Search results for: public order and security act
19697 Federal Bureau of Investigation Opposition to German Nationalist Organizations in the United States (1941-45)
Authors: Yaroslav Alexandrovich Levin
Abstract:
In modern research on the history of the United States in World War II, it is quite popular to study the opposition of the American special services and, in particular, the Federal Bureau of Investigation (FBI) to various organizations of the German diasporas in new historical conditions. The appeal to traditional methods of historical research, comparative studies, and the principles of historicism will make it possible to more accurately trace the process of tightening the counterintelligence work of the Bureau and the close connection of concerns about the involvement of public organizations in the intelligence activities of the enemy. The broadcast of nationalist ideas by various communities of Germans under the auspices of their governments quickly attracted the attention of the FBI, which is in the process of consolidating its powers as the main US counterintelligence service. At the same time, the investigations and trials conducted by the John Edgar Hoover Department following these investigations often had an openly political color and increasingly consolidated the beginning of a political investigation in this service. This practice and its implementation ran into a tough contradiction between the legal norms of America, which proclaimed "democratic values," the right to freedom of speech, and the need to strengthen the internal security of the state and society in wartime. All these processes and the associated nuances and complexities are considered in specific examples of the work of federal agents against various pro-German organizations in the period 1941-45.Keywords: World War II, internal security, countering extremism, counterintelligence, political investigation, FBI
Procedia PDF Downloads 8619696 Risky Driving Behavior among Bus Driver in Jakarta
Authors: Ratri A. Benedictus, Felicia M. Yolanda
Abstract:
Public transport is a crucial issue for capital city in developing country, such as Jakarta. Inadequate number and low quality of public transport services resulting personal vehicles as the main option. As a result, traffic jams are getting worse in Jakarta. The low quality of public transport, particularly buses, compounded by the risk behavior of the driver. Traffic accidents involving public bus in Jakarta were often the case, even result in fatality. The purpose of this study is to get a description of risk behavior among the public bus drivers in Jakarta. 132 bus drivers become respondent of this study. Risky Driving Behavior scale of Dorn were used. Data were analyzed using descriptive statistics. 51.5% of respondents felt often showing risky behavior while on driving. The highest type of risky driving behavior is still using the unsafe bus (62%). Followed by trespass the bus line (30%), over speed (21%), violate the road signs (15%) and driving with unhealthy physical condition (4%). Results of this study suggested that high understanding of the bus drivers on their risk behaviors have not lead to the emergence of safe driving behavior. Therefore, together with technical engineering and instrumentation work intervention over this issue, psychological aspects also need to be considered, such as: risk perception, safety attitude,safety culture, locus of control and Fatalism.Keywords: bus driver, psychological factors, public transportation, risky driving behavior
Procedia PDF Downloads 36219695 Emotional Security in Relation to Students' Emotional Efficiency
Authors: Ibtisam Mahmoud Mohammed Sultan
Abstract:
The present research aimed to identify the level of both emotional and emotional competence among students in Tikrit University aimed to know the assumptions in statistical significance for both variables as gender variables (m-f) and specialty (scientific-humanistic), as research to learn what Relationship between emotional safety and efficiency alanfaalet Tikrit University students. The researcher built emotional security measure (54) as built measure emotional competence (46), as the researcher extract full alsaykomtrih characteristics of both scales. The research sample consisted of (600) students selected by the random way and applying the scales on a basic search sample and processed statistical data using a variety of methods, including statistical test (test T.) and Pearson correlation coefficient, the researcher found a set of results. The following: 1. that the Tikrit University students possess a high level of emotional security. 2. to safely enjoy passionate males more than females. 3. that there is no difference between students of scientific and humanitarian specialization in variable emotional security. 4. that the Tikrit University students enjoy a high level of emotional competence. 5. the female-male outperforming in emotional competence level. 6. the humanitarian specialization students Excel in emotional competence for those of specialty. 7. the existence of a positive correlation between variables. Through search results, the researcher has developed a set of conclusions, proposals, and recommendations.Keywords: relation, emotional security, students, efficiency
Procedia PDF Downloads 12019694 Role of Judiciary in Developing Countries
Authors: Amir Shafiq, Asif Shahzad, Shabbar Mehmood, Muhammad Saeed, Hamid Mustafa
Abstract:
Administration of justice in a society is evolutionary process. In pre-modern societies vital organs that we consider separate today i.e. legislation, implementation and adjudication were controlled by a King, the sovereign authority. Whereas now it is recognized that Development of a country revolves in seven arenas i.e. Civil Society, Political Society, Economic Society, Legislature, Judiciary, Executive & Bureaucracy. Each society whether developing or developed, has need of institutions and structures that can resolve difference of opinions of private or public nature between contending parties. Administration of justice has a key-role in the development of the society. Through this paper, it is to highlight that an independent judiciary having the support of public opinion therefore is inevitable to wriggle out from such problems in order to restore and protect the fundamental rights, constitution and democratic political system in third world countries like Pakistan.Keywords: role of judiciary, developing countries, judicial activism, present scenario
Procedia PDF Downloads 39519693 The Pro-Active Public Relations of Faculty of Management Science, Suan Sunandha Rajabhat University
Authors: Kanyakorn Sujarittnetikarn, Surangkana Pipatchokchaiyo
Abstract:
The objective of this research was to study the pro-active public relations of according to the characteristic of Faculty of Management Science, Suan Sunandha Rajabhat University. The sample group for this research report was students from 4 year curriculum and continued / extended curriculum, made a random distribution proportion as follows: a group of 400 students who are working while studying and a group of non – working students. The tools used in this research were questionnaires, asking about the acknowledgement of public relations information of Faculty of Management Science in the academic year 2007. The result found that friends were the most influential in choosing the education institute. The differences of method to receive information of non-working student and working student were the entertainment magazine which was interested mostly by working students and they preferred to search the information on the website after 24:00 O’clock. However, the non-working students preferred 21:00-24:00 O’clock the most.Keywords: development guidelines systems, faculty of management science, public relation planning, proactive public relations
Procedia PDF Downloads 29019692 Public Transport Assignment at Adama City
Authors: Selamawit Mulubrhan Gidey
Abstract:
Adama city, having an area of 29.86 km2, is one of the main cities in Ethiopia experiencing rapid growth in business and construction activities which in turn with an increasing number of vehicles at an alarming rate. For this reason, currently, there is an attempt to develop public transport assignment modeling in the city. Still, there is a huge gap in developing public transport assignments along the road segments of the city with operational and safety performance due to high traffic volume. Thus, the introduction of public transport assignment modeling in Adama City can have a massive impact on the road safety and capacity problem in the city. City transport modeling is important in city transportation planning, particularly in overcoming existing transportation problems such as traffic congestion. In this study, the Adama City transportation model was developed using the PTV VISUM software, whose transportation modeling is based on the four-step model of transportation. Based on the traffic volume data fed and simulated, the result of the study shows that the developed model has better reliability in representing the traffic congestion conditions in Adama city, and the simulation clearly indicates the level of congestion of each route selected and thus, the city road administrative office can take managerial decisions on public transport assignment so as to overcome traffic congestion executed along the selected routes.Keywords: trip modelling, PTV VISUM, public transport assignment, congestion
Procedia PDF Downloads 4619691 Control and Control Systems of Administration in Nigeria
Authors: Inuwa Abdu Ibrahim
Abstract:
Public officials are required to posses certain values to adequately protect public interest, by being leaders that are servants of the people. The reality in Nigeria is that leaders rule as masters of the people rather than servants. The paper looked at control and control systems of administration in Nigeria, its resultant consequences and ways of achieving true control of administrators and administration. Secondary source of data was adopted for the research. It concludes that the keys to administrative efficiency and effectiveness through control are implementation of the already existing procedures and laws, as well as commitment on the part of public officials.Keywords: Accountability, Fraud, Administration, Nigeria
Procedia PDF Downloads 36919690 An Evaluation of Medical Waste in Health Facilities through Data Envelopment Analysis (DEA) Method: Turkey-Amasya Public Hospitals Union Model
Authors: Murat Iskender Aktaş, Sadi Ergin, Rasime Acar Aktaş
Abstract:
In the light of fast-paced changes and developments in the health sector, the Ministry of Health started a new structuring with decree law numbered 663 within the scope of the Project of Transformation in Health. Accordingly, hospitals should ensure patient satisfaction through more efficient, more effective use of resources and sustainable finance by placing patients in the centre and should operate to increase efficiency to its maximum level while doing these. Within this study, in order to find out how efficient the hospitals were in terms of medical waste management between the years 2011-2014, the data from six hospitals of Amasya Public Hospitals Union were evaluated separately through Data Envelopment Analysis (DEA) method. First of all, input variables were determined. Input variables were the number of patients admitted to polyclinics, the number of inpatients in clinics, the number of patients who were operated and the number of patients who applied to the laboratory. Output variable was the cost of medical wastes in Turkish liras. Each hospital’s total medical waste level before and after public hospitals union; the amounts of average medical waste per patient admitted to polyclinics, per inpatient in clinics, per patient admitted to laboratory and per operated patient were compared within each group. In addition, average medical waste levels and costs were compared for Turkey in general and Europe in general. Paired samples t-test was used to find out whether the changes (increase-decrease) after public hospitals union were statistically significant. The health facilities that were unsuccessful in terms of medical waste management before and after public hospital union and the factors that caused this failure were determined. Based on the results, for each health facility that was ineffective in terms of medical waste management, the level of improvement required for each input was determined. The results of the study showed that there was an improvement in medical waste management applications after the health facilities became a member of public hospitals union; their medical waste levels were lower than the average of Turkey and Europe while the averages of cost of disposal were the highest.Keywords: medical waste management, cost of medical waste, public hospitals, data envelopment analysis
Procedia PDF Downloads 41619689 Performance Effects of Demergers in India
Authors: Pavak Vyas, Hiral Vyas
Abstract:
Spin-offs commonly known as demergers in India, represents dismantling of conglomerates which is a common phenomenon in financial markets across the world. Demergers are carried out with different motives. A demerger generally refers to a corporate restructuring where, a large company divests its stake in in its subsidiary and distributes the shares of the subsidiary - demerged entity to the existing shareholders without any consideration. Demergers in Indian companies are over a decade old phenomena, with many companies opting for the same. This study examines the demerger regulations in Indian capital markets and the announcement period price reaction of demergers during year 2010-2015. We study total 97 demerger announcements by companies listed in India and try to establish that demergers results into abnormal returns for the shareholders of the parent company. Using event study methodology we have analyzed the security price performance of the announcement day effect 10 days prior to announcement to 10 days post demerger announcement. We find significant out-performance of the security over the benchmark index post demerger announcements. The cumulative average abnormal returns range from 3.71% on the day of announcement of a private demerger to 2.08% following 10 days surrounding the announcement, and cumulative average abnormal returns range from 5.67% on the day of announcement of a public demerger to 4.15% following10 days surrounding the announcement.Keywords: demergers, event study, spin offs, stock returns
Procedia PDF Downloads 30119688 A Review of Urban Placemaking Assessment Frameworks
Authors: Amal Abdou, Yasser ElSayed, Nora Selim
Abstract:
Public urban spaces are an essential component in any urban settlement. They are quite important in enhancing the quality of urban life while offering social, health, environmental and economic benefits to a city and its residents. Place-making assessment of public urban spaces has been one of the major guiding principles for urban planning and policymaking, of which the definition and evaluation have become the crucial research topic. It is increasingly being essential to mitigate the undesirable impacts of urbanization in cities while improving public urban space’s resilience to environmental, social, and economic changes. Globally, several place-making assessment tools (PATs) have been developed to make such informed decision-making. They act as a catalyst to increase market demand for sustainable products and services by providing a mechanism for recognizing excellence. Assessing how placemaking can positively contribute to urban environments is critical to inform both the continued development of the place and the way placemaking is done as a practice. Therefore, this study aims to review different themes for assessing urban placemaking in public urban spaces.Keywords: urban placemaking, public urban spaces, placemaking assessment, literature review
Procedia PDF Downloads 10019687 The Role of British Public Opinion in the Process of the Great Britain’s Involvement in the Crimean War
Authors: Aysen Muderrisoglu
Abstract:
As a result of the policies constituted and pursued by Russia which aimed to gain territory and power at Ottoman expense, Crimean War broke out in 1853. Nevertheless, the Eastern policies of Russia were in contradiction with the interests of Great Britain which was the great power of the era. Yet, it did hesitate to be confronted with Russian on its route to India, so the Ottoman territorial integrity was defended. In that period, Tzar Nicholas II, to begin with, tried to eliminate a probable opposition coming from the British side, and then tried its chance to build up cooperation with Britain on the territories of the sick man. As a more positive relation was being observed between these two states before the Crimean War, Great Britain initially had adopted a neutral policy. However, in the end, Britain entered the war against Russia due to the efforts of the opposing side in the British Parliament and the rising pressure of the public opinion. The article aims to examine the role of British public opinion in the process of Great Britain’s Involvement in this war. Also, the article will try to find an answer to the following question: to what extent did the public opinion become effective on the foreign policy-making of Great Britain before the war?Keywords: British press, Crimean war, Great Britain, public opinion
Procedia PDF Downloads 17219686 Robust Data Image Watermarking for Data Security
Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan
Abstract:
In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms
Procedia PDF Downloads 51519685 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques
Authors: John Onyima, Ikechukwu Ezepue
Abstract:
Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection
Procedia PDF Downloads 30819684 The Influence of the Islamic State (IS) on India: Recent Developments and Challenges
Authors: Alvite Singh Ningthoujam
Abstract:
The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively.Keywords: India, Islamic State, Muslim, Security
Procedia PDF Downloads 37619683 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 18719682 The Management of Company Directors Conflicts of Interest in Large Corporations and the Issue of Public Interest
Authors: Opemiposi Adegbulu
Abstract:
The research investigates the existence of a public interest consideration or rationale for the management of directors’ conflicts of interest within large public corporations. This is conducted through extensive literature review and theories on the definition of conflicts of interest, the firm and purposes of the fiduciary duty of loyalty under which the management of these conflicts of interest find their foundation. Conflicts of interest is an elusive, diverse and engaging subject, a cross-cutting problem of governance which involves all levels of governance, ranging from local to global, public to corporate or financial sectors. It is a common issue that affects corporate governance and corporate culture, having a negative impact on the reputation of corporations and their trustworthiness. It is clear that addressing this issue is imperative for good governance of corporations as they are increasingly becoming and are powerful global economies with significant power and influence in the society. Similarly, the bargaining power of these powerful corporations has been recognised by international organisations such as the UN and the OECD. This is made evident by the increasing calls and push for greater responsibility of these corporations for environmental and social disasters caused by their corporate activities and their impact in various parts of the world. Equally, in the US, the Sarbanes-Oxley Act like other legislation and regulatory efforts made to manage conflicts of interest linked to corporate governance, in many countries indicates that there is a (global) public interest in the maintenance of the orderly functioning of commerce. Consequently, the governance of these corporations is tremendously pivotal to the society as it touches upon a key aspect of the good functioning of society. This is because corporations, particularly large international corporations can be said to be the plumbing of the global economy. This study will employ theoretical, doctrinal and comparative methods. The research will make use largely of theory-guided methodology and theoretical framework – theories of the firm, public interest, regulation, conflicts of interest in general, directors’ conflicts of interest and corporate governance. Although, the research is intended to be narrowed down to the topic of conflicts of interest in corporate governance, the subject of company directors’ duty of loyalty and the management of conflicts of interest, an examination of the history, origin and typology of conflicts of interest in general will be carried out in order to identify some specific challenges to understanding and identifying these conflicts of interest; origin, diverging theories, psychological barrier to definition, similarities with public sector conflicts of interest due to the notions of corrosion of trust, the effect on decision-making and judgment, “being in a particular kind of situation”, etc. The result of this research will be useful and relevant in the identification of the rationale for the management of directors’ conflicts of interest, contributing to the understanding of conflicts of interest in the private sector and the significance of public interest in corporate governance of large corporations.Keywords: conflicts of interest, corporate governance, corporate law, directors duty of loyalty, public interest
Procedia PDF Downloads 37019681 Explaining the Acceptance and Adoption of Digital Technologies: Digital Government in Saudi Arabia
Authors: Mohammed Alhamed
Abstract:
This research examines the factors influencing the acceptance and adoption of digital technologies in Saudi Arabia’s government sector by focusing on government employees' attitudes toward digital transformation initiatives. As digital technologies increasingly integrate into public sectors worldwide, there is a requirement to enhance citizen empowerment and government-public interactions as well as understand their impact in unique socio-political contexts like Saudi Arabia. The study aims to explore user attitudes, identify the main challenges, and investigate factors that affect the intention to use digital applications in governmental settings. The study employs a mixed-methods approach by combining quantitative and qualitative data collection to provide a comprehensive view of digital government application adoption. Data was collected through two online surveys administered to 870 government employees and face-to-face semi-structured interviews with 24 participants. This dual approach allows for both statistical analysis and thematic exploration, which provides a deeper understanding of user behaviour, perceived benefits, challenges and attitudes toward these digital applications. Quantitative data were analyzed to identify significant variables influencing adoption, while qualitative responses were coded thematically to uncover recurring themes related to user trust, security, usability and socio-political influences. The results indicate that digital government applications are largely valued for their ability to increase efficiency and accessibility and streamline processes like online documentation and inter-departmental coordination. However, the study highlights that security, privacy, and confidentiality concerns constitute substantial barriers to adoption, with participants calling for stronger cybersecurity measures and data protection policies. Moreover, usability emerged as a key theme that intuitively interfaces in encouraging adoption as respondents emphasized the importance of user-friendly. Additionally, the study found that Saudi Arabia’s unique cultural and organizational dynamics impact acceptance levels with factors like hierarchical structures and varying levels of digital literacy shaping user attitudes. A significant limitation of the study is its exclusive focus on government employees, which may limit the generalizability of the findings to other stakeholder groups, such as the general public. Despite this, the study offers valuable views for policymakers. This, in turn, suggests best practices and guidelines that could enhance the design and implementation of digital government projects. By addressing the identified barriers and leveraging the factors that drive adoption, the study underscores the potential for digital government initiatives to improve efficiency, transparency and responsiveness in Saudi Arabia's public sector. Furthermore, these findings may provide a roadmap for similar countries aiming to adopt digital government solutions within comparable socio-political and economic contexts.Keywords: acceptance, adoption, digital technologies, digital government, Saudi Arabia
Procedia PDF Downloads 1919680 A Sociological Investigation on the Population and Public Spaces of Nguyen Cong Tru, a Soviet-Style Collective Housing Complex in Hanoi in Regards to Its New Community-Focused Architectural Design
Authors: Duy Nguyen Do, Bart Julien Dewancker
Abstract:
Many Soviet-style collective housing complexes (also known as KTT) were built since the 1960s in Hanoi to support the post-war population growth. Those low-rise buildings have created well-knitted, robust communities, so much to the point that in most complexes, all families in one housing block would know each other, occasionally interact and provide supports in need. To understand how the community of collective housing complexes have developed and maintained in order to adapt their advantages into modern housing designs, the study is executed on the site of Nguyen Cong Tru KTT. This is one of the oldest KTT in Hanoi, completed in 1954. The complex also has an unique characteristic that is closely related to its community: the symbiotic relationship with Hom – a flea market that has been co-developing with Nguyen Cong Tru KTT since its beginning. The research consists of three phases: the first phase is a sociological investigation with Nguyen Cong Tru KTT’s current residents and a site survey on the complex’s economic and architectural characteristics. In the second phase, the collected data is analyzed to find out people’s opinions with the KTT’s concerning their satisfaction with the current housing status, floor plan organization, community, the relationship between the KTT’s dedicated public spaces with the flea market and their usage. Simultaneously, the master plan and gathered information regarding current architectural characteristics of the complex are also inspected. On the third phase, the analyses’ results will provide information regarding the issues, positive trends and significant historical features of the complex’s architecture in order to generate suitable proposals for the redesigning project of Nguyen Cong Tru KTT, a design focused on vitalizing modern apartments’ communities.Keywords: collective house community, collective house public space, community-focused, redesigning Nguyen Cong Tru KTT, sociological investigation
Procedia PDF Downloads 36419679 A Hybrid Digital Watermarking Scheme
Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif
Abstract:
Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.Keywords: watermarking, image processing, DCT, LSB, PSNR
Procedia PDF Downloads 5119678 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 15719677 Formal Verification for Ethereum Smart Contract Using Coq
Authors: Xia Yang, Zheng Yang, Haiyong Sun, Yan Fang, Jingyu Liu, Jia Song
Abstract:
The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts.Keywords: smart contract, formal verification, Ethereum, Coq
Procedia PDF Downloads 69419676 X-Ray Dynamical Diffraction 'Third Order Nonlinear Renninger Effect'
Authors: Minas Balyan
Abstract:
Nowadays X-ray nonlinear diffraction and nonlinear effects are investigated due to the presence of the third generation synchrotron sources and XFELs. X-ray third order nonlinear dynamical diffraction is considered as well. Using the nonlinear model of the usual visible light optics the third-order nonlinear Takagi’s equations for monochromatic waves and the third-order nonlinear time-dependent dynamical diffraction equations for X-ray pulses are obtained by the author in previous papers. The obtained equations show, that even if the Fourier-coefficients of the linear and the third order nonlinear susceptibilities are zero (forbidden reflection), the dynamical diffraction in the nonlinear case is related to the presence in the nonlinear equations the terms proportional to the zero order and the second order nonzero Fourier coefficients of the third order nonlinear susceptibility. Thus, in the third order nonlinear Bragg diffraction case a nonlinear analogue of the well-known Renninger effect takes place. In this work, the 'third order nonlinear Renninger effect' is considered theoretically.Keywords: Bragg diffraction, nonlinear Takagi’s equations, nonlinear Renninger effect, third order nonlinearity
Procedia PDF Downloads 38519675 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis
Authors: Sarthak Mishra, Astha Sinha
Abstract:
There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats
Procedia PDF Downloads 23219674 Securing Land Rights for Food Security in Africa: An Appraisal of Links Between Smallholders’ Land Rights and the Right to Adequate Food in Ethiopia
Authors: Husen Ahmed Tura
Abstract:
There are strong links between secure land rights and food security in Africa. However, as land is owned by governments, land users do not have adequate legislative protection. This article explores normative and implementation gaps in relation to small-scale farmers’ land rights under the Ethiopia’s law. It finds that the law facilitates eviction of small-scale farmers and indigenous peoples from their land without adequate alternative means of livelihood. It argues that as access to land and other natural resources is strongly linked to the right to adequate food, Ethiopia should reform its land laws in the light of its legal obligations under international human rights law to respect, protect and fulfill the right to adequate food and ensure freedom from hunger.Keywords: smallholder, secure land rights , food security, right to food, land grabbing, forced evictions
Procedia PDF Downloads 31119673 Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems
Authors: M. Mutemwa
Abstract:
A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC.Keywords: cybersecurity operation centre, incident response, priority matrix, procedures and policies
Procedia PDF Downloads 15519672 Central American Security Issue: Civil War Legacy and Contemporary Challenges
Authors: Olga Andrianova, Lazar Jeifets
Abstract:
The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.Keywords: Central America, insecurity, instability, post-war countries, violence
Procedia PDF Downloads 47319671 Official Secrecy and Confidentiality in Tax Administration and Its Impact on Right to Access Information: Nigerian Perspectives
Authors: Kareem Adedokun
Abstract:
Official secrecy is one of the colonial vestiges which upholds non – disclosure of essential information for public consumption. Information, though an indispensable tool in tax administration, is not to be divulged by any person in an official duty of the revenue agency. As a matter o fact, the Federal Inland Revenue Service (Establishment) Act, 2007 emphasizes secrecy and confidentiality in dealing with tax payer’s document, information, returns and assessment in a manner reminiscent of protecting tax payer’s privacy in all situations. It is so serious that any violation attracts criminal sanction. However, Nigeria, being a democratic and egalitarian state recently enacted Freedom of Information Act which heralded in openness in governance and takes away the confidentialities associated with official secrets Laws. Official secrecy no doubts contradicts the philosophy of freedom of information but maintaining a proper balance between protected rights of tax payers and public interest which revenue agency upholds is an uphill task. Adopting the Doctrinal method, therefore, the author of this paper probes into the real nature of the relationship between taxpayers and Revenue Agencies. It also interfaces official secrecy with the doctrine of Freedom of Information and consequently queries the retention of non – disclosure clause under Federal Inland Revenue Service (Establishment) Act (FIRSEA) 2007. The paper finds among others that non – disclosure provision in tax statutes particularly as provided for in FIRSEA is not absolute; so also is the constitutional rights and freedom of information and unless the non – disclosure clause finds justification under any recognized exemption provided under the Freedom of Information Act, its retention is antithesis to democratic ethos and beliefs as it may hinder public interest and public order.Keywords: confidentiality, information, official secrecy, tax administration
Procedia PDF Downloads 34219670 Design of Low-Maintenance Sewer Pump Stations with High-Security Measures for Municipal Applications
Authors: H. V. Smit, V. H. J. de Wet
Abstract:
South African municipalities are dealing with aging and dilapidated infrastructure while faced with challenges in the form of expanding informal settlements, vandalism, theft, and a lack of maintenance which place even more pressure on existing infrastructure. The existing infrastructure was never designed to cater to these challenges, and this becomes evident when evaluating the current state of many municipal sewer pump stations. A need has thus arisen to develop a sewer pump station design concept that will address these challenges and allow for a long-term sustainable solution. This article deals with the design concepts which have been developed for sewer pump stations for an effective reduction in maintenance, improved grit handling, improvement to the operation and maintenance working conditions, and the adoption of high-security design philosophy.Keywords: high security, low maintenance, municipal application, sewer pump station
Procedia PDF Downloads 10919669 Web-Based Tools to Increase Public Understanding of Nuclear Technology and Food Irradiation
Authors: Denise Levy, Anna Lucia C. H. Villavicencio
Abstract:
Food irradiation is a processing and preservation technique to eliminate insects and parasites and reduce disease-causing microorganisms. Moreover, the process helps to inhibit sprouting and delay ripening, extending fresh fruits and vegetables shelf-life. Nevertheless, most Brazilian consumers seem to misunderstand the difference between irradiated food and radioactive food and the general public has major concerns about the negative health effects and environmental contamination. Society´s judgment and decision making are directly linked to perceived benefits and risks. The web-based project entitled ‘Scientific information about food irradiation: Internet as a tool to approach science and society’ was created by the Nuclear and Energetic Research Institute (IPEN), in order to offer an interdisciplinary approach to science education, integrating economic, ethical, social and political aspects of food irradiation. This project takes into account that, misinformation and unfounded preconceived ideas impact heavily on the acceptance of irradiated food and purchase intention by the Brazilian consumer. Taking advantage of the potential value of the Internet to enhance communication and education among general public, a research study was carried out regarding the possibilities and trends of Information and Communication Technologies among the Brazilian population. The content includes concepts, definitions and Frequently Asked Questions (FAQ) about processes, safety, advantages, limitations and the possibilities of food irradiation, including health issues, as well as its impacts on the environment. The project counts on eight self-instructional interactive web courses, situating scientific content in relevant social contexts in order to encourage self-learning and further reflections. Communication is a must to improve public understanding of science. The use of information technology for quality scientific divulgation shall contribute greatly to provide information throughout the country, spreading information to as many people as possible, minimizing geographic distances and stimulating communication and development.Keywords: food irradiation, multimedia learning tools, nuclear science, society and education
Procedia PDF Downloads 24919668 Second Order Journalism: A Study of Selected Niche Authorities on Facebook and Twitter
Authors: Yvonne Dedzo
Abstract:
Social media has become a powerful tool in bridging the distance between individuals regardless of their location. It has become a convenient platform for public discussion and, consequently, generated the phenomenon of citizen journalists who have become both proactive and reactive participants in the dissemination of news, information and other epochal and historical events. This phenomenon has fueled the growth of niche authorities who deliver exceptional democratically consequential information online. This study, therefore, investigates how some selected niche authorities maintain their status on social media. Using the selective processes theory, the study further interrogates the information shared by niche authorities and further analyses the extent to which a public interest-altruistic motive or personal interest-self-serving motive drives their agenda of new sharing and usage. Through cyber-ethnography and, qualitative content analysis and semi-structured interviews, data was gathered and analysed from the posts of two purposely selected niche authorities on Facebook and Twitter. The findings indicate that niche authorities maintain their status by being consistent, prompt, informative, resourceful and interactive in their postings on the social media platform. The study also discovered that even though niche authorities are motivated by both public interest-altruism and interest-self-serving, the latter had a higher of motivation than the former.Keywords: social medida, citizen journalist, niche authorities, selective processes theory
Procedia PDF Downloads 69