Search results for: information security culture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15799

Search results for: information security culture

14929 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 295
14928 The Influence of the Islamic State (IS) on India: Recent Developments and Challenges

Authors: Alvite Singh Ningthoujam

Abstract:

The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively.

Keywords: India, Islamic State, Muslim, Security

Procedia PDF Downloads 365
14927 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 156
14926 Ensuring Quality in DevOps Culture

Authors: Sagar Jitendra Mahendrakar

Abstract:

Integrating quality assurance (QA) practices into DevOps culture has become increasingly important in modern software development environments. Collaboration, automation and continuous feedback characterize the seamless integration of DevOps development and operations teams to achieve rapid and reliable software delivery. In this context, quality assurance plays a key role in ensuring that software products meet the highest quality, performance and reliability standards throughout the development life cycle. This brief explores key principles, challenges, and best practices related to quality assurance in a DevOps culture. This emphasizes the importance of quality transfer in the development process, as quality control processes are integrated in every step of the DevOps process. Automation is the cornerstone of DevOps quality assurance, enabling continuous testing, integration and deployment and providing rapid feedback for early problem identification and resolution. In addition, the summary addresses the cultural and organizational challenges of implementing quality assurance in DevOps, emphasizing the need to foster collaboration, break down silos, and promote a culture of continuous improvement. It also discusses the importance of toolchain integration and capability development to support effective QA practices in DevOps environments. Moreover, the abstract discusses the cultural and organizational challenges in implementing QA within DevOps, emphasizing the need for fostering collaboration, breaking down silos, and nurturing a culture of continuous improvement. It also addresses the importance of toolchain integration and skills development to support effective QA practices within DevOps environments. Overall, this collection works at the intersection of QA and DevOps culture, providing insights into how organizations can use DevOps principles to improve software quality, accelerate delivery, and meet the changing demands of today's dynamic software. landscape.

Keywords: quality engineer, devops, automation, tool

Procedia PDF Downloads 52
14925 Teachers' Perceptions on Teaching Saudi English Special Edition Textbooks in Respect of Culture

Authors: Sumayyah Qaed J. Alsulami

Abstract:

English as a foreign language (EFL) in Saudi Arabia is still new and evolving. Recently, many of the university language centres that provide intensive and mandatory English courses for the preparatory-year students have been working to develop English teaching. These centres emphasise teaching using 'special editions' textbooks for Saudi students. While the government has been working to provide social and economic policies that intend to open up and communicate widely with the world, there is a need to educate Saudi citizens to be aware and understand others in order to promote tolerance and accept others, especially in a conservative culture like Saudi Arabia. In this study, the data will be English teachers’ views on teaching culture using the special edition textbooks that will be conducted by semi-structured interviews. Teachers’ views will manifest to what extent these textbooks are used interculturally to teach the students.

Keywords: EFL, intercultural teaching, teachers' views, textbooks

Procedia PDF Downloads 133
14924 Nepal Himalaya: Status of Women, Politics, and Administration

Authors: Tulasi Acharya

Abstract:

The paper is a qualitative analysis of status of women and women in politics and administration in Nepal Himalaya. The paper reviews data of women in civil service and in administrative levels. Looking at the Nepali politics and administration from the social constructivist perspective, the paper highlights some social and cultural issues that have othered women as “second sex.” As the country is heading towards modernity, gender friendly approaches are being instituted. Although the data reflects on the progress on women’s status and on women’s political and administrative participation, the data is not enough to predict the democratic gender practices in political and administrative levels. The political and administrative culture of Nepal Himalaya should be changed by promoting gender practices and deconstructing gender images in administrative culture through representative bureaucracy and by introducing democratic policies.

Keywords: politics, policy, administration, culture, women, Nepal, democracy

Procedia PDF Downloads 533
14923 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 44
14922 Organizational Culture and Its Internalization of Change in the Manufacturing and Service Sector Industries in India

Authors: Rashmi Uchil, A. H. Sequeira

Abstract:

Post-liberalization era in India has seen an unprecedented growth of mergers, both domestic as well as cross-border deals. Indian organizations have slowly begun appreciating this inorganic method of growth. However, all is not well as is evidenced in the lowering value creation of organizations after mergers. Several studies have identified that organizational culture is one of the key factors that affects the success of mergers. But very few studies have been attempted in this realm in India. The current study attempts to identify the factors in the organizational culture variable that may be unique to India. It also focuses on the difference in the impact of organizational culture on merger of organizations in the manufacturing and service sectors in India. The study uses a mixed research approach. An exploratory research approach is adopted to identify the variables that constitute organizational culture specifically in the Indian scenario. A few hypotheses were developed from the identified variables and tested to arrive at the Grounded Theory. The Grounded Theory approach used in the study, attempts to integrate the variables related to organizational culture. Descriptive approach is used to validate the developed grounded theory with a new empirical data set and thus test the relationship between the organizational culture variables and the success of mergers. Empirical data is captured from merged organizations situated in major cities of India. These organizations represent significant proportions of the total number of organizations which have adopted mergers. The mix of industries included software, banking, manufacturing, pharmaceutical and financial services. Mixed sampling approach was adopted for this study. The first phase of sampling was conducted using the probability method of stratified random sampling. The study further used the non-probability method of judgmental sampling. Adequate sample size was identified for the study which represents the top, middle and junior management levels of the organizations that had adopted mergers. Validity and reliability of the research instrument was ensured with appropriate tests. Statistical tools like regression analysis, correlation analysis and factor analysis were used for data analysis. The results of the study revealed a strong relationship between organizational culture and its impact on the success of mergers. The study also revealed that the results were unique to the extent that they highlighted a marked difference in the manner of internalization of change of organizational culture after merger by the organizations in the manufacturing sector. Further, the study reveals that the organizations in the service sector internalized the changes at a slower rate. The study also portrays the industries in the manufacturing sector as more proactive and can contribute to a change in the perception of the said organizations.

Keywords: manufacturing industries, mergers, organizational culture, service industries

Procedia PDF Downloads 293
14921 A Review of Lortie’s Schoolteacher

Authors: Tsai-Hsiu Lin

Abstract:

Dan C. Lortie’s Schoolteacher: A sociological study is one of the best works on the sociology of teaching since W. Waller’s classic study. It is a book worthy of review. Following the tradition of symbolic interactionists, Lortie demonstrated the qualities who studied the occupation of teaching. Using several methods to gather effective data, Lortie has portrayed the ethos of the teaching profession. Therefore, the work is an important book on the teaching profession and teacher culture. Though outstanding, Lortie’s work is also flawed in that his perspectives and methodology were adopted largely from symbolic interactionism. First, Lortie in his work analyzed many points regarding teacher culture; for example, he was interested in exploring “sentiment,” “cathexis,” and “ethos.” Thus, he was more a psychologist than a sociologist. Second, symbolic interactionism led him to discern the teacher culture from a micro view, thereby missing the structural aspects. For example, he did not fully discuss the issue of gender and he ignored the issue of race. Finally, following the qualitative sociological tradition, Lortie employed many qualitative methods to gather data but only foucused on obtaining and presenting interview data. Moreover, he used measurement methods that were too simplistic for analyzing quantitative data fully.

Keywords: education reform, teacher culture, teaching profession, Lortie’s Schoolteacher

Procedia PDF Downloads 223
14920 The Role of Social Media for the Movement of Modest Fashion in Indonesia

Authors: Siti Dewi Aisyah

Abstract:

Islamic Modest Fashion has become one of the emerging industries. It is said that social media has making a role in its development. From designers, hijabi bloggers and then instagrammers, they are often seen posting their everyday outfits. They want to combine their faith with cutting-edge fashion trend. Muslim consumers has become a potential targeted market due to the increasing of people wearing hijab. Muslim consumers are projected to spend $327 bilion on clothing by 2020. Indonesia, as the biggest Muslim majority country, has targeted to be The World’s Center for Muslim Fashion in the world as its national branding by 2020. This study will examine how social media especially Blog and Instagram can lead the movement of Islamic Modest Fashion in Indonesia, how it also brings consumer culture to hijabi and as the result it triggers Indonesia to brand itself and how all the elements in Indonesia including the designers, bloggers or instagrammers and also Indonesian Agency for Creative Economy together work to make its dream come true. This research will be conducted through interviews with several elements mentioned, and internet, blog, Instagram and Youtube analysis through visual analysis that also examine the semiotic meaning behind the picture that are posted by the people on the social media especially about the Islamic Modest Fashion trend. This research also contains a literature review of a diverse group of works on topics related to the study. This research will be examined through several theoretical frameworks including the study of social media, fashion culture and consumer culture. Fashion and consumer culture are also two main topics because fashion furthermore leads to consumer culture. The possible benefit of this research is to be a reference literature of Islamic Modest Fashion and social media’s role especially in an Indonesian context.

Keywords: blog, instagram, consumer culture, modest fashion, social media, visual analysis

Procedia PDF Downloads 359
14919 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 152
14918 Formal Verification for Ethereum Smart Contract Using Coq

Authors: Xia Yang, Zheng Yang, Haiyong Sun, Yan Fang, Jingyu Liu, Jia Song

Abstract:

The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts.

Keywords: smart contract, formal verification, Ethereum, Coq

Procedia PDF Downloads 679
14917 Women’s Rights in Conflict with People’s Cultural Autonomy: Problems of Cultural Accommodation

Authors: Nazia Khan

Abstract:

The paper explores the cultural rights accommodation by the state which has left many unresolved problems. The cultural rights sometimes violate the basic individual rights of the members inside the community like women. The paper further explicates certain cultural norms and practices which violates the rights of women inside the community in the name of culture.

Keywords: women, culture, communities, rights, vulnerable, accomadation

Procedia PDF Downloads 504
14916 Securing Land Rights for Food Security in Africa: An Appraisal of Links Between Smallholders’ Land Rights and the Right to Adequate Food in Ethiopia

Authors: Husen Ahmed Tura

Abstract:

There are strong links between secure land rights and food security in Africa. However, as land is owned by governments, land users do not have adequate legislative protection. This article explores normative and implementation gaps in relation to small-scale farmers’ land rights under the Ethiopia’s law. It finds that the law facilitates eviction of small-scale farmers and indigenous peoples from their land without adequate alternative means of livelihood. It argues that as access to land and other natural resources is strongly linked to the right to adequate food, Ethiopia should reform its land laws in the light of its legal obligations under international human rights law to respect, protect and fulfill the right to adequate food and ensure freedom from hunger.

Keywords: smallholder, secure land rights , food security, right to food, land grabbing, forced evictions

Procedia PDF Downloads 302
14915 Detection of Paenibacillus larvae (American Foulbrood Disease) by the PCR and Culture in the Remains of the Hive Collected at the Bottom of the Colony

Authors: N. Adjlane, N. Haddad

Abstract:

The American foulbrood is one of the most serious diseases that may affect brood of larvae and pupae stages. The causative organism is a gram positive bacterium Paaenibacillus larvae. American foulbrood infected apiaries suffer from severe economic losses, resulting from significant decreases in honeybee populations and honey production. The aim of this study was to detect Paenibacillus larvae in the remains collected at the bottom of the hive from the suspected hives by direct PCR and culture growth. A total of 56 suspected beehive wax debris samples collected in 40 different apiaries located in the central region of Algeria. MYPGP the culture medium is used during all the identifications of the bacterium. After positive results on samples, biochemical confirmation tests (test of catalase, presence hydrolysis of casein) and microscopic (gram stain) are used in order to verify the accuracy of the initial results. The QIAamp DNA Mini Kit is used to identify the DNA of Paaenibacillus larvae. Paaenibacillus larvae were identified in 14 samples out of 16 by the PCR. A suspected culture-negative sample was found positive through evaluation with PCR. This research is for the bacterium Paaenibacillus larvae in the debris of the colony is an effective method for diagnosis of the pathology of American foulbrood.

Keywords: Paenibacillus larvae, honeybee, PCR, microbiological method

Procedia PDF Downloads 406
14914 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria

Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue

Abstract:

The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.

Keywords: personal variables, students, perception, school security

Procedia PDF Downloads 71
14913 FWGE Production From Wheat Germ Using Co-culture of Saccharomyces cerevisiae and Lactobacillus plantarum

Authors: Valiollah Babaeipour, Mahdi Rahaie

Abstract:

food supplements are rich in specific nutrients and bioactive compounds that eliminate free radicals and improve cellular metabolism. The major bioactive compounds are found in bran and cereal sprouts. Secondary metabolites of these microorganisms have antioxidant properties that can be used alone or in combination with chemotherapy and radiation therapy to treat cancer. Biologically active compounds such as benzoquinone derivatives extracted from fermented wheat germ extract (FWGE) have several positive effects on the overall state of human health and strengthen the immune system. The present work describes the discontinuous fermentation of raw wheat germ for FWGE production through the simultaneous culture process using the probiotic strains of Saccharomyces cerevisiae, Lactobacillus plantarum, and the possibility of using solid waste. To increase production efficiency, first to select important factors in the optimization of each fermentation process, using a factorial statistical scheme of stirring fraction (120 to 200 rpm), dilution of solids to solvent (1 to 8-12), fermentation time (16 to 24 hours) and strain to wheat germ ratio (20% to 50%) were studied and then simultaneous culture was performed to increase the yields of 2 and 6 dimethoxybenzoquinone (2,6-DMBQ). Since 2 and 6 dimethoxy benzoquinone were fermented as the main biologically active compound in wheat germ extract, UV-Vis analysis was performed to confirm the presence of 2 and 6 dimethoxy benzoquinone in the final product. In addition, 2,6-DMBQ of some products was isolated in a non-polar C-18 column and quantified using high performance liquid chromatography (HPLC). Based on our findings, it can be concluded that the increase of 2 and 6 dimethoxybenzoquinone in the simultaneous culture of Saccharomyces cerevisiae - Lactobacillus plantarum compared to pure culture of Saccharomyces cerevisiae (from 1.89 mg / g) to 28.9% (2.66 mg / g) Increased.

Keywords: wheat germ, FWGE, saccharomyces cerevisiae, lactobacillus plantarum, co-culture, 2, 6-DMBQ

Procedia PDF Downloads 123
14912 Central American Security Issue: Civil War Legacy and Contemporary Challenges

Authors: Olga Andrianova, Lazar Jeifets

Abstract:

The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.

Keywords: Central America, insecurity, instability, post-war countries, violence

Procedia PDF Downloads 469
14911 Branding Destination for Major Event: A Case Study of Liverpool as the 2008 European Capital of Culture

Authors: Yi-De Liu

Abstract:

Destination branding is a popular practice adopted by many cities in the context of intensified tourism competition. However, branding for major event is a relatively new domain in the studies of destination marketing. Based on a case study of Liverpool as the 2008 European Capital of Culture, the aim of this paper is to explore the effectiveness of the key branding campaign - the ‘Look of the City’ programme. This study looks at quantitative data collected from on-street face-to-face survey. 611 questionnaires were distributed to and collected from local residents, visitors from the immediate hinterland, domestic tourists and overseas visitors. The analysis is done, first by investigating respondents’ impression on the Liverpool 08 brand and the branding campaign, and then by exploring the effects of campaign. The positioning of Liverpool compared with other similar cities is addressed in the end. The final section extracts lessons from this empirical investigation.

Keywords: destination branding, major event, European capital of culture, Liverpool

Procedia PDF Downloads 314
14910 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services

Authors: A. Al Drees, A. Alahmari, R. Almuwayshir

Abstract:

The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.

Keywords: e-banking, account aggregation, security, enterprise development

Procedia PDF Downloads 319
14909 Design of Low-Maintenance Sewer Pump Stations with High-Security Measures for Municipal Applications

Authors: H. V. Smit, V. H. J. de Wet

Abstract:

South African municipalities are dealing with aging and dilapidated infrastructure while faced with challenges in the form of expanding informal settlements, vandalism, theft, and a lack of maintenance which place even more pressure on existing infrastructure. The existing infrastructure was never designed to cater to these challenges, and this becomes evident when evaluating the current state of many municipal sewer pump stations. A need has thus arisen to develop a sewer pump station design concept that will address these challenges and allow for a long-term sustainable solution. This article deals with the design concepts which have been developed for sewer pump stations for an effective reduction in maintenance, improved grit handling, improvement to the operation and maintenance working conditions, and the adoption of high-security design philosophy.

Keywords: high security, low maintenance, municipal application, sewer pump station

Procedia PDF Downloads 98
14908 Proposal for a Monster Village in Namsan Mountain, Seoul: Significance from a Phenomenological Perspective

Authors: Hyuk-Jin Lee

Abstract:

Korea is a country with thousands of years of history, like its neighbors China and Japan. However, compared to China, which is famous for its ancient fantasy novel "Journey to the West", and Japan, which is famous for its monsters, its “monster culture” is not actively used for tourism. The reason is that the culture closest to the present, from the 17th to 20th centuries, was the Joseon Dynasty, when Neo-Confucianism, which suppressed a monster culture, was the strongest. This trend became stronger after Neo-Confucianism became dogmatic in the mid-17th century. However, Korea, which has a history of Taoism for thousands of years, clearly has many literatures on monsters that can be used as tourism resources. The problem is that these data are buried in texts and are unfamiliar even to Koreans. This study examines the possibility of developing them into attractive tourism resources based on the literary records of the so-called 'monsters densely located in Namsan Mountain, located in the center of Seoul' buried in texts from the 16th to early 17th centuries. In particular, we introduce the surprising consistency in the description of the area north of Namsan Mountain in terms of 'feng shui geography', an oriental philosophy, in a contemporary Korean newspaper. Finally, based on the theoretical foundation through the phenomenological classification table of cultural heritage, we examine phenomenologically how important this ‘visualization of imaginary or text-based entities’ is to changes in the perception of specific cultural resources in a society. In addition, we will deeply analyze related cases, including Japan's ninja culture.

Keywords: monster culture, Namsan mountain, neo-confucianism, phenomenology, tourism

Procedia PDF Downloads 18
14907 Post-Soviet Georgia in Visual History Analysis

Authors: Ana Nemsadze

Abstract:

Contemporary era and society are called postindustrial era and postindustrial society and/or informational era and informational society. Today science intends to define concept of information and comprehend informations role and function in contemporary society. Organization of social environment and governance of public processes on the base of information and tools of communication are main characteristics of informational era. This was defined by technological changes which were accomplished in culture in the second half of twentieth century. Today Georgia as an independent state needs to create an informational discourse of the country and therefore it is very important to study political and social cases which accomplished in the country after collapse of the Soviet Union because they start to define the present and the future of the country. The purpose of this study is to analyze political cases of the latest history of Georgia in terms of culture and information, concretely to elucidate which political cases transformed social life of post Soviet Georgia most of all who accomplished these political cases which visual and verbal messages was each political case spread with. The research is conducted on the base of interview. Participants of the interview are people of various specializations. Their professional activity is related to reflections on culture and theme of visual communication. They are philosophers sociologists a journalist media researcher a politologist a painter. The participants of the interview enumerated political cases and characterized them separately. Every expert thinks that declaration of independence of Georgia is the most important fact among all facts which were implemented in Georgia after collapse of the Soviet Union. The research revealed important social and political cases. Most of the cases are related to independence and territorial integrity of the state. Presidents of Georgia Zviad Gamsakhurdia Eduard Shevardnadze Mikheil Saakashvili Catholocos-Patriarch of All Georgia, the Archbishop of Mtskheta Tbilisi and Metropolitan bishop of Bichvinta and Tskhum Abkhazia Ilia II, businessman Bidzina Ivanishvili assumed dominating roles in cases. Verbal narrative of the cases accomplished during Zviad Gamsakhurdia presidential term expresses national freedom and visual part of cases of the same period expresses ruin of social-political structure. Verbal narrative of the cases accomplished during Eduard Sevardnadze presidential term expresses Free State and stability and reestablishment of Georgias political function in international relations and visual part of cases of the same period describes the most important moment of his presidential term and Eduard Shevardnadzes face appears too. Verbal narrative of the cases accomplished during Mikheil Saakashvilis presidential term expresses social renewal and visual part of cases of the same period describes August war and Mikheil Saakashvilis face appears too. The results of the study also reveal other details of visual verbal narrative of political and social cases of post Soviet Georgia. This gives a chance to start further reflection.

Keywords: culture, narrative, post soviet, visual communication

Procedia PDF Downloads 300
14906 The Contemporary Visual Spectacle: Critical Visual Literacy

Authors: Lai-Fen Yang

Abstract:

In this increasingly visual world, how can we best decipher and understand the many ways that our everyday lives are organized around looking practices and the many images we encounter each day? Indeed, how we interact with and interpret visual images is a basic component of human life. Today, however, we are living in one of the most artificial visual and image-saturated cultures in human history, which makes understanding the complex construction and multiple social functions of visual imagery more important than ever before. Themes regarding our experience of a visually pervasive mediated culture, here, termed visual spectacle.

Keywords: visual culture, contemporary, images, literacy

Procedia PDF Downloads 507
14905 A City Adapting to the Mobile Government and Hybrid Culture Established by Khitan-Liao (907-1125): Up-Capital (Shangjing) and its Special Tent Zone

Authors: Robin Ruowei Yang

Abstract:

The Khitan-Liao dynasty (907-1125) was founded by the nomadic Khitan people and showed its peculiarities. This regime not only effectively ruled their own nomads, but also ruled the farming ethnic groups of the Han (漢) and others. It also controlled vast territories that included the northern border domains of China, East Asia, and even Central Asia. Different from the practice of other nomadic people, Khitan-Liao built settlement towns and cities on the Mongolia steppe from beginning of the dynasty, which made the politics, economy and culture of the steppe area develop significantly. In the process of cities’ construction, Khitan-Liao set up five capitals respectively. Except three of them were rebuilt or expanded based on existing cities in agricultural areas, two new capitals were built, namely up-capital (Shangjing) and middle-capital (Zhongjing) in the steppe area. This article takes the up-capital (Shangjing) as an example to investigate a special zone in the capital for settling movable tents which adapted Khitan nomads, especially its nomadic government officials to live in. By using primary Chinese historical records and newly archaeological excavations, this article examines how the special tent zone used by the Khitan rulers, discusses how the Khitan-Liao manifested its hybrid cultural characteristics in urban planning, and its implications in studying the history of Khitan-Liao. The information, discussion and argument presented in this article are also worth considering the influence of urbanization of Khitan-Liao’s urbaization on subsequent dynasties in pre-modern China and Inner Asia.

Keywords: cities on Steppe, special tent zone in cities, Khitan-Liao, hybrid culture

Procedia PDF Downloads 72
14904 Some Issues with Extension of an HPC Cluster

Authors: Pil Seong Park

Abstract:

Homemade HPC clusters are widely used in many small labs, because they are easy to build and cost-effective. Even though incremental growth is an advantage of clusters, it results in heterogeneous systems anyhow. Instead of adding new nodes to the cluster, we can extend clusters to include some other Internet servers working independently on the same LAN, so that we can make use of their idle times, especially during the night. However extension across a firewall raises some security problems with NFS. In this paper, we propose a method to solve such a problem using SSH tunneling, and suggest a modified structure of the cluster that implements it.

Keywords: extension of HPC clusters, security, NFS, SSH tunneling

Procedia PDF Downloads 422
14903 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 137
14902 The Role of Social Media in Growing Small and Medium Enterprises: An Empirical Study in Jordan

Authors: Hanady Al-Zagheer

Abstract:

The purpose of this paper research is to introduce the role of the social media (face book) in growing small and medium enterprises in Jordan, Today’s developments of information technologies are dazzling. Using information technologies results in having advantages in competition, decreasing costs, gaining time, and getting and sharing information. Now it is possible to state that there are different types of usage within the information technologies. Small and medium enterprises have been grown rapidly in recent years and continue to grow. Jordanian females have played a large role in the growth of entrepreneurship and have made an impact on household economics. Virtual storefronts have allowed these women to balance roles assigned by tradition and culture while becoming successful providers. If you have a small business with a limited public relations and advertising budget, Facebook can be a cost effective way to promote your services because opening an account is free. However, this can work against you if you do not maintain the page. A Face book page without frequent updates can destroy your brand value and image. According to a 2009 Computerworld article by Lisa Hoover, having a Facebook page that looks abandoned is worse than having no page at all. You might need to hire someone or pay an employee to update your business’s Facebook page.

Keywords: social media, social media small, medium enterprises, Jordan

Procedia PDF Downloads 318
14901 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 210
14900 The Contribution of the Livestock Marketing Programme in Improving Household Food Security in Communal Areas of Umzimkhulu Local Municipality, Kwa-Zulu Natal

Authors: Sibongiseni Peacock, Denver Naidoo, Sikhalazo Dube

Abstract:

The study investigates the impact of the National Red Meat Development Programme on household food security in rural areas of uMzimkhulu. Self-administered questionnaires were employed to gather data from 77 smallholder beef farmers participating in the St. Paul feedlot project. Data analysis utilized the Household Food Insecurity Access Scale (HFIAS) developed by USAID to assess the household food security status of St. Paul feedlot beneficiaries, with descriptive statistics employed for result analysis. Findings indicate that the majority (80.50%) of beneficiaries experienced food insecurity, while (19.50%) were classified as food secure, with most participants falling within the category of moderate food insecurity. Food insecurity predominantly stemmed from challenges faced by farmers unable to sell their cattle or whose cattle were not market-ready due to bureaucratic obstacles hindering the programme. Farmers identified feed shortages as the primary constraint, resulting in missed income opportunities. These findings underscore the critical need to address feed challenges and bureaucratic barriers to enhance the efficacy of the National Red Meat Development Programme in promoting household food security in rural areas.

Keywords: National Red Meat Development, household food security, St. Paul feedlot, livestock, HFIAS

Procedia PDF Downloads 44