Search results for: Islamic social security
11575 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s
Authors: Zunjarrao Kadam, Vikas Minchekar
Abstract:
The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.Keywords: experimentally induced stress, facial recognition, cognition, security personnel
Procedia PDF Downloads 26511574 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry
Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim
Abstract:
Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain
Procedia PDF Downloads 9511573 Social Protection Reforms in Indonesia: Towards a Life Cycle Based Social Protection System
Authors: Dyah Larasati, Karishma Alize Huda, Sri Kusumastuti Rahayu, Martin Daniel Siyaranamual
Abstract:
Indonesia continues to reform its social protection system to provide the needed protection for its citizen. Indonesia Social Protection consisted of social assistance programs (non-contributory/tax-financed) specifically targeted for the poor and at-risk and social security/insurance program (contributory system). The social assistance programs have mostly been implemented since 1998. The national health insurance has been implemented since 2014 and the employment social insurance since 2015. One major reform implemented has been improving the targeting performance of its major social assistance portfolios including (1) Food Assistance for the poor families (Rastra and BPNT/noncash foods assistance); (2) Education Assistance for poor children; (3) Conditional Cash Transfer for poor families (PKH); and (4) Subsidized beneficiaries of National Health Insurance (JKN-PBI) for the poor and at-risk individuals. For the Social Insurance (through BPJS Employment program), several initiatives have been implemented to expand the program contributing members, although it mostly benefits the formal sector workers. However, major gaps still exist especially for the emerging middle-income groups who typically work at the informal sectors. They have yet to get the protection needed to sustain their social and economic growth. Since 2017, TNP2K (the National Team for Poverty Reduction) under the Vice President office has led the social protection discourse as the government understands the need to address vulnerabilities across the lifecycle and prioritize support to the most at-risk population particularly the elderly, young children and people with disabilities. Discussion and advocacy to recommend for more investment is continuing in order for the government to establish a comprehensive social protection system in the near future (2020-2024) that protects children through an inclusive child benefit program; build a system to benefit more working-age adults (including individuals with disabilities) and a three-tier elderly protection as they reach 65 years.Keywords: poverty reduction, social assistance, social insurance, social protection
Procedia PDF Downloads 18411572 Minority Rights in Islamic Law (Sharia) and International Law Protection Mechanisms in the Region Kurdistan of Iraq
Authors: Ardawan Mustafa Ismail, Rebaz Sdiq Ismail
Abstract:
The subject of minorities takes an exceptional importance at all levels, around the world, especially those whose population is composed of many nationalities, and this subject became a very affective part in every country for its security, entity and stability, such as the nationality, religion or culture, as a result of internal factors and external influences, and at the same time it became clear that enslaving minorities had become a matter of reality. Which made the rights of minorities one of the legal, political and geographical issues, many attempts emerged that specialists and non-specialists have given the minorities ’problems their realistic solutions away from theorizing and assumption. On this chosen topic, there are many researches that are written in general places, but… It is believed did not see any in-depth studies dealing with the protection of minority rights of the Region of Kurdistan/ Iraq, because in the Region of Kurdistan/ Iraq there are many minorities living in this area, such as: Muslims, Yazidi, Assyrian, Christian, Chaldeans, and others.Keywords: minority, international law, protection, Kurdistan, people
Procedia PDF Downloads 4611571 Secure Watermarking not at the Cost of Low Robustness
Authors: Jian Cao
Abstract:
This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)
Procedia PDF Downloads 38811570 The Principle of Methodological Rationality and Security of Organisations
Authors: Jan Franciszek Jacko
Abstract:
This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics
Procedia PDF Downloads 14411569 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria
Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma
Abstract:
Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures
Procedia PDF Downloads 11811568 The Sustained Utility of Japan's Human Security Policy
Authors: Maria Thaemar Tana
Abstract:
The paper examines the policy and practice of Japan’s human security. Specifically, it asks the question: How does Japan’s shift towards a more proactive defence posture affect the place of human security in its foreign policy agenda? Corollary to this, how is Japan sustaining its human security policy? The objective of this research is to understand how Japan, chiefly through the Ministry of Foreign Affairs (MOFA) and JICA (Japan International Cooperation Agency), sustains the concept of human security as a policy framework. In addition, the paper also aims to show how and why Japan continues to include the concept in its overall foreign policy agenda. In light of the recent developments in Japan’s security policy, which essentially result from the changing security environment, human security appears to be gradually losing relevance. The paper, however, argues that despite the strategic challenges Japan faced and is facing, as well as the apparent decline of its economic diplomacy, human security remains to be an area of critical importance for Japanese foreign policy. In fact, as Japan becomes more proactive in its international affairs, the strategic value of human security also increases. Human security was initially envisioned to help Japan compensate for its weaknesses in the areas of traditional security, but as Japan moves closer to a more activist foreign policy, the soft policy of human security complements its hard security policies. Using the framework of neoclassical realism (NCR), the paper recognizes that policy-making is essentially a convergence of incentives and constraints at the international and domestic levels. The theory posits that there is no perfect 'transmission belt' linking material power on the one hand, and actual foreign policy on the other. State behavior is influenced by both international- and domestic-level variables, but while systemic pressures and incentives determine the general direction of foreign policy, they are not strong enough to affect the exact details of state conduct. Internal factors such as leaders’ perceptions, domestic institutions, and domestic norms, serve as intervening variables between the international system and foreign policy. Thus, applied to this study, Japan’s sustained utilization of human security as a foreign policy instrument (dependent variable) is essentially a result of systemic pressures (indirectly) (independent variables) and domestic processes (directly) (intervening variables). Two cases of Japan’s human security practice in two regions are examined in two time periods: Iraq in the Middle East (2001-2010) and South Sudan in Africa (2011-2017). The cases show that despite the different motives behind Japan’s decision to participate in these international peacekeepings ad peace-building operations, human security continues to be incorporated in both rhetoric and practice, thus demonstrating that it was and remains to be an important diplomatic tool. Different variables at the international and domestic levels will be examined to understand how the interaction among them results in changes and continuities in Japan’s human security policy.Keywords: human security, foreign policy, neoclassical realism, peace-building
Procedia PDF Downloads 13911567 Shia School of Thought and the Experience of Political Order in Contemporary Era
Authors: Abdulvahab Forati
Abstract:
Religious intellectualism is the only stream of consciousness in Iran that its religious theories formed Democracy. The theory of Religious intellectualism was utilized in Constitutional Revolution and Islamic Revolution. To instate Democracy in Iran, in compare with West and sunnis, the theory of Religious Intellectualism is being used differently. Unlike Democracy in the west that has started with the concept of Individualism and Natural Rights or in Sunni world that has started with the concept of consultation, it has started in Iran with mima-la-nas-fih (what we don’t have any proof for)or mantaqa-alfiraq-altashri’ (area of vacuum from reason). Shia scholars first acquainted with the concept of Democracy through theories of Sheikh Mortiza Ansari, and later some of his followers, including Akhund-e-khorasani and Mirzaye naeini, regarding Sheikh Ansari’s thoughts, began to analyze its Constitutional system and Democratic elements. But Imam Khomeini, the great founder of Islamic Republic of Iran, with respect to RAKHS (religious permission for having a choice)could make connection between Islam and Democracy. Instead of focusing on Civil contracts, he relied on Sirah Ughala (Tradition) and accepted many of the current conducts, e.g. Democracy and Political Parties and acknowledged the authority (Hujiat) of them even in absence of Infallibles. These two are the most notable experiences of shia political thoughts about Democracy within the last 100 years. In this article, the author tries to explain the second experience in Imam Khomeini’s thoughts and Sirah.Keywords: Shia school, Islamic revolution, democracy, political order
Procedia PDF Downloads 32411566 Effect of Bank Specific and Macro Economic Factors on Credit Risk of Islamic Banks in Pakistan
Authors: Mati Ullah, Shams Ur Rahman
Abstract:
The purpose of this research study is to investigate the effect of macroeconomic and bank-specific factors on credit risk in Islamic banking in Pakistan. The future of financial institutions largely depends on how well they manage risks. Credit risk is an important type of risk affecting the banking sector. The current study has taken quarterly data for the period of 6 years, from 1st July 2014 to 30 Jun 2020. The data set consisted of secondary data. Data was extracted from the websites of the State Bank and World Bank and from the financial statements of the concerned banks. In this study, the Ordinary least square model was used for the analysis of the data. The results supported the hypothesis that macroeconomic factors and bank-specific factors have a significant effect on credit risk. Macroeconomic variables, Inflation and exchange rates have positive significant effects on credit risk. However, gross domestic product has a negative significant relationship with credit risk. Moreover, the corporate rate has no significant relation with credit risk. Internal variables, size, management efficiency, net profit share income and capital adequacy have been proven to influence positively and significantly the credit risk. However, loan to deposit-has a negative insignificance relationship with credit risk. The contribution of this article is that similar conclusions have been made regarding the influence of banking factors on credit risk.Keywords: credit risk, Islamic banks, macroeconomic variables, banks specific variable
Procedia PDF Downloads 2311565 Ethno-Religious Conflicts In Nigeria; Implications for National Security
Authors: Samuel Onyekachi Chidi
Abstract:
Nigeria today faces more internal threats stemming from ethnic and religious conflicts than external sources. This article seeks to examine the ethno-religious conflicts in Nigeria from 2015 to 2021 and their impact on national security. The research was guided by six objectives. The theoretical framework adopted for this study is Structural Conflict Theory, which provides an adequate explanation, a predictive rationale for the frequent occurrence of ethno-religious conflicts and a tendency to provide the necessary insight for their resolution. The results of the study revealed that there is a strong relationship between ethnicity, religion, conflict and national security and that the ethno-religious conflicts experienced in Nigeria have gross implications for national security. The study recommends that the secularity of the Nigerian state be restored and preserved and that the state of origin be removed and replaced by the state of residence in all our national documents, as this will reduce ethnic identity, which is in opposition to nationalism. Religious leaders, traditional rulers, the media and other stakeholders should support the government in its fight to reduce ethno-religious conflict by sensitizing its youth, preaching unity and peaceful coexistence, and discouraging the use of violence as a means of settling disputes between groups and individuals.Keywords: ethnicity, religion, conflict, national security
Procedia PDF Downloads 8211564 Geometrical Analysis of Tiling Patterns in Azari Style: The Case of Tabriz Kaboud Mosque
Authors: Seyyedeh Faezeh Miralami, Sahar Sayyadchapari, Mona Laleh, Zahra Poursafar
Abstract:
Tiling patterns are magnificent display of decoration in Islamic period. They transform the dusty and dreary facades to splendid and ornate ones. Due to ideological factors and elements of Azari style decorations, geometrical patterns and vegetative designs became prevalent and pervasive in religious sites like mosques. Objectives: The objective of this research is a study of tiling patterns in Tabriz Kaboud mosque, as a splendid work of architecture in Azari style. In this study, the geometrical designs and tiling patterns employed in the mosque decorations are examined and analyzed. Method: The research is based on a descriptive analysis method. Data and information are collected based on documents library and field study. Then, polished and brushed, the study resulted in an illustrative conclusion. Findings: In religious sites such as mosques, geometry represents ‘divination’ in Christian theology and ‘Unity with God’ or ‘Tawhid’ in Islamic terminology. In other words, science, literature, architecture, and all forms of human expression and representation are pointed towards one cause, unity or divination. Tiling patterns of Kaboud Mosque, mostly hexagonal, circular, square and triangle, form outstanding architectonic features which recount a story, a narration of divination or unification with the One.Keywords: tiling, Azari style, Tabriz Kaboud Mosque, Islamic architecture
Procedia PDF Downloads 32711563 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption
Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme
Procedia PDF Downloads 38311562 Maras and Public Security in Central America in XXI Century
Authors: Michal Stelmach
Abstract:
The aim of this paper is a critical analysis of the security policy in the field of the fight against transnational criminal groups in Central America in XXI century. We are analyzing all taken issues from several perspectives: political, anthropological, sociological and legal which allows me to confront behavior and the attitudes of the political elites against official legislative changes and declared actions, strategies and policies against practice. In the first part of paper we would like to present the genesis and characteristic of transnational gangs, called maras and next we would like to present their activities and roles within chosen sectors of organized crimes. In the second part we will analyze the government’s policy towards transnational criminal groups. The analysis will be concentrated on public safety policy implemented in specific Central American countries as well as regional international cooperation. The main intention of the author is to present the state of the security in Central America in XXI century by emphasizing failures and successes in the fight against transnational criminal organizations. Additionally we want to present and define the challenges currently facing the region now and to show the prediction of the situation’s development within next future and to define the recommendations on the design of public security policies in Central American countries.Keywords: maras, public security, human rights, Central America
Procedia PDF Downloads 33711561 Urban Agriculture in a Scandinavian Context as a Tool for Climate Adaption and for Empowering Communities through Food Production
Authors: Signe Voltelen, Kristin Astrup Aas
Abstract:
In the Scandinavian cities, there is a raised focus on the potential of using urban agriculture in city development, both as a tool for handling challenges provoked by climate change and to develop new, and stronger social communities. During the last couple of years, Copenhagen has experienced an increase in extreme weather resulting in dramatical floods with huge humanitarian and economic consequences. As an approach for climate adaption and mitigation the government has made a strategy for changing a significant amount of the cities hard surfaces into green and absorbing surfaces. Including urban farms and gardens. In close collaboration with the municipality, it has been possible to implement citizen-run gardens under the different concepts climate adaption and food literacy. Like other European cities, Copenhagen has a historical tradition of small-scale farming for food security inside the city, and in the outskirts of the urban area. Lately, this tradition has gotten new relevance, and new initiatives are popping up. In addition to providing local food, the urban farm becomes a semi-public, semi-private room that invites to community and integration across ethnicity, social background, and age. The direct interaction in the process of farming creates a connection between the urban and the rural and are educational for people growing up and living their whole life in the dense city. In the paper, three local example models of urban agriculture are presented, and the experiences of their potential as tools for developing social and environmental sustainable cities is examined.Keywords: city development, climate mitigation, community building, urban agriculture, urban- rural transition, food security
Procedia PDF Downloads 28811560 The Impact of Non-Interest Banking on Economic Development in Nigeria
Authors: Oduntan Kemi Olalekan
Abstract:
Nigeria as the largest economy in Africa is still in its developing stage as its economy cannot be termed developed; it is still in search of economic policy that will positively affect the life of majority of her citizenry. Several policies have been employed to take care of the situation prominent among which is Structural Adjustment Programme (SAP) of Babangida Administration but it could not rescue the economy. Non-interest Banking otherwise known as Islamic Banking has been suggested as a means of developing Nigerian economy as it will enable more Nigerian have access to working capital and contribute positively to the growth of her economy. The paper investigated the level of Nigeria economic development and gave an overview of economic policies since independence, traced the genesis of non-interest banking in Nigeria and made recommendations on the adoption of the policy as an antidote to Nigeria economic development.Keywords: economic development, Nigerian economy, non-interest banking, working capital, Islamic banking.
Procedia PDF Downloads 39711559 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications
Authors: A. Andreasyan, C. Connors
Abstract:
The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol
Procedia PDF Downloads 15311558 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 36111557 Analysis of Security Vulnerabilities for Mobile Health Applications
Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López
Abstract:
The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors
Procedia PDF Downloads 52111556 Towards a Secure Storage in Cloud Computing
Authors: Mohamed Elkholy, Ahmed Elfatatry
Abstract:
Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security
Procedia PDF Downloads 33611555 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security
Authors: Anders Troedsson
Abstract:
For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace
Procedia PDF Downloads 30111554 Standards of Toxicity and Food Security in Brazil
Authors: Ana Luiza Da Gama E Souza
Abstract:
This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.Keywords: standards, indicators, human rights, food security
Procedia PDF Downloads 33611553 Design and Implementation of an Image Based System to Enhance the Security of ATM
Authors: Seyed Nima Tayarani Bathaie
Abstract:
In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.Keywords: face detection algorithm, Haar features, security of ATM
Procedia PDF Downloads 42311552 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security
Authors: Rhisan Mae Enriquez-Morales
Abstract:
The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea
Procedia PDF Downloads 39811551 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'
Authors: Arianna Vedaschi
Abstract:
This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.Keywords: radicalization, free speech, international terrorism, national security
Procedia PDF Downloads 20111550 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 34911549 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults
Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer
Abstract:
Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security
Procedia PDF Downloads 13311548 The Law of Donation and Transplantation of Human Body Organs in the Kurdistan Region of Iraq
Authors: Rebaz Sdiq Ismail
Abstract:
Organ donation and transplantation is one of the most debated topics in modern jurisprudence. It is a surgical procedure that aims to prolong a person’s life suffering from damaged or missing organs. This surgical procedure is carried out by removing an organ from a donor and transplanting it into the body of the recipient. As human life is of high value in Islamic Sharia, therefore, the donor and recipient should go through an intensive medical examination to remove any health risk associated with the organ and transplantation procedure. Thus, in carrying out the organ donation process, any violation of the Sharia decree that might cause harm to the human body is strictly prohibited. The researcher concludes that the former scholars of Islamic Sharia, along with some of the contemporary scholars, are against the entire concept of organ donation and transplant. However, the majority of contemporary scholars support organ donation.Keywords: law, donation, organ, Kurdistan, sharia
Procedia PDF Downloads 3711547 De/Reconstructing the Notion of Women as Perpetrators of Terrorism: The Case of Boko Haram
Authors: Damilohun D. Ayoyo, Anthony Mpiani, Temitope B. Oriola
Abstract:
The debate on women’s roles in insurgencies and terrorist organizations continues to garner scholarly attention. While some scholars view women insurgents and terrorists as perpetrators, others have argued that they are non-agents and victims. This paper de/reconstructs the notion of ‘women as perpetrators’ of terrorism. Drawing on the narratives of rescued female Boko Haram operatives, and Boko Haram’s tactics for recruiting and deploying women and girls, the paper advances three main arguments. First, the growing social construction of women as perpetrators of terrorism – particularly radical Islamic terrorism – downplays the socio-cultural and structural processes leading to women’s involvement with terrorist organizations. Second, women agency in Boko Haram activities is better understood when grounded in the cultural and structural contexts of Northern Nigeria, Boko Haram’s construction of ‘female,’ and the experiences of female Boko Haram operatives. Third, the mechanisms through which female Boko Haram operatives are recruited and deployed make them more of non-agents and victims than perpetrators of terrorism. The paper draws on the agency-structure approach and argues that the gendered power asymmetries embedded in the cultures and structures of Northern Nigeria –the base of Boko Haram– contribute to the nature and dynamics of women’s involvement in the insurgency. Although the paper does not negate the agency of women in terrorism, it aligns with the studies that consider women insurgents as more victims than perpetrators of terror.Keywords: Boko Haram, female agency, Northern Nigeria, patriarchy, perpetrator of terror, radical Islamic terrorism, sharia, victim of terror, women insurgents
Procedia PDF Downloads 12511546 Main Chaos-Based Image Encryption Algorithm
Authors: Ibtissem Talbi
Abstract:
During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich
Procedia PDF Downloads 690