Search results for: European security
3502 Civic Participation as a Promoter of Active Ageing in Europe
Authors: Andrea Vega-Tinoco, Ana I. Gil-Lacruz, Marta Gil-Lacruz
Abstract:
The main objective of this research is to acknowledge whether civic participation affects the well-being of the elderly, thus being a key activity of active aging. It is also of interest to recognize any differences among genders, generational cohorts or country of residence. If a positive relationship is found between civic participation and well-being, the actions that promote this participation will benefit the quality of life of senior citizens. Otherwise, independent action must be taken in the improvement of social and human capital. The sample consists of approximately 50.000 individuals from the European Social Survey (2002-2016). Only individuals born before 1965 in 15 European countries were considered. The sample was distributed according to gender, year of birth, country, level of studies and ESS wave to form pseudo-panel data cohorts, leaving a total of 1.318 observations. The data were analyzed through a Cross-Lagged Model using Fixed-Effects. A bidirectional association is observed between the civic participation and well-being variables. However, participating in the past seems to have a higher impact on today’s health, happiness and life satisfaction than the other way around. Furthermore, 26% of the respondents expressed to be satisfied with their life, 27% to be happy and 57% to have good health. On the other hand, 49% have participated civically in the last year, being the most common activities: signing petitions, boycotting products and volunteer work in non-political organizations. A slight trend of BabyBoomers and men towards greater participation can be observed, as well as a higher impact of this participation on their well-being. In addition, international differences exhibit a stronger relation for Nordic, East European and Mediterranean countries. The given results support the hypothesis that civic participation is a promoter of well-being for the elderly. This paper positively highlights the activity of involving in political and non-political organizations, as well as wearing badges. At any rate, almost all forms of civic participation show a positive relationship with well-being and should therefore be promoted, although differences between countries must be taken into consideration.Keywords: active aging, civic participation, Europe, well-being
Procedia PDF Downloads 843501 The Need for Including Hepatitis a Vaccine in Routine Childhood Immunization Programs in Europe as a Response to the Influx of Refugees from the Middle East and North Africa (MENA) Regions
Authors: S. Ramia, N. Melhem, K. Kreidieh
Abstract:
The world is facing an unprecedented displacement crisis. Recently, over 1.1 million asylum seekers have been granted protection status in the European Union (EU). The majority of these asylum seekers were from countries of the Middle East and North Africa (MENA) region.This influx carries with it a potential introduction of infectious diseases that have been eliminated in the EU, which poses a challenge for EU health authorities. Compared to MENA region countries where Hepatitis A Virus (HAV) endemicity is high to intermediate, member states of the EU show very low (Western Europe) to low (Eastern Europe) levels of HAV endemicity. Because of this situation, there is an ongoing public health concern in high-income countries, like members of the EU, that many adults remain susceptible to HAV outbreaks. The overwhelming majority of the EU members’ states do not include HAV vaccine in their immunization calendars. Hence, this paper urgently calls for the implementation of new policies regarding HAV in EU members’ states.Keywords: European union, hepatitis A, MENA region refugees, vaccine preventable diseases
Procedia PDF Downloads 2803500 “Friction Surfaces” of Airport Emergency Plan
Authors: Jakub Kraus, Vladimír Plos, Peter Vittek
Abstract:
This article focuses on the issue of airport emergency plans, which are documents describing reactions to events with impact on aviation safety or aviation security. The article specifically focuses on the use and creation of emergency plans, where could be found a number of disagreements between different stakeholders, for which the airport emergency plan applies. Those are the friction surfaces of interfaces, which is necessary to identify and ensure them smooth process to avoid dangerous situations or delay.Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system, friction surfaces of airport emergency plan, interfaces of processes
Procedia PDF Downloads 5223499 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect
Authors: Debasish Nandy
Abstract:
India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.Keywords: bilateral, diplomacy, infiltration, terrorism
Procedia PDF Downloads 5413498 Socialist Ideology in Africa: A Comparative Study of Pre and Post Socialism
Authors: Haymanot Gebre-Amlak, Selamawit Gebre-Amlak
Abstract:
Since its original declaration in the 18th century, Karl Marx and Friedrich Engels's Communist Manifesto has become one of the most influential political tracts. Socialism is a political path that leads towards communism by fostering a cooperative economy through the creation of cooperative enterprises, common ownership, state ownership, or shared equity. The ultimate objective of communism is to bring everyone working toward the same collective goal of a healthy, happy, and free society. The European establishment of 19-century colonial rule over the continent of Africa reinforced inflows of European investment and forced a profound change in the operation of labor and land markets. The colonial era and forced labor schemes in Africa lasted for several decades. When exiting from colonialism, these African countries were attracted to socialism’s ideology to bridge the social gap and freedom to their society. In this paper, we compare a pre and post socialist ideology and the impact in various African countries. We analyse the different aspects, which led to inconsistent outcomes. Our finding indicates that while they have some facets in common, each African country had a unique interpretation and influence from the socialist ideology.Keywords: African politics, socialism in Africa, African history, Africa
Procedia PDF Downloads 1673497 Regulating Information Asymmetries at Online Platforms for Short-Term Vacation Rental in European Union– Legal Conondrum Continues
Authors: Vesna Lukovic
Abstract:
Online platforms as new business models play an important role in today’s economy and the functioning of the EU’s internal market. In the travel industry, algorithms used by online platforms for short-stay accommodation provide suggestions and price information to travelers. Those suggestions and recommendations are displayed in search results via recommendation (ranking) systems. There has been a growing consensus that the current legal framework was not sufficient to resolve problems arising from platform practices. In order to enhance the potential of the EU’s Single Market, smaller businesses should be protected, and their rights strengthened vis-à-vis large online platforms. The Regulation (EU) 2019/1150 of the European Parliament and of the Council on promoting fairness and transparency for business users of online intermediation services aims to level the playing field in that respect. This research looks at Airbnb through the lenses of this regulation. The research explores key determinants and finds that although regulation is an important step in the right direction, it is not enough. It does not entail sufficient clarity obligations that would make online platforms an intermediary service which both accommodation providers and travelers could use with ease.Keywords: algorithm, online platforms, ranking, consumers, EU regulation
Procedia PDF Downloads 1303496 Reduction of Process of Evidence in Specific Forms of Criminal Proceeding: Problems and Risks
Authors: Filip Ščerba, Veronika Pochylá
Abstract:
Performing of the acts within criminal proceedings usually takes too long and thus this phenomenon can be regarded as one of the most burning problems which have plagued the criminal justice not only in the Czech Republic but at least all over Europe for the last few decades. This problem obviously has to be dealt with and thus the need to tackle this issue has resulted in the trend which is sometimes called Criminal Justice Rationalization, i.e. introducing and enforcing methods supporting the increase in efficiency of the criminal justice in order to make the criminal proceedings shorter and administrative procedure easier. This resulted in the introduction of institutes such as e.g. diversions in criminal proceedings or other forms of shortened pre-trial proceedings, which may be used primarily for dealing with less serious crimes. But also the institute, which was originally mentioned in connection with the system of criminal law in the countries belonging to the Anglo-Saxon legal order where it is frequently called of plea bargaining, has been introduced into the criminal law of many European countries, and it may be applied also in cases of serious crimes. All these special and shortened forms of criminal proceedings are connected with limited extent of process of evidence; in fact, some of these specific forms of criminal proceedings are designed for the purpose to simplify the process of evidence. That is also the reason, why some of these procedures are conditioned with the defendant’s confession. Main hypothesis: Limited process of evidence represents also a potential conflict with certain fundamental principles upon which the criminal proceeding in the Continental legal system is based. (A conflict with principle of material truth may be considered as the most important problem. This principle states that the bodies in criminal proceedings must clarify the facts of the case beyond reasonable doubt to such extent that a decision can be made; the defendant’s confession does not mean that these bodies are freed from the duty to review all the circumstances and facts of the case. Such principle is typical for criminal law in Central European region.) Basic methodologies: The paper is going to analyze such a problem of weakening of the principle of material truth in modern criminal law. Such analysis will be provided primarily on the base of the Czech criminal law, but also other legal regulations will be taken into consideration, and its result may have some relevance for all legal regulations belonging to the Continental legal system, so the paper offers also a comparison with legal systems of other Central European countries.Keywords: burden of proof, central European countries, criminal justice rationalization, criminal proceeding, Czech legislation, Czech republic, defendant, diversions, evidence, fundamental principles, plea bargaining, pre-trial proceedings, principle of material truth, process of evidence, process of evidence
Procedia PDF Downloads 2873495 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security
Authors: Serkan Kocapinar
Abstract:
Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.Keywords: ISIS, security, terrorism, threats
Procedia PDF Downloads 2953494 Enhanced COVID-19 Pharmaceuticals and Microplastics Removal from Wastewater Using Hybrid Reactor System
Authors: Reda Dzingelevičienė, Vytautas Abromaitis, Nerijus Dzingelevičius, Kęstutis Baranauskis, Saulius Raugelė, Malgorzata Mlynska-Szultka, Sergej Suzdalev, Reza Pashaei, Sajjad Abbasi, Boguslaw Buszewski
Abstract:
A unique hybrid technology was developed for the removal of COVID-19 specific contaminants from wastewater. Reactor testing was performed using model water samples contaminated with COVID-19 pharmaceuticals and microplastics. Different hydraulic retention times, concentrations of pollutants and dissolved ozone were tested. Liquid Chromatography-Mass Spectrometry, solid phase extraction, surface area and porosity, analytical tools were used to monitor the treatment efficiency and remaining sorption capacity of the spent adsorbent. The combination of advanced oxidation and adsorption processes was found to be the most effective, with the highest 90-99% and 89-95% molnupiravir and microplastics contaminants removal efficiency from the model wastewater. The research has received funding from the European Regional Development Fund (project No 13.1.1-LMT-K-718-05-0014) under a grant agreement with the Research Council of Lithuania (LMTLT), and it was funded as part of the European Union’s measure in response to the COVID-19 pandemic.Keywords: adsorption, hybrid reactor system, pharmaceuticals-microplastics, wastewater
Procedia PDF Downloads 893493 The Assessment of Forest Wood Biomass Potential in Terms of Sustainable Development
Authors: Julija Konstantinavičienė, Vlada Vitunskienė
Abstract:
The role of sustainable biomass, including wood biomass, is becoming more important because of European Green Deal. The New EU Forest strategy is a flagship element of the European Green Deal and a key action on the EU biodiversity strategy for 2030. The first measure of this strategy is promoting sustainable forest management, including encouraging the sustainable use of wood-based resources. The first aim of this research was to develop and present a new approach to the concept of forest wood biomass potential in terms of sustainable development, distinguishing theoretical, technical and sustainable potential and detailing its constraints. The second aim was to prepare the methodology outline of sustainable forest wood biomass potential assessment and empirically check this methodology, considering economic, social and ecological constraints. The basic methodologies of the research: the review of research (with a combination of semi-systematic and integrative review methodologies), rapid assessment method and statistical data analysis. The developed methodology of assessment of forest wood potential in terms of sustainable development can be used in Lithuania and in other countries and will let us compare this potential a different time and spatial levels. The application of the methodology will be able to serve the development of new national strategies for the wood sector.Keywords: assessment, constraints, forest wood biomass, methodology, potential, sustainability
Procedia PDF Downloads 1233492 China and the Criminalization of Aggression. The Juxtaposition of Justice and the Maintenance of International Peace and Security
Authors: Elisabetta Baldassini
Abstract:
Responses to atrocities are always unique and context-dependent. They cannot be foretold nor easily prompted. However, the events of the twentieth century had set the scene for the international community to explore new and more robust systems in response to war atrocities, with the ultimate goal being the restoration and maintenance of peace and security. The outlawry of war and the attribution of individual liability for international crimes were two major landmarks that set the roots for the development of international criminal law. From the London Conference (1945) for the establishment of the first international military tribunal in Nuremberg to Rome at the inauguration of the first permanent international criminal court, the development of international criminal law has shaped in itself a fluctuating degree of tensions between justice and maintenance of international peace and security, the cardinal dichotomy of this article. The adoption of judicial measures to achieve peace indeed set justice as an essential feature at the heart of the new international system. Blackhole of this dichotomy is the crime of aggression. Aggression was at first the key component of a wide body of peace projects prosecuted under the charges of crimes against peace. However, the wide array of controversies around aggression mostly related to its definition, determination and the involvement of the Security Council silenced, partly, a degree of efforts and agreements. Notwithstanding the establishment of the International Criminal Court (ICC), jurisdiction over the crime of aggression was suspended until an agreement over the definition and the conditions for the Court’s exercise of jurisdiction was reached. Compromised over the crime was achieved in Kampala in 2010 and the Court’s jurisdiction over the crime of aggression was eventually activated on 17 July 2018. China has steadily supported the advancement of international criminal justice together with the establishment of a permanent international judicial body to prosecute grave crimes and has proactively participated at the various stages of the codification and development of the crime of aggression. However, China has also expressed systematic reservations and setbacks. With the use of primary and secondary sources, including semi-structured interviews, this research aims at analyzing the role that China has played throughout the substantive historical development of the crime of aggression, demonstrating a sharp inclination in the maintenance of international peace and security. Such state behavior seems to reflect national and international political mechanisms that gravitate around a distinct rationale that involves a share of culture and tradition.Keywords: maintenance of peace and security, cultural expression of justice, crime of aggression, China
Procedia PDF Downloads 2283491 Determination of Cr Content in Canned Fish Marketed in Iran
Authors: Soheil Sobhanardakani, Seyed Vali Hosseini, Lima Tayebi
Abstract:
The presence of heavy metals in the environment could constitute a hazard to food security and public health. These can be accumulated in aquatic animals such as fish. Samples of four popular brands of canned fish in the Iranian market (yellowfin tuna, common Kilka, Kawakawa, and longtail tuna) were analyzed for level of Cr after wet digestion with acids using graphite furnace atomic absorption spectrophotometry. The mean concentrations for Cr in the different brands were: 2.57, 3.24, 3.16, and 1.65 μg/g for brands A, B, C, and D respectively. Significant differences were observed in the Cr levels between all of the different brands of canned fish evaluated in this study. The Cr concentrations for the varieties of canned fishes were generally within the FAO/WHO, U.S. FDA, and U.S. EPA recommended limits for fish.Keywords: heavy metals, essential metals, canned fish, food security
Procedia PDF Downloads 2963490 View Synthesis of Kinetic Depth Imagery for 3D Security X-Ray Imaging
Authors: O. Abusaeeda, J. P. O. Evans, D. Downes
Abstract:
We demonstrate the synthesis of intermediary views within a sequence of X-ray images that exhibit depth from motion or kinetic depth effect in a visual display. Each synthetic image replaces the requirement for a linear X-ray detector array during the image acquisition process. Scale invariant feature transform, SIFT, in combination with epipolar morphing is employed to produce synthetic imagery. Comparison between synthetic and ground truth images is reported to quantify the performance of the approach. Our work is a key aspect in the development of a 3D imaging modality for the screening of luggage at airport checkpoints. This programme of research is in collaboration with the UK Home Office and the US Dept. of Homeland Security.Keywords: X-ray, kinetic depth, KDE, view synthesis
Procedia PDF Downloads 2653489 Power, Pluralism, and History: Norms in International Societies
Authors: Nicole Cervenka
Abstract:
On the question of norms in international politics, scholars are divided over whether norms are a tool for power politics or a genuine reflection of an emergent international society. The line is drawn between rationalism and idealism, but this dialectical relationship needs to be broken down if we hope to come to a comprehensive understanding of how norms play out in international society. The concept of an elusive international society is a simplification of a more pluralistic, cosmopolitan, and diverse collection of international societies. The English School effectively overcomes realist-idealist dichotomies and provides a pluralistic, comprehensive explanation and description of international societies through its application to two distinct areas: human rights as well as security and war. We argue that international norms have always been present in human rights, war, and international security, forming international societies that can be complimentary or oppositional, beneficial or problematic. Power politics are present, but they can only be regarded as partially explanatory of the role of norms in international politics, which must also include history, international law, the media, NGOs, and others to fully represent the normative influences in international societies. A side-by-side comparison of international norms of war/security and human rights show how much international societies converge. World War II was a turning point in terms of international law, these forces of international society have deeper historical roots. Norms of human rights and war/security are often norms of restraint, guiding appropriate treatment of individuals. This can at times give primacy to the individual over the sovereign state. However, state power politics and hegemony are still intact. It cannot be said that there is an emergent international society—international societies are part of broader historical backdrops. Furthermore, states and, more generally, power politics, are important components in international societies, but international norms are far from mere tools of power politics. They define a more diverse, complicated, and ever-present conception of international societies.Keywords: English school, international societies, norms, pluralism
Procedia PDF Downloads 3843488 Research on Malware Application Patterns of Using Permission Monitoring System
Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim
Abstract:
This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.Keywords: malware patterns, application permission, application analysis, security
Procedia PDF Downloads 5253487 Post Harvest Losses and Food Security in Northeast Nigeria What Are the Key Challenges and Concrete Solutions
Authors: Adebola Adedugbe
Abstract:
The challenge of post-harvest losses poses serious threats for food security in Nigeria and the north-eastern part with the country losing about $9billion annually due to postharvest losses in the sector. Post-harvest loss (PHL) is the quantitative and qualitative loss of food in various post-harvest operations. In Nigeria, post-harvest losses (PHL) have been a major challenge to food security and improved farmer’s income. In 2022, the Nigerian government had said over 30 percent of food produced by Nigerian farmers perish during post-harvest. For many in northeast Nigeria, agriculture is the predominant source of livelihood and income. The persistent communal conflicts, flood, decade-old attacks by boko haram and insurgency in this region have disrupted farming activities drastically, with farmlands becoming insecure and inaccessible as communities are forced to abandon ancestral homes, The impact of climate change is also affecting agricultural and fishing activities, leading to shortage of food supplies, acute hunger and loss of livelihood. This has continued to impact negatively on the region and country’s food production and availability making it loose billions of US dollars annually in income in this sector. The root cause of postharvest losses among others in crops, livestock and fisheries are lack of modern post-harvest equipment, chemical and lack of technologies used for combating losses. The 2019 Global Hunger Index showed Nigeria’s case was progressing from a ‘serious to alarming level’. As part of measures to address the problem of post-harvest losses experienced by farmers, the federal government of Nigeria concessioned 17 silos with 6000 metric tonne storage space to private sector to enable farmers to have access to storage facilities. This paper discusses the causes, effects and solutions in handling post-harvest losses and optimize returns on food security in northeast Nigeria.Keywords: farmers, food security, northeast Nigeria, postharvest loss
Procedia PDF Downloads 733486 Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey
Authors: Priti Kumari, Tricha Anjali
Abstract:
Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.Keywords: attacks, body area network, key distribution, key refreshment, pre-shared keys
Procedia PDF Downloads 3663485 Measuring the Visibility of the European Open Access Journals with Bibliometric Indicators
Authors: Maja Jokić, Andrea Mervar, Stjepan Mateljan
Abstract:
Peer review journals, as the main communication channel among researchers, fully achieve their objective if they are available to the global research community, which is accomplished through open access. In the EU countries, the idea of open access has spread over the years through various projects, initiatives, and strategic documents. Consequently, in this paper we want to analyze, using various bibliometric indicators, visibility, and significance of open access peer review journals compared to the conventional (non-open access) ones. We examine the sample of open access (OA) journals in 28 EU countries in addition to open access journals in three EU candidate countries (Bosnia and Herzegovina, FYR Macedonia and Serbia), all indexed by Scopus (N=1,522). These journals comprise 42% of the total number of OA journals indexed by Scopus. The distribution of OA journals in our sample according to the subject fields indicates that the largest share has OA journals in Health Sciences, 29% followed by Social Sciences and Physical Sciences with 25%, and 21% in Life Sciences. At the same time, the distribution according to countries (N=31) shows the dominance of EU15 countries with the share of 68.3% (N=1041) while post-socialist European countries (EU11 plus three candidate EU countries) have the share of 31.6% (N=481). Bibliometric indicators are derived from the SCImago Journal Ranking database. The analysis of OA journals according to their quartile scores (that reflect the relation between number of articles and their citations) shows that the largest number of OA journals from our sample was in the third quartile in 2015. For comparison, the majority of all academic journals indexed in Scopus from the countries in our sample were in the same year in the first quartile. The median of SJR indicator (SCImago Journal Rankings) for 2015 that measures the journal's prestige, amounted 0.297 for OA journals from the sample, while it was modestly lower for all OA journals, 0.284. The value of the same indicator for all journals indexed by Scopus (N=11,086) from our group of countries was 0.358, which is significantly different from the one for OA journals. Apart from the number of OA journals we also confirm significant differences between EU15 and post-socialist countries in bibliometric status of OA journals. The median SJR indicator for 2015 for EU15 countries was 0.394, while for post-socialist countries it amounted to 0.226. The changes in bibliometric indicators: quartile score, SJR (SCImago Journal Rankings), SNIP (Sources Normalised Impact by Paper) and IPP (Impact per Publication) of OA journals during 2012-2015 period, as well as H-index for the main four subject fields (Life Sciences, Physical Sciences, Social Sciences and Health Sciences) in the whole sample as well as in two main groups of European countries, show increasing trend of acceptance and visibility of OA journals within the academic community. More comprehensive insights into the visibility of OA journals could be reached by using additional qualitative research methods such as for example, interviews with researchers.Keywords: bibliometric analysis, European countries, journal evaluation, open access journals
Procedia PDF Downloads 2233484 Investigation of Tourism and Development in Santo Domingo City
Authors: Mary Cruz
Abstract:
Founded from 1496 to 1502, Santo Domingo is the oldest European settlement in the Americas, inhabited without any discontinuity and was the first seat of Spanish power in the new world. Capital of the country since 1932.In this text, we discover Santo Domingo as an international tourist center, Urban Structure, Eco-tourism, Contamination and other issues related to tourism and development of this city. Founded from 1496 to 1502, Santo Domingo is the oldest European settlement in the Americas, inhabited without any discontinuity and was the first seat of Spanish power in the new world. Capital of the country since 1932. Encouraged by the United Nations and the World Bank, many Caribbean governments have encouraged tourism from the 1950s to boost their Third World economies. In this text, we discover Santo Domingo as an international tourist center, Urban Structure, Eco-tourism, Contamination and challenges of the first tourist destination in the Caribbean.Keywords: eco-tourism, urban structure, contamination, development
Procedia PDF Downloads 3183483 Society-Centric Warfare: Lessons from Afghanistan
Authors: Amin Tarzi
Abstract:
The government of the Islamic Republic of Afghanistan was expected to keep the Taliban insurgents at bay after the departure of North Atlantic Treaty Organization (NATO)-led forces in 2021, especially given the two decades of effort to establish security forces to safeguard Western-backed governing institutions. This articles reviews the reasons for the failure of the much larger and better-equipped Afghan National Security Forces (ANSF) to stop the Taliban from taking over the Afghan capital of Kabul in a few days and analyzes the often-forgotten dimension of strategic calculations in this dialogue—namely the societal dimension. In this article, the author argues that this is one of the primary reasons that the ANSF and the Afghan government collapsed.Keywords: societal warfare, Afghanistan, NATO, Taliban, military strategy
Procedia PDF Downloads 1013482 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean
Authors: Jessica Kate Simonds
Abstract:
The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies
Procedia PDF Downloads 1863481 European Hinterland and Foreland: Impact of Accessibility, Connectivity, Inter-Port Competition on Containerization
Authors: Dial Tassadit Rania, Figueiredo De Oliveira Gabriel
Abstract:
In this paper, we investigate the relationship between ports and their hinterland and foreland environments and the competitive relationship between the ports themselves. These two environments are changing, evolving and introducing new challenges for commercial and economic development at the regional, national and international levels. Because of the rise of the containerization phenomenon, shipping costs and port handling costs have considerably decreased due to economies of scale. The volume of maritime trade has increased substantially and the markets served by the ports have expanded. On these bases, overlapping hinterlands can give rise to the phenomenon of competition between ports. Our main contribution comparing to the existing literature on this issue, is to build a set of hinterland, foreland and competition indicators. Using these indicators? we investigate the effect of hinterland accessibility, foreland connectivity and inter-ports competition on containerized traffic of Europeans ports. For this, we have a 10-year panel database from 2004 to 2014. Our hinterland indicators are given by two indicators of accessibility; they describe the market potential of a port and are calculated using information on population and wealth (GDP). We then calculate population and wealth for different neighborhoods within a distance from a port ranging from 100 to 1000km. For the foreland, we produce two indicators: port connectivity and number of partners for each port. Finally, we compute the two indicators of inter-port competition and a market concentration indicator (Hirshmann-Herfindhal) for different neighborhood-distances around the port. We then apply a fixed-effect model to test the relationship above. Again, with a fixed effects model, we do a sensitivity analysis for each of these indicators to support the results obtained. The econometric results of the general model given by the regression of the accessibility indicators, the LSCI for port i, and the inter-port competition indicator on the containerized traffic of European ports show a positive and significant effect for accessibility to wealth and not to the population. The results are positive and significant for the two indicators of connectivity and competition as well. One of the main results of this research is that the port development given here by the increase of its containerized traffic is strongly related to the development of its hinterland and foreland environment. In addition, it is the market potential, given by the wealth of the hinterland that has an impact on the containerized traffic of a port. However, accessibility to a large population pool is not important for understanding the dynamics of containerized port traffic. Furthermore, in order to continue to develop, a port must penetrate its hinterland at a deep level exceeding 100 km around the port and seek markets beyond this perimeter. The port authorities could focus their marketing efforts on the immediate hinterland, which can, as the results shows, not be captive and thus engage new approaches of port governance to make it more attractive.Keywords: accessibility, connectivity, European containerization, European hinterland and foreland, inter-port competition
Procedia PDF Downloads 1973480 Securing Online Voting With Blockchain and Smart Contracts
Authors: Anant Mehrotra, Krish Phagwani
Abstract:
Democratic voting is vital for any country, but current methods like ballot papers or EVMs have drawbacks, including transparency issues, low voter turnout, and security concerns. Blockchain technology offers a potential solution by providing a secure, decentralized, and transparent platform for e-voting. With features like immutability, security, and anonymity, blockchain combined with smart contracts can enhance trust and prevent vote tampering. This paper explores an Ethereum-based e-voting application using Solidity, showcasing a web app that prevents duplicate voting through a token-based system, while also discussing the advantages and limitations of blockchain in digital voting. Voting is a crucial component of democratic decision-making, yet current methods, like paper ballots, remain outdated and inefficient. This paper reviews blockchain-based voting systems, highlighting strategies and guidelines to create a comprehensive electronic voting system that leverages cryptographic techniques, such as zero-knowledge proofs, to enhance privacy. It addresses limitations of existing e-voting solutions, including cost, identity management, and scalability, and provides key insights for organizations looking to design their own blockchain-based voting systems.Keywords: electronic voting, smart contracts, blockchain nased voting, security
Procedia PDF Downloads 143479 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 2283478 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives
Authors: Obinna Emmanuel Nkomadu
Abstract:
The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs
Procedia PDF Downloads 973477 A Model of Human Security: A Comparison of Vulnerabilities and Timespace
Authors: Anders Troedsson
Abstract:
For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.Keywords: human security, timespace, vulnerabilities, risk perception
Procedia PDF Downloads 3393476 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia
Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro
Abstract:
Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.Keywords: border security, defense, energy, national interest, threat
Procedia PDF Downloads 4833475 The Impact of the General Data Protection Regulation on Human Resources Management in Schools
Authors: Alexandra Aslanidou
Abstract:
The General Data Protection Regulation (GDPR), concerning the protection of natural persons within the European Union with regard to the processing of personal data and on the free movement of such data, became applicable in the European Union (EU) on 25 May 2018 and transformed the way personal data were being treated under the Data Protection Directive (DPD) regime, generating sweeping organizational changes to both public sector and business. A social practice that is considerably influenced in the way of its day-to-day operations is Human Resource (HR) management, for which the importance of GDPR cannot be underestimated. That is because HR processes personal data coming in all shapes and sizes from many different systems and sources. The significance of the proper functioning of an HR department, specifically in human-centered, service-oriented environments such as the education field, is decisive due to the fact that HR operations in schools, conducted effectively, determine the quality of the provided services and consequently have a considerable impact on the success of the educational system. The purpose of this paper is to analyze the decisive role that GDPR plays in HR departments that operate in schools and in order to practically evaluate the aftermath of the Regulation during the first months of its applicability; a comparative use cases analysis in five highly dynamic schools, across three EU Member States, was attempted.Keywords: general data protection regulation, human resource management, educational system
Procedia PDF Downloads 1013474 Of Rites of Narration and Representation of Orient and Occident in Thomas Heywood's Fair Maid of the West
Authors: Tarik Bouguerba
Abstract:
Thomas Heywood was an outstanding, prolific playwright of the period, writing both in prose and verse. Unlike Shakespeare in particular, Heywood could be considered as a playwright who was well informed about Morocco and wrote in greater detail about a possible dialogue among cultures. As it is a historical platform for power relations, The Fair Maid of the West recalled the heroism and excitement of English counterattacks against Spain in the Post-Armada period. This paper therefore pins down the acts of narration and representation of Morocco and Moroccans and examines how the Occident has contributed to the production of the Orient and finally attests to the metamorphosis the plot undergoes in Part I and Part II. As an adventure play, The Fair Maid of the West teaches about, informs of and confirms the existing patterns of virtue in European voyagers and at the same time it asserts how honor and chastity are European par excellence whereas villainy and wickedness are Oriental assets. Once taken captive, these virtues and traits are put into task as the plot disentangles. This paper also examines how the play in both parts generates a whole history of stereotypes about Morocco and unexpectedly subverts this stereotype; such a biased mode of narration of the Orient the playwright took up at first was played down at a later phase in the narrative.Keywords: Heywood, Occident, Orientalism, Stereotype, Virtue
Procedia PDF Downloads 1423473 The Continuing Saga of Poverty Reduction and Food Security in the Philippines
Authors: Shienna Marie Esteban
Abstract:
The economic growth experience of the Philippines is one of the fastest in Asia. However, the said growth has not yet trickled down to every Filipino. This is evident to agricultural-dependent population. Moreover, the contribution of the agriculture sector to GDP has been dwindling while large number of labor force is still dependent on a relatively small share of GDP. As a result, poverty incidence worsened among rural poor causing hunger and malnutrition. Therefore, the existing agricultural policies in the Philippines are pushing to achieve greater food production and productivity to alleviate poverty and food insecurity. Through a review of related literature and collection and analysis of secondary data from DA, DBM, BAS - CountrySTAT, PSA, NSCB, PIDS, IRRI, UN-FAO, IFPRI, and World Bank among others, the study revealed that Philippines is still far from its goals of poverty reduction and food security. In addition, the agricultural sector is underperforming. The productivity growth of the sector comes out mediocre. The common observation is that weakness is attributed to the failures of policy and institutional environments of the agriculture sector. The policy environment failed to create a structure appropriate for the rapid growth of the sector due to institutional and governance weaknesses. A recommendation is to go through institutional and policy reforms through legislative or executive mandates should take form to improve the implementation and enforcement of existing policies.Keywords: agriculture, food security, policy, poverty
Procedia PDF Downloads 311