules agreed in the classic grammar of the Portuguese language, added to the rules of conversions generating models that follow the norms of the Object Management Group (OMG) and the Meta-Object Facility MOF.Keywords: BNF Syntax, model driven architecture, model-view-controller, transformation, UML
Procedia PDF Downloads 3958757 Applications of Multi-Path Futures Analyses for Homeland Security Assessments
Authors: John Hardy
Abstract:
A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning
Procedia PDF Downloads 1398756 Embodied Spiritualities and Emerging Search for Social Transformation: An Embodied Ethnographic Study of Yoga Practices in Medellin, Colombia
Authors: Lina M. Vidal
Abstract:
This paper discusses yoga practices involvement in both self-transformation and social transformations by means of an embodied ethnographic approach to different initiatives for social change in Medellín. In the context of gradual popularization of embodied spiritualities, yoga practices have opened their way in calls for social change in a performative perspective which involves collective experiences, reflections and production of embodied knowledge. Through the reflection on bodily dimension and corporal experience, this ethnographic approach acknowledges inter-corporality and somatic modes of attention during observations and personal experiences. In social change initiatives that include yoga practices were identified transformations of common understanding on social issues such as it is produced by institutionalized education, health system and other fields of knowledge. This is clearly visible in yoga projects for children in vulnerable conditions, homeless people, prisoners, and young people recovering from drug addiction. These projects are often promoted by organizations and networks, which incorporate individual life stories into collective experiences. Dissemination of yoga is heading to a broad institutional and cultural legitimation of yoga and of spirituality that impact different fields of social work and everyday life in general. This way, yoga is becoming an embodied activist way of life and a legitimate field for social work.Keywords: embodied ethnography, Medellin, social transformation, embodied spiritualities, yoga practices
Procedia PDF Downloads 1898755 Partnering with Stakeholders to Secure Digitization of Water
Authors: Sindhu Govardhan, Kenneth G. Crowther
Abstract:
Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.Keywords: cyber security, shared responsibility, IIOT, threat modelling
Procedia PDF Downloads 778754 Assessment of the Economic Factors and Motivations towards De-Dollarization since the Early 2000s and Their Implications
Authors: Laila Algalal, Chen Xi
Abstract:
The US dollar has long served as the world's primary reserve currency. However, this dominance faces growing challenges from internal US economic pressures and the rise of alternative currencies. Internally, issues like high debt, inflation, reduced competitiveness, and economic instability due to inequality in economic policies threaten the dollar's position. Externally, more countries are establishing alternative currencies, payment systems, and regional financial institutions to reduce dollar dependence. These drivers have contributed to a decline in the dollar's share of global foreign exchange reserves from 71% in 2001 to an estimated 58% in 2022. While this 13-percentage point drop took two decades, recent initiatives suggest de-dollarization could accelerate in the coming few decades. Efforts to establish non-dollar trade deals and alternative financial systems show more substantial progress compared to initiatives in the early 2000s. As the nature of the world system is anarchic, states make either individual or group efforts to guarantee their economic security and achieve their interests. Based on neoclassical realism, this paper analyzes both internal and external US economic factors driving current and future de-dollarization and the implications on the international monetary system, in addition to examining the motivation for such moves.Keywords: de-dollarization, US dollar, monetary system, economic security, economic policies.
Procedia PDF Downloads 928753 The Utility and the Consequences of Counter Terrorism Financing
Authors: Fatemah Alzubairi
Abstract:
Terrorism financing is a theme that dramatically evolved post-9/11. Supra-national bodies, above all UN Security Council and the Financial Action Task Form (FATF), have established an executive-like mechanism, which allows blacklisting individuals and groups, freezing their funds, and restricting their travel, all of which have become part of states’ anti-terrorism frameworks. A number of problems arise from building counter-terrorism measures on the foundation of a vague definition of terrorism. This paper examines the utility and consequences of counter-terrorism financing with considering the lack of an international definition of terrorism. The main problem with national and international anti-terrorism legislation is the lack of a clear objective definition of terrorism. Most, if not all, national laws are broad and vague. Determining what terrorism remains the crucial underpinning of any successful discussion of counter-terrorism, and of the future success of counter-terrorist measures. This paper focuses on the legal and political consequences of equalizing the treatment of violent terrorist crimes, such as bombing, with non-violent terrorism-related crimes, such as funding terrorist groups. While both sorts of acts requires criminalization, treating them equally risks wrongfully or unfairly condemning innocent people who have associated with “terrorists” but are not involved in terrorist activities. This paper examines whether global obligations to counter terrorism financing focus on controlling terrorist groups more than terrorist activities. It also examines the utility of the obligations adopted by the UN Security Council and FATF, and whether they serve global security; or whether the utility is largely restricted to Western security, with little attention paid to the unique needs and demands of other regions.Keywords: counter-terrorism, definition of terrorism, FATF, security, terrorism financing, UN Security Council
Procedia PDF Downloads 3248752 Tourism Industry in Pakistan: Challenges Faced and Future Prospects
Authors: Misbah Shaheen, Anam Qureshi
Abstract:
In this work we will discuss the challenges faced by tourism industry in Pakistan. Tourism plays vital role in the socio-economic growth of a country. The countries of world, with less tourism opportunities are lagging behind from other nations of the world. Pakistan is one of those countries which rich in historical places, natural beauty, and uniqueness in handmade items and also of green forests. Present study will discuss the challenges being faced by tourism industry with special focus on hotel industry and law and order situation.Keywords: Pakistan, tourism, handmade items, hotel industry
Procedia PDF Downloads 3938751 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm
Authors: Fairouz Beggas
Abstract:
Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.Keywords: arabic data, encryption, playfair, symmetric algorithm
Procedia PDF Downloads 898750 Problems and Prospects of Agricultural Biotechnology in Nigeria’s Developing Economy
Authors: Samson Abayomi Olasoju, Olufemi Adekunle, Titilope Edun, Johnson Owoseni
Abstract:
Science offers opportunities for revolutionizing human activities, enriched by input from scientific research and technology. Biotechnology is a major force for development in developing countries such as Nigeria. It is found to contribute to solving human problems like water and food insecurity that impede national development and threaten peace wherever it is applied. This review identified the problems of agricultural biotechnology in Nigeria. On the part of rural farmers, there is a lack of adequate knowledge or awareness of biotechnology despite the fact that they constitute the bulk of Nigerian farmers. On part of the government, the problems include: lack of adequate implementation of government policy on bio-safety and genetically modified products, inadequate funding of education as well as research and development of products related to biotechnology. Other problems include: inadequate infrastructures (including laboratory), poor funding and lack of national strategies needed for development and running of agricultural biotechnology. In spite of all the challenges associated with agricultural biotechnology, its prospects still remain great if Nigeria is to meet with the food needs of the country’s ever increasing population. The introduction of genetically engineered products will lead to the high productivity needed for commercialization and food security. Insect, virus and other related diseases resistant crops and livestock are another viable area of contribution of biotechnology to agricultural production. In conclusion, agricultural biotechnology will not only ensure food security, but, in addition, will ensure that the local farmers utilize appropriate technology needed for large production, leading to the prosperity of the farmers and national economic growth, provided government plays its role of adequate funding and good policy implementation.Keywords: biosafety, biotechnology, food security, genetic engineering, genetic modification
Procedia PDF Downloads 1748749 Contingency Screening Using Risk Factor Considering Transmission Line Outage
Authors: M. Marsadek, A. Mohamed
Abstract:
Power system security analysis is the most time demanding process due to large number of possible contingencies that need to be analyzed. In a power system, any contingency resulting in security violation such as line overload or low voltage may occur for a number of reasons at any time. To efficiently rank a contingency, both probability and the extent of security violation must be considered so as not to underestimate the risk associated with the contingency. This paper proposed a contingency ranking method that take into account the probabilistic nature of power system and the severity of contingency by using a newly developed method based on risk factor. The proposed technique is implemented on IEEE 24-bus system.Keywords: line overload, low voltage, probability, risk factor, severity
Procedia PDF Downloads 5458748 Sustainable Urban Growth of Neighborhoods: A Case Study of Alryad-Khartoum
Authors: Zuhal Eltayeb Awad
Abstract:
Alryad neighborhood is located in Khartoum town– the administrative center of the Capital of Sudan. The neighborhood is one of the high-income residential areas with villa type development of low-density. It was planned and developed in 1972 with large plots (600-875m²), wide crossing roads and balanced environment. Recently the area transformed into more compact urban form of high density, mixed-use integrated development with more intensive use of land; multi-storied apartments. The most important socio-economic process in the neighborhood has been the commercialization and deinitialization of the area in connect with the displacement of the residential function. This transformation affected the quality of the neighborhood and the inter-related features of the built environment. A case study approach was chosen to gather the necessary qualitative and quantitative data. A detailed survey on existing development pattern was carried out over the whole area of Alryad. Data on the built and social environment of the neighborhoods were collected through observations, interviews and secondary data sources. The paper reflected a theoretical and empirical interest in the particular characteristics of compact neighborhood with high density, and mixed land uses and their effect on social wellbeing of the residents all in the context of the sustainable development. The research problem is focused on the challenges of transformation that associated with compact neighborhood that created multiple urban problems, e.g., stress of essential services (water supply, electricity, and drainage), congestion of streets and demand for parking. The main objective of the study is to analyze the transformation of this area from residential use to commercial and administrative use. The study analyzed the current situation of the neighborhood compared to the five principles of sustainable neighborhood prepared by UN Habitat. The study found that the neighborhood is experienced changes that occur to inner-city residential areas and the process of change of the neighborhood was originated by external forces due to the declining economic situation of the whole country. It is evident that non-residential uses have taken place uncontrolled, unregulated and haphazardly that led to damage the residential environment and deficiency in infrastructure. The quality of urban life and in particular on levels of privacy was reduced, the neighborhood changed gradually to be a central business district that provides services to the whole Khartoum town. The change of house type may be attributed to a demand-led housing market and absence of policy. The results showed that Alryad is not fully sustainable and self-contained, street network characteristics and mixed land-uses development are compatible with the principles of sustainability. The area of streets represents 27.4% of the total area of the neighborhood. Residential density is 4,620 people/ km², that is lower than the recommendations, and the limited block land-use specialization is higher than 10% of the blocks. Most inhabitants have a high income so that there is no social mix in the neighborhood. The study recommended revision of the current zoning regulations in order to control and regulate undesirable development in the neighborhood and provide new solutions which allow promoting the neighborhood sustainable development.Keywords: compact neighborhood, land uses, mixed use, residential area, transformation
Procedia PDF Downloads 1298747 Household Food Security and Poverty Reduction in Cameroon
Authors: Bougema Theodore Ntenkeh, Chi-bikom Barbara Kyien
Abstract:
The reduction of poverty and hunger sits at the heart of the United Nations 2030 Agenda for Sustainable Development, and are the first two of the Sustainable Development Goals. The World Food Day celebrated on the 16th of October every year, highlights the need for people to have physical and economic access at all times to enough nutritious and safe food to live a healthy and active life; while the world poverty day celebrated on the 17th of October is an opportunity to acknowledge the struggle of people living in poverty, a chance for them to make their concerns heard, and for the community to recognize and support poor people in their fight against poverty. The association between household food security and poverty reduction is not only sparse in Cameroon but mostly qualitative. The paper therefore investigates the effect of household food security on poverty reduction in Cameroon quantitatively using data from the Cameroon Household Consumption Survey collected by the Government Statistics Office. The methodology employed five indicators of household food security using the Multiple Correspondence Analysis and poverty is captured as a dummy variable. Using a control function technique, with pre and post estimation test for robustness, the study postulates that household food security has a positive and significant effect on poverty reduction in Cameroon. A unit increase in the food security score reduces the probability of the household being poor by 31.8%, and this effect is statistically significant at 1%. The result further illustrates that the age of the household head and household size increases household poverty while households residing in urban areas are significantly less poor. The paper therefore recommends that households should diversify their food intake to enhance an effective supply of labour in the job market as a strategy to reduce household poverty. Furthermore, family planning methods should be encouraged as a strategy to reduce birth rate for an equitable distribution of household resources including food while the government of Cameroon should also develop the rural areas given that trend in urbanization are associated with the concentration of productive economic activities, leading to increase household income, increased household food security and poverty reduction.Keywords: food security, poverty reduction, SDGs, Cameroon
Procedia PDF Downloads 778746 An Examination of the Relationship between the Five Stages of the Yogacara Path to Enlightenment and the Ten Ox-Herding Pictures
Authors: Kyungbong Kim
Abstract:
This study proposed to compare and analyse the five stages of cultivating the Yogâcāra path and the spiritual journey in the Ten Ox-Herding Pictures. To achieve this, the study investigated the core concepts and practice methods of the two approaches and analysed their relations from the literature reviewed. The results showed that the end goal of the two approaches is the same, the attainment of Buddhahood, with the two having common characteristics including the practice of being aware of the impermanent and non-self, and the fulfilling benefit of sentient beings. The results suggest that our Buddhist practice system needs to sincerely consider the realistic ways by which one can help people in agony in contemporary society, not by emphasizing on the enlightenment through a specific practice way for all people, but by tailored practice methods based on each one's faculties in understanding Buddhism.Keywords: transformation of consciousness to wisdom, enlightenment, the five stages of cultivating the Yogacāra path, the Ten Ox-Herding Pictures, transformation of the basis
Procedia PDF Downloads 2658745 Pakistan Nuclear Security: Threats from Non-State Actors
Authors: Jennifer Wright
Abstract:
The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism
Procedia PDF Downloads 2278744 Curvature Based-Methods for Automatic Coarse and Fine Registration in Dimensional Metrology
Authors: Rindra Rantoson, Hichem Nouira, Nabil Anwer, Charyar Mehdi-Souzani
Abstract:
Multiple measurements by means of various data acquisition systems are generally required to measure the shape of freeform workpieces for accuracy, reliability and holisticity. The obtained data are aligned and fused into a common coordinate system within a registration technique involving coarse and fine registrations. Standardized iterative methods have been established for fine registration such as Iterative Closest Points (ICP) and its variants. For coarse registration, no conventional method has been adopted yet despite a significant number of techniques which have been developed in the literature to supply an automatic rough matching between data sets. Two main issues are addressed in this paper: the coarse registration and the fine registration. For coarse registration, two novel automated methods based on the exploitation of discrete curvatures are presented: an enhanced Hough Transformation (HT) and an improved Ransac Transformation. The use of curvature features in both methods aims to reduce computational cost. For fine registration, a new variant of ICP method is proposed in order to reduce registration error using curvature parameters. A specific distance considering the curvature similarity has been combined with Euclidean distance to define the distance criterion used for correspondences searching. Additionally, the objective function has been improved by combining the point-to-point (P-P) minimization and the point-to-plane (P-Pl) minimization with automatic weights. These ones are determined from the preliminary calculated curvature features at each point of the workpiece surface. The algorithms are applied on simulated and real data performed by a computer tomography (CT) system. The obtained results reveal the benefit of the proposed novel curvature-based registration methods.Keywords: discrete curvature, RANSAC transformation, hough transformation, coarse registration, ICP variant, point-to-point and point-to-plane minimization combination, computer tomography
Procedia PDF Downloads 4248743 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation
Authors: Natalia Kalinowska
Abstract:
The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach
Procedia PDF Downloads 2528742 Design and Construction of Vehicle Tracking System with Global Positioning System/Global System for Mobile Communication Technology
Authors: Bala Adamu Malami
Abstract:
The necessity of low-cost electronic vehicle/car security designed in coordination with other security measures is always there in our society to reduce the risk of vehicle intrusion. Keeping this problem in mind, we are designing an automatic GPS system which is technology to build an integrated and fully customized vehicle to detect the movement of the vehicle and also serve as a security system at a reasonable cost. Users can locate the vehicle's position via GPS by using the Google Maps application to show vehicle coordinates on a smartphone. The tracking system uses a Global System for Mobile Communication (GSM) modem for communication between the mobile station and the microcontroller to send and receive commands. Further design can be improved to capture the vehicle movement range and alert the vehicle owner when the vehicle is out of range.Keywords: electronic, GPS, GSM modem, communication, vehicle
Procedia PDF Downloads 998741 Conservation and Development of Rural Everyday Landscapes in the Context of Modernization and Transformation
Authors: Xie Weifan, Wang Zhongde
Abstract:
Everyday landscape in the countryside has long played an important role as a cultural representation of the countryside and a link between the countryside and social relations. In the transformation of modernization, the daily landscape in the countryside needs to change with the transformation of daily life in countryside therefore, interpreting the daily landscape in the countryside and understanding the basic characteristics and value perception of the daily landscape from the villagers' perspective can help to understand the daily landscape in the countryside and its conservation and development. Taking Lizi Village in Qianjiang District, Chongqing Municipality, China, as a case study, we collected important daily landscapes in villagers' perceptions through in-depth interviews, categorized them into personal living space, public affairs space, and public activity space, and analyzed the characteristics of the spatial distribution of daily landscapes. The perceptual characteristics of the villagers' perceptions are analyzed and divided into four major types, namely, physical environment perception, atmosphere and culture perception, emotional feelings, and behavioral preferences, and their perceptual characteristics are analyzed respectively to understand the important characteristics of the villagers' perceptions of the daily landscapes. Finally, it is proposed that the protection and development of daily landscape in villages need to improve the mechanism of discovering and evaluating daily landscape, encourage residents to participate in the construction of daily landscape, protect the high-value daily landscape, and promote the innovative development of daily landscape.Keywords: rural landscape, everyday landscape, landscape perception, conservation and development
Procedia PDF Downloads 258740 Bypassing Docker Transport Layer Security Using Remote Code Execution
Authors: Michael J. Hahn
Abstract:
Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.Keywords: cloud, cryptography, Docker, Linux, security
Procedia PDF Downloads 1988739 The Causes and Potential Solutions for Foodborne Illness, Food Security, and Food Safety: In the Case of the East Harerghe Region of Oromia, Ethiopia
Authors: Tuji Jemal Ahmed, Abdi Mohammed, Geremew Geidare Kailo
Abstract:
Food security, foodborne illness, and food safety are critical issues that affect the East Harerghe region of Oromia, Ethiopia. Despite the region's potential for agriculture, food insecurity remains a significant problem, with many households experiencing chronic hunger and malnutrition. The region also experiences high rates of foodborne illnesses, including cholera, typhoid, and diarrhea, which are caused by poor hygiene and sanitation practices. Additionally, food safety is a significant challenge, particularly in rural areas, where there is a lack of infrastructure, inadequate food storage facilities, and limited access to information about food safety. There are several factors that contribute to the current situation in the East Harerghe region; firstly, the region is susceptible to natural disasters, for instance, drought, which affects crop yields and livestock production. Secondly, the region also experiences poor infrastructure, which affects the storage and transportation of food, particularly in rural areas. Thirdly, there is a lack of awareness and knowledge on good hygiene and sanitation practices, specifically during food handling, processing, and storage. Fourthly, unitability due to conflict and other forms of land degradation exacerbates food insecurity and malnutrition. Finally, limited access to financial resources and markets commonly affects smallholder farmers by their ability to produce and sell food. To address the current situation in that area, several potential solutions can be implemented; investment in infrastructure is necessary, especially in rural areas, to improve the storage and transportation of food. Education and awareness programs on good hygiene and sanitation practices should target local communities, smallholder farmers, and food vendors. Financial resources and markets should be made more accessible to smallholder farmers, particularly through the provision of credit and improved access to markets. Addressing the underlying causes of conflict and promoting peaceful coexistence can help to reduce displacement and loss of livelihoods. Finally, the enforcement of food safety regulations and the implementation of standards for food processing and storage facilities are necessary to ensure food safety. In conclusion, addressing the challenges of food security, foodborne illness, and food safety in the East Harerghe region requires a coordinated effort from various stakeholders, including the government, non-governmental organizations, and local communities. By implementing the solutions outlined above, the region can improve its food security, prevent foodborne illnesses, and keep food safe for its population. Eventually, building the resilience of communities to shocks such as droughts, floods, and conflict is necessary to ensure long-term food security in the region.Keywords: foodborne illness, food handling, food safety, food security
Procedia PDF Downloads 1018738 Emotional Security in Relation to Students' Emotional Efficiency
Authors: Ibtisam Mahmoud Mohammed Sultan
Abstract:
The present research aimed to identify the level of both emotional and emotional competence among students in Tikrit University aimed to know the assumptions in statistical significance for both variables as gender variables (m-f) and specialty (scientific-humanistic), as research to learn what Relationship between emotional safety and efficiency alanfaalet Tikrit University students. The researcher built emotional security measure (54) as built measure emotional competence (46), as the researcher extract full alsaykomtrih characteristics of both scales. The research sample consisted of (600) students selected by the random way and applying the scales on a basic search sample and processed statistical data using a variety of methods, including statistical test (test T.) and Pearson correlation coefficient, the researcher found a set of results. The following: 1. that the Tikrit University students possess a high level of emotional security. 2. to safely enjoy passionate males more than females. 3. that there is no difference between students of scientific and humanitarian specialization in variable emotional security. 4. that the Tikrit University students enjoy a high level of emotional competence. 5. the female-male outperforming in emotional competence level. 6. the humanitarian specialization students Excel in emotional competence for those of specialty. 7. the existence of a positive correlation between variables. Through search results, the researcher has developed a set of conclusions, proposals, and recommendations.Keywords: relation, emotional security, students, efficiency
Procedia PDF Downloads 1208737 Culturally Relevant Education Challenges and Threats in the US Secondary Classroom
Authors: Owen Cegielski, Kristi Maida, Danny Morales, Sylvia L. Mendez
Abstract:
This study explores the challenges and threats US secondary educators experience in incorporating culturally relevant education (CRE) practices in their classrooms. CRE is a social justice pedagogical practice used to connect student’s cultural references to academic skills and content, to promote critical reflection, to facilitate cultural competence, and to critique discourses of power and oppression. Empirical evidence on CRE demonstrates positive student educational outcomes in terms of achievement, engagement, and motivation. Additionally, due to the direct focus on uplifting diverse cultures through the curriculum, students experience greater feelings of belonging, increased interest in the subject matter, and stronger racial/ethnic identities. When these teaching practices are in place, educators develop deeper relationships with their students and appreciate the multitude of gifts they (and their families) bring to the classroom environment. Yet, educators regularly report being unprepared to incorporate CRE in their daily teaching practice and identify substantive gaps in their knowledge and skills in this area. Often, they were not exposed to CRE in their educator preparation program, nor do they receive adequate support through school- or district-wide professional development programming. Through a descriptive phenomenological research design, 20 interviews were conducted with a diverse set of secondary school educators to explore the challenges and threats they experience in incorporating CRE practices in their classrooms. The guiding research question for this study is: What are the challenges and threats US secondary educators face when seeking to incorporate CRE practices in their classrooms? Interviews were grounded by the theory of challenge and threat states, which highlights the ways in which challenges and threats are appraised and how resources factor into emotional valence and perception, as well as the potential to meet the task at hand. Descriptive phenomenological data analysis strategies were utilized to develop an essential structure of the educators’ views of challenges and threats in regard to incorporating CRE practices in their secondary classrooms. The attitude of the phenomenological reduction method was adopted, and the data were analyzed through five steps: sense of the whole, meaning units, transformation, structure, and essential structure. The essential structure that emerged was while secondary educators display genuine interest in learning how to successfully incorporate CRE practices, they perceive it to be a challenge (and not a threat) due to lack of exposure which diminishes educator capacity, comfort, and confidence in employing CRE practices. These findings reveal the value of attending to emotional valence and perception of CRE in promoting this social justice pedagogical practice. Findings also reveal the importance of appropriately resourcing educators with CRE support to ensure they develop and utilize this practice.Keywords: culturally relevant education, descriptive phenomenology, social justice practice, US secondary education
Procedia PDF Downloads 1868736 Accessibility of Social Justice through Social Security in Indian Organisations: Analysis Based on Workforce
Authors: Neelima Rashmi Lakra
Abstract:
India was among one of the highly developed economy up to 1850 due to its cottage industries. During the end of the 18th century, modern industrial enterprises began with the first cotton mill in Bombay, the jute mill near Calcutta and the coal mine in Raniganj. This was counted as the real beginning of industry in 1854 in India. Prior to this period people concentrated only to agriculture, menial service or handicraft, and the introduction of industries exposed them to the disciplines of factory which was very tedious for them. With increasing number of factories been setup adding on to mining and introduction of railway, World War Period (1914-19), Second World War Period (1939-45) and the Great Depression (1929-33) there were visible change in the nature of work for the people, which resulted in outburst of strike for various reasons in these factories. Here, with India’s independence there was emergence of public sector industries and labour legislations were introduced. Meanwhile, trade unions came to notice to the rescue of the oppressed but failed to continue till long. Soon after, with the New Economic Policy organisations came across to face challenges to perform their best, where social justice for the workmen was in question. On these backdrops, studies were found discussing the central human capabilities which could be addressed through Social Security schemes. Therefore, this study was taken up to look at the reforms and legislations mainly meant for the welfare of the labour. This paper will contribute to the large number of Indian population who are serving in public sectors in India since the introduction of industries and will complement the issue of social justice through social security measures among this huge crowd serving the nation. The objectives of the study include; to find out what labour Legislations have already been existing in India, the role of Trade Union Movement, to look at the effects of New Economic Policy on these reforms and its effects and measures taken for the workforce employed in the public sectors and finally, if these measures fulfil the social justice aspects for the larger society on whole. The methodology followed collection of data from books, journal articles, reports, company reports and manuals focusing mainly on Indian studies and the data was analysed following content analysis method. The findings showed the measures taken for Social Security, but there were also reflections of very few particular additions or amendments to these Acts and provisions with the onset of New Liberalisation Policy. Therefore, the study concluded examining the social justice aspects in the context of a developing economy and discussing the recommendations.Keywords: public sectors, social justice, social security schemes, trade union movement
Procedia PDF Downloads 4508735 Shari'ah Governance in Islamic Banking and Finance - A Comparison Between Malaysia and Other Selected Countries, Current Challenges and Potential Solution
Authors: Muhamad Badri Bin Othman
Abstract:
As a role model and leading country in the world that establishes and promotes Islamic banking and finance, Malaysia has set up and come up with a set of standards and frameworks to govern its Shari’ah function towards implementing the desired outcome of Islamic banking and finance as new source of wealth creation. This paper, examines and highlights, at the very minimum, the importance and application of Shari’ah governance in Islamic banking and finance in Malaysia as a leading country in Islamic banking and finance. This paper also, compares on Shari’ah governance, which is being adopted between Malaysia and other selected countries namely, Pakistan, Bahrain, Kuwait, United Arab Emirates (UAE) and Qatar. This paper also, aims at highlighting the current challenges and issues faced by the scholars in Shari’ah Supervisory Board (SSB) in deliberating their opinions and fatwa towards the implementation of new products in Islamic banking industry to promote innovation among the industry players. The author of this paper will highlight the major challenges and issues faced by the SSB members of Islamic banks in Malaysia, taking into account the complexity of the operation wise and products of Islamic banking, and how they overcome those challenges and issues identified. This will be done through a series of face-to-face interview sessions which will be conducted with a few prominent figures of Islamic banking and finance scholars in Malaysia to highlight the issues and challenges they are facing towards Islamic financial innovation and subsequently finding solutions for the identified issues and challenges.Keywords: Shari’ah governance, Shari’ah supervisory board (SSB), Issues and challenges, Islamic financial innovation
Procedia PDF Downloads 4218734 Social and Economic Challenges of Adopting Sustainable Urban Development in Developing Economy: A Stakeholder's Perception
Authors: Raed Fawzi Mohammed Ameen, Haider I. Alyasari, Maryam Altaweel
Abstract:
Due to rapid urbanization, developing countries faced significant urban challenges that accompanied the population growth such as the inability to provide adequate housing; sustain human and community's health and wellbeing; ensure the safety in urban areas; the prevalence corruption; lack of jobs; and a shortage of investment. The destruction, degradation, and lack of planning are acute in countries such as Iraq that have suffered for more than four decades because of war and international sanctions, resulting in severe damages to the ecology sector, social utilities, housing, infrastructure, as well as the disruption of the economic sector. Many of significant urban development, housing, and regeneration projects are currently underway in different regions in Iraq, labelled as a means to reform the environmental, social, and economic sectors. However, most often with absence of public participation. Hence, there is an urgent need for understanding public perception, especially of urban socio-economic challenges, which represents a crucial concern for many planners, designers, and policy-makers in order to develop effective policies in addition to increasing their participation. The aim of this study is to investigate stakeholder perceptions of the socio-economic challenges of urban development and their priorities in the all Iraqi provinces. A nationwide questionnaire has been conducted (N = 643) across Iraq, using 19- item structured questionnaire where the stakeholder’s perspectives were collected on a 5-point Likert-type scale. The indicators were identified through deep investigation in previous studies. Principal component analysis (PCA) and statistical tests were utilized to the collected responses in order to investigate the linkage between the perceptions of socio- economic challenges and demographic factors. A high value of internal consistency and reliability of the instrument has been achieved (Cronbach’s alpha= 0.867). Five principal components have been identified, namely: economic, cultural aspects, design context, employment, security and housing demands. The item ‘safety of public places' was ranked as the most important, followed by the items 'minimize unplanned housing', and ‘provision of affordable housing’, respectively. Promote high-rise housing from the housing demands group, was ranked the lowest component between all indicators. 'Using sustainable local materials in construction' item had the second lowest mean score. The results also illustrate a link between deficiencies in the social and economic infrastructure because of the destruction and degradation caused by political instability in Iraq in the last few decades.Keywords: public participation in development, socio-economic challenges, urban development, urban sustainability
Procedia PDF Downloads 1368733 Robust Data Image Watermarking for Data Security
Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan
Abstract:
In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms
Procedia PDF Downloads 5158732 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 185