Search results for: European security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4340

Search results for: European security

3440 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect

Authors: Debasish Nandy

Abstract:

India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.

Keywords: bilateral, diplomacy, infiltration, terrorism

Procedia PDF Downloads 534
3439 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security

Authors: Serkan Kocapinar

Abstract:

Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.

Keywords: ISIS, security, terrorism, threats

Procedia PDF Downloads 291
3438 Measuring the Visibility of the European Open Access Journals with Bibliometric Indicators

Authors: Maja Jokić, Andrea Mervar, Stjepan Mateljan

Abstract:

Peer review journals, as the main communication channel among researchers, fully achieve their objective if they are available to the global research community, which is accomplished through open access. In the EU countries, the idea of open access has spread over the years through various projects, initiatives, and strategic documents. Consequently, in this paper we want to analyze, using various bibliometric indicators, visibility, and significance of open access peer review journals compared to the conventional (non-open access) ones. We examine the sample of open access (OA) journals in 28 EU countries in addition to open access journals in three EU candidate countries (Bosnia and Herzegovina, FYR Macedonia and Serbia), all indexed by Scopus (N=1,522). These journals comprise 42% of the total number of OA journals indexed by Scopus. The distribution of OA journals in our sample according to the subject fields indicates that the largest share has OA journals in Health Sciences, 29% followed by Social Sciences and Physical Sciences with 25%, and 21% in Life Sciences. At the same time, the distribution according to countries (N=31) shows the dominance of EU15 countries with the share of 68.3% (N=1041) while post-socialist European countries (EU11 plus three candidate EU countries) have the share of 31.6% (N=481). Bibliometric indicators are derived from the SCImago Journal Ranking database. The analysis of OA journals according to their quartile scores (that reflect the relation between number of articles and their citations) shows that the largest number of OA journals from our sample was in the third quartile in 2015. For comparison, the majority of all academic journals indexed in Scopus from the countries in our sample were in the same year in the first quartile. The median of SJR indicator (SCImago Journal Rankings) for 2015 that measures the journal's prestige, amounted 0.297 for OA journals from the sample, while it was modestly lower for all OA journals, 0.284. The value of the same indicator for all journals indexed by Scopus (N=11,086) from our group of countries was 0.358, which is significantly different from the one for OA journals. Apart from the number of OA journals we also confirm significant differences between EU15 and post-socialist countries in bibliometric status of OA journals. The median SJR indicator for 2015 for EU15 countries was 0.394, while for post-socialist countries it amounted to 0.226. The changes in bibliometric indicators: quartile score, SJR (SCImago Journal Rankings), SNIP (Sources Normalised Impact by Paper) and IPP (Impact per Publication) of OA journals during 2012-2015 period, as well as H-index for the main four subject fields (Life Sciences, Physical Sciences, Social Sciences and Health Sciences) in the whole sample as well as in two main groups of European countries, show increasing trend of acceptance and visibility of OA journals within the academic community. More comprehensive insights into the visibility of OA journals could be reached by using additional qualitative research methods such as for example, interviews with researchers.

Keywords: bibliometric analysis, European countries, journal evaluation, open access journals

Procedia PDF Downloads 218
3437 Investigation of Tourism and Development in Santo Domingo City

Authors: Mary Cruz

Abstract:

Founded from 1496 to 1502, Santo Domingo is the oldest European settlement in the Americas, inhabited without any discontinuity and was the first seat of Spanish power in the new world. Capital of the country since 1932.In this text, we discover Santo Domingo as an international tourist center, Urban Structure, Eco-tourism, Contamination and other issues related to tourism and development of this city. Founded from 1496 to 1502, Santo Domingo is the oldest European settlement in the Americas, inhabited without any discontinuity and was the first seat of Spanish power in the new world. Capital of the country since 1932. Encouraged by the United Nations and the World Bank, many Caribbean governments have encouraged tourism from the 1950s to boost their Third World economies. In this text, we discover Santo Domingo as an international tourist center, Urban Structure, Eco-tourism, Contamination and challenges of the first tourist destination in the Caribbean.

Keywords: eco-tourism, urban structure, contamination, development

Procedia PDF Downloads 314
3436 China and the Criminalization of Aggression. The Juxtaposition of Justice and the Maintenance of International Peace and Security

Authors: Elisabetta Baldassini

Abstract:

Responses to atrocities are always unique and context-dependent. They cannot be foretold nor easily prompted. However, the events of the twentieth century had set the scene for the international community to explore new and more robust systems in response to war atrocities, with the ultimate goal being the restoration and maintenance of peace and security. The outlawry of war and the attribution of individual liability for international crimes were two major landmarks that set the roots for the development of international criminal law. From the London Conference (1945) for the establishment of the first international military tribunal in Nuremberg to Rome at the inauguration of the first permanent international criminal court, the development of international criminal law has shaped in itself a fluctuating degree of tensions between justice and maintenance of international peace and security, the cardinal dichotomy of this article. The adoption of judicial measures to achieve peace indeed set justice as an essential feature at the heart of the new international system. Blackhole of this dichotomy is the crime of aggression. Aggression was at first the key component of a wide body of peace projects prosecuted under the charges of crimes against peace. However, the wide array of controversies around aggression mostly related to its definition, determination and the involvement of the Security Council silenced, partly, a degree of efforts and agreements. Notwithstanding the establishment of the International Criminal Court (ICC), jurisdiction over the crime of aggression was suspended until an agreement over the definition and the conditions for the Court’s exercise of jurisdiction was reached. Compromised over the crime was achieved in Kampala in 2010 and the Court’s jurisdiction over the crime of aggression was eventually activated on 17 July 2018. China has steadily supported the advancement of international criminal justice together with the establishment of a permanent international judicial body to prosecute grave crimes and has proactively participated at the various stages of the codification and development of the crime of aggression. However, China has also expressed systematic reservations and setbacks. With the use of primary and secondary sources, including semi-structured interviews, this research aims at analyzing the role that China has played throughout the substantive historical development of the crime of aggression, demonstrating a sharp inclination in the maintenance of international peace and security. Such state behavior seems to reflect national and international political mechanisms that gravitate around a distinct rationale that involves a share of culture and tradition.

Keywords: maintenance of peace and security, cultural expression of justice, crime of aggression, China

Procedia PDF Downloads 223
3435 Determination of Cr Content in Canned Fish Marketed in Iran

Authors: Soheil Sobhanardakani, Seyed Vali Hosseini, Lima Tayebi

Abstract:

The presence of heavy metals in the environment could constitute a hazard to food security and public health. These can be accumulated in aquatic animals such as fish. Samples of four popular brands of canned fish in the Iranian market (yellowfin tuna, common Kilka, Kawakawa, and longtail tuna) were analyzed for level of Cr after wet digestion with acids using graphite furnace atomic absorption spectrophotometry. The mean concentrations for Cr in the different brands were: 2.57, 3.24, 3.16, and 1.65 μg/g for brands A, B, C, and D respectively. Significant differences were observed in the Cr levels between all of the different brands of canned fish evaluated in this study. The Cr concentrations for the varieties of canned fishes were generally within the FAO/WHO, U.S. FDA, and U.S. EPA recommended limits for fish.

Keywords: heavy metals, essential metals, canned fish, food security

Procedia PDF Downloads 291
3434 European Hinterland and Foreland: Impact of Accessibility, Connectivity, Inter-Port Competition on Containerization

Authors: Dial Tassadit Rania, Figueiredo De Oliveira Gabriel

Abstract:

In this paper, we investigate the relationship between ports and their hinterland and foreland environments and the competitive relationship between the ports themselves. These two environments are changing, evolving and introducing new challenges for commercial and economic development at the regional, national and international levels. Because of the rise of the containerization phenomenon, shipping costs and port handling costs have considerably decreased due to economies of scale. The volume of maritime trade has increased substantially and the markets served by the ports have expanded. On these bases, overlapping hinterlands can give rise to the phenomenon of competition between ports. Our main contribution comparing to the existing literature on this issue, is to build a set of hinterland, foreland and competition indicators. Using these indicators? we investigate the effect of hinterland accessibility, foreland connectivity and inter-ports competition on containerized traffic of Europeans ports. For this, we have a 10-year panel database from 2004 to 2014. Our hinterland indicators are given by two indicators of accessibility; they describe the market potential of a port and are calculated using information on population and wealth (GDP). We then calculate population and wealth for different neighborhoods within a distance from a port ranging from 100 to 1000km. For the foreland, we produce two indicators: port connectivity and number of partners for each port. Finally, we compute the two indicators of inter-port competition and a market concentration indicator (Hirshmann-Herfindhal) for different neighborhood-distances around the port. We then apply a fixed-effect model to test the relationship above. Again, with a fixed effects model, we do a sensitivity analysis for each of these indicators to support the results obtained. The econometric results of the general model given by the regression of the accessibility indicators, the LSCI for port i, and the inter-port competition indicator on the containerized traffic of European ports show a positive and significant effect for accessibility to wealth and not to the population. The results are positive and significant for the two indicators of connectivity and competition as well. One of the main results of this research is that the port development given here by the increase of its containerized traffic is strongly related to the development of its hinterland and foreland environment. In addition, it is the market potential, given by the wealth of the hinterland that has an impact on the containerized traffic of a port. However, accessibility to a large population pool is not important for understanding the dynamics of containerized port traffic. Furthermore, in order to continue to develop, a port must penetrate its hinterland at a deep level exceeding 100 km around the port and seek markets beyond this perimeter. The port authorities could focus their marketing efforts on the immediate hinterland, which can, as the results shows, not be captive and thus engage new approaches of port governance to make it more attractive.

Keywords: accessibility, connectivity, European containerization, European hinterland and foreland, inter-port competition

Procedia PDF Downloads 191
3433 View Synthesis of Kinetic Depth Imagery for 3D Security X-Ray Imaging

Authors: O. Abusaeeda, J. P. O. Evans, D. Downes

Abstract:

We demonstrate the synthesis of intermediary views within a sequence of X-ray images that exhibit depth from motion or kinetic depth effect in a visual display. Each synthetic image replaces the requirement for a linear X-ray detector array during the image acquisition process. Scale invariant feature transform, SIFT, in combination with epipolar morphing is employed to produce synthetic imagery. Comparison between synthetic and ground truth images is reported to quantify the performance of the approach. Our work is a key aspect in the development of a 3D imaging modality for the screening of luggage at airport checkpoints. This programme of research is in collaboration with the UK Home Office and the US Dept. of Homeland Security.

Keywords: X-ray, kinetic depth, KDE, view synthesis

Procedia PDF Downloads 262
3432 Power, Pluralism, and History: Norms in International Societies

Authors: Nicole Cervenka

Abstract:

On the question of norms in international politics, scholars are divided over whether norms are a tool for power politics or a genuine reflection of an emergent international society. The line is drawn between rationalism and idealism, but this dialectical relationship needs to be broken down if we hope to come to a comprehensive understanding of how norms play out in international society. The concept of an elusive international society is a simplification of a more pluralistic, cosmopolitan, and diverse collection of international societies. The English School effectively overcomes realist-idealist dichotomies and provides a pluralistic, comprehensive explanation and description of international societies through its application to two distinct areas: human rights as well as security and war. We argue that international norms have always been present in human rights, war, and international security, forming international societies that can be complimentary or oppositional, beneficial or problematic. Power politics are present, but they can only be regarded as partially explanatory of the role of norms in international politics, which must also include history, international law, the media, NGOs, and others to fully represent the normative influences in international societies. A side-by-side comparison of international norms of war/security and human rights show how much international societies converge. World War II was a turning point in terms of international law, these forces of international society have deeper historical roots. Norms of human rights and war/security are often norms of restraint, guiding appropriate treatment of individuals. This can at times give primacy to the individual over the sovereign state. However, state power politics and hegemony are still intact. It cannot be said that there is an emergent international society—international societies are part of broader historical backdrops. Furthermore, states and, more generally, power politics, are important components in international societies, but international norms are far from mere tools of power politics. They define a more diverse, complicated, and ever-present conception of international societies.

Keywords: English school, international societies, norms, pluralism

Procedia PDF Downloads 382
3431 Research on Malware Application Patterns of Using Permission Monitoring System

Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim

Abstract:

This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.

Keywords: malware patterns, application permission, application analysis, security

Procedia PDF Downloads 519
3430 Post Harvest Losses and Food Security in Northeast Nigeria What Are the Key Challenges and Concrete Solutions

Authors: Adebola Adedugbe

Abstract:

The challenge of post-harvest losses poses serious threats for food security in Nigeria and the north-eastern part with the country losing about $9billion annually due to postharvest losses in the sector. Post-harvest loss (PHL) is the quantitative and qualitative loss of food in various post-harvest operations. In Nigeria, post-harvest losses (PHL) have been a major challenge to food security and improved farmer’s income. In 2022, the Nigerian government had said over 30 percent of food produced by Nigerian farmers perish during post-harvest. For many in northeast Nigeria, agriculture is the predominant source of livelihood and income. The persistent communal conflicts, flood, decade-old attacks by boko haram and insurgency in this region have disrupted farming activities drastically, with farmlands becoming insecure and inaccessible as communities are forced to abandon ancestral homes, The impact of climate change is also affecting agricultural and fishing activities, leading to shortage of food supplies, acute hunger and loss of livelihood. This has continued to impact negatively on the region and country’s food production and availability making it loose billions of US dollars annually in income in this sector. The root cause of postharvest losses among others in crops, livestock and fisheries are lack of modern post-harvest equipment, chemical and lack of technologies used for combating losses. The 2019 Global Hunger Index showed Nigeria’s case was progressing from a ‘serious to alarming level’. As part of measures to address the problem of post-harvest losses experienced by farmers, the federal government of Nigeria concessioned 17 silos with 6000 metric tonne storage space to private sector to enable farmers to have access to storage facilities. This paper discusses the causes, effects and solutions in handling post-harvest losses and optimize returns on food security in northeast Nigeria.

Keywords: farmers, food security, northeast Nigeria, postharvest loss

Procedia PDF Downloads 69
3429 Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey

Authors: Priti Kumari, Tricha Anjali

Abstract:

Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.

Keywords: attacks, body area network, key distribution, key refreshment, pre-shared keys

Procedia PDF Downloads 358
3428 Society-Centric Warfare: Lessons from Afghanistan

Authors: Amin Tarzi

Abstract:

The government of the Islamic Republic of Afghanistan was expected to keep the Taliban insurgents at bay after the departure of North Atlantic Treaty Organization (NATO)-led forces in 2021, especially given the two decades of effort to establish security forces to safeguard Western-backed governing institutions. This articles reviews the reasons for the failure of the much larger and better-equipped Afghan National Security Forces (ANSF) to stop the Taliban from taking over the Afghan capital of Kabul in a few days and analyzes the often-forgotten dimension of strategic calculations in this dialogue—namely the societal dimension. In this article, the author argues that this is one of the primary reasons that the ANSF and the Afghan government collapsed.

Keywords: societal warfare, Afghanistan, NATO, Taliban, military strategy

Procedia PDF Downloads 96
3427 The Impact of the General Data Protection Regulation on Human Resources Management in Schools

Authors: Alexandra Aslanidou

Abstract:

The General Data Protection Regulation (GDPR), concerning the protection of natural persons within the European Union with regard to the processing of personal data and on the free movement of such data, became applicable in the European Union (EU) on 25 May 2018 and transformed the way personal data were being treated under the Data Protection Directive (DPD) regime, generating sweeping organizational changes to both public sector and business. A social practice that is considerably influenced in the way of its day-to-day operations is Human Resource (HR) management, for which the importance of GDPR cannot be underestimated. That is because HR processes personal data coming in all shapes and sizes from many different systems and sources. The significance of the proper functioning of an HR department, specifically in human-centered, service-oriented environments such as the education field, is decisive due to the fact that HR operations in schools, conducted effectively, determine the quality of the provided services and consequently have a considerable impact on the success of the educational system. The purpose of this paper is to analyze the decisive role that GDPR plays in HR departments that operate in schools and in order to practically evaluate the aftermath of the Regulation during the first months of its applicability; a comparative use cases analysis in five highly dynamic schools, across three EU Member States, was attempted.

Keywords: general data protection regulation, human resource management, educational system

Procedia PDF Downloads 98
3426 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean

Authors: Jessica Kate Simonds

Abstract:

The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.

Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies

Procedia PDF Downloads 180
3425 Of Rites of Narration and Representation of Orient and Occident in Thomas Heywood's Fair Maid of the West

Authors: Tarik Bouguerba

Abstract:

Thomas Heywood was an outstanding, prolific playwright of the period, writing both in prose and verse. Unlike Shakespeare in particular, Heywood could be considered as a playwright who was well informed about Morocco and wrote in greater detail about a possible dialogue among cultures. As it is a historical platform for power relations, The Fair Maid of the West recalled the heroism and excitement of English counterattacks against Spain in the Post-Armada period. This paper therefore pins down the acts of narration and representation of Morocco and Moroccans and examines how the Occident has contributed to the production of the Orient and finally attests to the metamorphosis the plot undergoes in Part I and Part II. As an adventure play, The Fair Maid of the West teaches about, informs of and confirms the existing patterns of virtue in European voyagers and at the same time it asserts how honor and chastity are European par excellence whereas villainy and wickedness are Oriental assets. Once taken captive, these virtues and traits are put into task as the plot disentangles. This paper also examines how the play in both parts generates a whole history of stereotypes about Morocco and unexpectedly subverts this stereotype; such a biased mode of narration of the Orient the playwright took up at first was played down at a later phase in the narrative.

Keywords: Heywood, Occident, Orientalism, Stereotype, Virtue

Procedia PDF Downloads 134
3424 Database of Pharmacogenetics HLA-A*31:01 Allele in Thai Population and Carbamazepine-Induced SCARs

Authors: Watchawin Ekphinitphithaya, Patompong Satapornpong

Abstract:

Introduction: Carbamazepine (CBZ) is one of the most prescribed antiepileptic drugs (AEDs) by neurologists and non-neurologist worldwide. CBZ is usually prescribed along with other drugs, leading to the possibility of severe cutaneous adverse drug reactions (SCARs). The HLA-B*15:02 is strongly associated with CBZ-induced Stevens-Johnson syndrome and toxic epidermal necrolysis (SJS–TEN) in the Han Chinese and other Asian populations but not in European populations, while HLA-A*31:01 allele has been reported to be associated with CBZ-induced SCARs in European population and Japanese. Objective: The aim of this study is to investigate the distribution of pharmacogenetics HLA-A*31:01 marker in a healthy Thai population associated with Carbamazepine-induced SCARs. Materials and Methods: Prospective study, 350 unrelated healthy Thais were recruited in this study. Human leukocyte antigen-A alleles were genotyped using PCR-sequence specific oligonucleotides (PCR-SSOs). Results: The frequency of HLA-A alleles were HLA-A*11:01 (190 alleles, 27.14%), HLA-A*24:02 (82 alleles, 11.71%), HLA-A*02:03 (80 alleles, 11.43%), HLA-A*33:03 (76 alleles, 10.86%), HLA-A*02:07 (58 alleles, 8.29%), HLA-A*02:01 (35 alleles, 5.00%), HLA-A*24:07 (29 alleles, 4.14%), HLA-A*02:06 – HLA-A*30:01 (15 alleles, 2.14%), and HLA-A*01:01 (14 alleles, 2.00%). Particularly, the number of HLA-A*31:01 alleles was 6 of 700 (0.86%) in the healthy Thai population. Many research presented varying distributions of HLA-A*31:01 in Asians, including 2% of Han Chinese, 9% of Japanese and 5% of Koreans. In addition, this allele was found approximately 2-5% in the Caucasian population. Conclusions: Thus, the pharmacogenetics database is vital to support in many populations, especially in Thais, for screening HLA-A*31:01 allele to avoid CBZ-induced SCARs before initiating treatments in each population.

Keywords: Carbamazepine, HLA-A*31:01, Thai population, pharmacogenetics

Procedia PDF Downloads 168
3423 European Standardization in Nanotechnologies and Relation with International Work: The Standardization Can Help Industry and Regulators in Developing Safe Products

Authors: Patrice Conner

Abstract:

Nanotechnologies have enormous potential to contribute to human flourishing in responsible and sustainable ways. They are rapidly developing field of science, technology and innovation. As enabling technologies, their full scope of applications is potentially very wide. Major implications are expected in many areas, e.g. healthcare, information and communication technologies, energy production and storage, materials science/chemical engineering, manufacturing, environmental protection, consumer products, etc. However, nanotechnologies are unlikely to realize their full potential unless their associated societal and ethical issues are adequately attended. Namely nanotechnologies and nanoparticles may expose humans and the environment to new health risks, possibly involving quite different mechanisms of interference with the physiology of human and environmental species. One of the building blocks of the ‘safe, integrated and responsible’ approach is standardization. Both the Economic and Social Committee and the European Parliament have highlighted the importance to be attached to standardization as a means to accompany the introduction on the market of nanotechnologies and nanomaterials, and a means to facilitate the implementation of regulation. ISO and CEN have respectively started in 2005 and 2006 to deal with selected topics related to this emerging and enabling technology. In the beginning of 2010, EC DG ‘Enterprise and Industry’ addressed the mandate M/461 to CEN, CENELEC and ETSI for standardization activities regarding nanotechnologies and nanomaterials. Thus CEN/TC 352 ‘Nanotechnologies’ has been asked to take the leadership for the coordination in the execution of M/461 (46 topics to be standardized) and to contact relevant European and International Technical committees and interested stakeholders as appropriate (56 structures have been identified). Prior requests from M/461 deal with characterization and exposure of nanomaterials and any matters related to Health, Safety and Environment. Answers will be given to: - What are the structures and how they work? - Where are we right now and how work is going from now onwards? - How CEN’s work and targets deal with and interact with global matters in this field?

Keywords: characterization, environmental protection, exposure, health risks, nanotechnologies, responsible and sustainable ways, safety

Procedia PDF Downloads 186
3422 Challenges to Developing a Trans-European Programme for Health Professionals to Recognize and Respond to Survivors of Domestic Violence and Abuse

Authors: June Keeling, Christina Athanasiades, Vaiva Hendrixson, Delyth Wyndham

Abstract:

Recognition and education in violence, abuse, and neglect for medical and healthcare practitioners (REVAMP) is a trans-European project aiming to introduce a training programme that has been specifically developed by partners across seven European countries to meet the needs of medical and healthcare practitioners. Amalgamating the knowledge and experience of clinicians, researchers, and educators from interdisciplinary and multi-professional backgrounds, REVAMP has tackled the under-resourced and underdeveloped area of domestic violence and abuse. The team designed an online training programme to support medical and healthcare practitioners to recognise and respond appropriately to survivors of domestic violence and abuse at their point of contact with a health provider. The REVAMP partner countries include Europe: France, Lithuania, Germany, Greece, Iceland, Norway, and the UK. The training is delivered through a series of interactive online modules, adapting evidence-based pedagogical approaches to learning. Capturing and addressing the complexities of the project impacted the methodological decisions and approaches to evaluation. The challenge was to find an evaluation methodology that captured valid data across all partner languages to demonstrate the extent of the change in knowledge and understanding. Co-development by all team members was a lengthy iterative process, challenged by a lack of consistency in terminology. A mixed methods approach enabled both qualitative and quantitative data to be collected, at the start, during, and at the conclusion of the training for the purposes of evaluation. The module content and evaluation instrument were accessible in each partner country's language. Collecting both types of data provided a high-level snapshot of attainment via the quantitative dataset and an in-depth understanding of the impact of the training from the qualitative dataset. The analysis was mixed methods, with integration at multiple interfaces. The primary focus of the analysis was to support the overall project evaluation for the funding agency. A key project outcome was identifying that the trans-European approach posed several challenges. Firstly, the project partners did not share a first language or a legal or professional approach to domestic abuse and neglect. This was negotiated through complex, systematic, and iterative interaction between team members so that consensus could be achieved. Secondly, the context of the data collection in several different cultural, educational, and healthcare systems across Europe challenged the development of a robust evaluation. The participants in the pilot evaluation shared that the training was contemporary, well-designed, and of great relevance to inform practice. Initial results from the evaluation indicated that the participants were drawn from more than eight partner countries due to the online nature of the training. The primary results indicated a high level of engagement with the content and achievement through the online assessment. The main finding was that the participants perceived the impact of domestic abuse and neglect in very different ways in their individual professional contexts. Most significantly, the participants recognised the need for the training and the gap that existed previously. It is notable that a mixed-methods evaluation of a trans-European project is unusual at this scale.

Keywords: domestic violence, e-learning, health professionals, trans-European

Procedia PDF Downloads 80
3421 Understanding the Heterogeneity of Polycystic Ovarian Syndrome: The Influence of Ethnicity and Body Mass

Authors: Hamza Ikhlaq, Stephen Franks

Abstract:

Background: Polycystic ovarian syndrome (PCOS) is one of the most common endocrine disorders affecting women of reproductive age. The aetiology behind PCOS is poorly understood but influencing ethnic, environmental, and genetic factors have been recognised. However, literature examining the impact of ethnicity is scarce. We hypothesised Body Mass Index (BMI) and ethnicity influence the clinical, metabolic, and biochemical presentations of PCOS, with an interaction between these factors. Methods: A database of 1081 women with PCOS and a control group of 72 women were analysed. BMIs were grouped using the World Health Organisation classification into normal weight, overweight and obese groups. Ethnicities were classified into European, South Asian, and Afro-Caribbean groups. Biochemical and clinical presentations were compared amongst these groups, and statistical analyses were performed to assess significance. Results: This study revealed ethnicity significantly influences biochemical and clinical presentations of PCOS. A greater proportion of South Asian women are impacted by menstrual cycle disturbances and hirsutism than European and Afro-Caribbean women. South Asian and Afro-Caribbean women show greater measures of insulin resistance and weight gain when compared to their European peers. Women with increased BMI are shown to have an increased prevalence of PCOS phenotypes alongside increased levels of insulin resistance and testosterone. Furthermore, significantly different relationships between the waist-hip ratio and measures of insulin and glucose control for Afro-Caribbean women were identified compared to other ethnic groups. Conclusions: The findings of this study show ethnicity significantly influence the phenotypic and biochemical presentations of PCOS, with an interaction between body habitus and ethnicity found. Furthermore, we provide further data on the influences of BMI on the manifestations of PCOS. Therefore, we highlight the need to consider these factors when reviewing diagnostic criteria and delivering clinical care for these groups.

Keywords: PCOS, ethnicity, BMI, clinical

Procedia PDF Downloads 107
3420 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 224
3419 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.

Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs

Procedia PDF Downloads 93
3418 The Gender Equality within the European Union Reconciliation of Work and Family Life Policies: Tackling Gender Inequality or Tackling Unemployment

Authors: Nazli Kazanoglu

Abstract:

Reconciliation of work and family life has been an area of interest within the academic as well as in the political debate for more than three decades. With the dramatic changes in the extent to which women and men contribute to unpaid domestic work and paid employment, the reconciliation of work and family life issues have become more prominent than ever before. And they have begun to enjoy an increased attention of policy makers both at the EU and national levels. Over the last three decades the EU has initiated numerous equality programs and strategies and roadmaps regarding reconciliation of work and family life, though particularly because of the crisis and increasing willingness of achieving the EUs target of seventy five per cent of men and women in employment by 2020, those programs, strategies and roadmaps emphasized on eradicating womens familial burdens while entering labor market and providing them as equal opportunities as their male counterparts have. Reconciliation of work and family life policies thus bit by bit moved away from the objectives with a strong commitment to ensuring gender equality towards employment objectives. This paper is thus an endeavor to look at the nature of EU reconciliation of work and family life policies from the angle of gender equality. More precisely relying on the feminist literature, this paper rests on the assumption that reconciliation of work and family policies should provide the sufficient measures indeed with a more emphasis on endorsing gender equality rather than economic concerns and prioritizes two inter-related aspects while evaluating the gender equality of reconciliation of work and family life policies. First providing free choice to women in terms of their family and work lives and second challenge the unequal division of labor at home. In that sense, it investigates the nature of the changing uses and meanings of gender equality in reconciliation of work and family life policies in different stages of the EU social policy development particularly after the introduction of European Employment Strategy which gave a tremendous importance to reconciliation of work and family life during their collaborations with other issues on the EU agenda as well as the major rationale behind their development and implementation and locates them in terms of two inter-related parameters mentioned above.

Keywords: European Union, division of unpaid work, gender equality, rhetoric of free choice

Procedia PDF Downloads 295
3417 A Model of Human Security: A Comparison of Vulnerabilities and Timespace

Authors: Anders Troedsson

Abstract:

For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.

Keywords: human security, timespace, vulnerabilities, risk perception

Procedia PDF Downloads 330
3416 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia

Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro

Abstract:

Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.

Keywords: border security, defense, energy, national interest, threat

Procedia PDF Downloads 476
3415 An Integrative Review on the Experiences of Integration of Quality Assurance Systems in Universities

Authors: Laura Mion

Abstract:

Concepts of quality assurance and management are now part of the organizational culture of the Universities. Quality Assurance (QA) systems are, in large part, provided for by national regulatory dictates or supranational indications (such as, for example, at European level are, the ESG Guidelines "European Standard Guidelines"), but their specific definition, in terms of guiding principles, requirements and methodologies, are often delegated to the national evaluation agencies or to the autonomy of individual universities. For this reason, the experiences of implementation of QA systems in different countries and in different universities is an interesting source of information to understand how quality in universities is understood, pursued and verified. The literature often deals with the treatment of the experiences of implementation of QA systems in the individual areas in which the University's activity is carried out - teaching, research, third mission - but only rarely considers quality systems with a systemic and integrated approach, which allows to correlate subjects, actions, and performance in a virtuous circuit of continuous improvement. In particular, it is interesting to understand how to relate the results and uses of the QA in the triple distinction of university activities, identifying how one can cause the performance of the other as a function of an integrated whole and not as an exploit of specific activities or processes conceived in an abstractly atomistic way. The aim of the research is, therefore, to investigate which experiences of "integrated" QA systems are present on the international scene: starting from the experience of European countries that have long shared the Bologna Process for the creation of a European space for Higher Education (EHEA), but also considering experiences from emerging countries that use QA processes to develop their higher education systems to keep them up to date with international levels. The concept of "integration", in this research, is understood in a double meaning: i) between the different areas of activity, in particular between the didactic and research areas, and possibly with the so-called "third mission" "ii) the functional integration between those involved in quality assessment and management and the governance of the University. The paper will present the results of a systematic review conducted according with a method of an integrative review aimed at identifying best practices of quality assurance systems, in individual countries or individual universities, with a high level of integration. The analysis of the material thus obtained has made it possible to grasp common and transversal elements of QA system integration practices or particularly interesting elements and strengths of these experiences that can, therefore, be considered as winning aspects in a QA practice. The paper will present the method of analysis carried out, and the characteristics of the experiences identified, of which the structural elements will be highlighted (level of integration, areas considered, organizational levels included, etc.) and the elements for which these experiences can be considered as best practices.

Keywords: quality assurance, university, integration, country

Procedia PDF Downloads 81
3414 Risk Mitigation of Data Causality Analysis Requirements AI Act

Authors: Raphaël Weuts, Mykyta Petik, Anton Vedder

Abstract:

Artificial Intelligence has the potential to create and already creates enormous value in healthcare. Prescriptive systems might be able to make the use of healthcare capacity more efficient. Such systems might entail interpretations that exclude the effect of confounders that brings risks with it. Those risks might be mitigated by regulation that prevents systems entailing such risks to come to market. One modality of regulation is that of legislation, and the European AI Act is an example of such a regulatory instrument that might mitigate these risks. To assess the risk mitigation potential of the AI Act for those risks, this research focusses on a case study of a hypothetical application of medical device software that entails the aforementioned risks. The AI Act refers to the harmonised norms for already existing legislation, here being the European medical device regulation. The issue at hand is a causal link between a confounder and the value the algorithm optimises for by proxy. The research identifies where the AI Act already looks at confounders (i.a. feedback loops in systems that continue to learn after being placed on the market). The research identifies where the current proposal by parliament leaves legal uncertainty on the necessity to check for confounders that do not influence the input of the system, when the system does not continue to learn after being placed on the market. The authors propose an amendment to article 15 of the AI Act that would require high-risk systems to be developed in such a way as to mitigate risks from those aforementioned confounders.

Keywords: AI Act, healthcare, confounders, risks

Procedia PDF Downloads 257
3413 The Continuing Saga of Poverty Reduction and Food Security in the Philippines

Authors: Shienna Marie Esteban

Abstract:

The economic growth experience of the Philippines is one of the fastest in Asia. However, the said growth has not yet trickled down to every Filipino. This is evident to agricultural-dependent population. Moreover, the contribution of the agriculture sector to GDP has been dwindling while large number of labor force is still dependent on a relatively small share of GDP. As a result, poverty incidence worsened among rural poor causing hunger and malnutrition. Therefore, the existing agricultural policies in the Philippines are pushing to achieve greater food production and productivity to alleviate poverty and food insecurity. Through a review of related literature and collection and analysis of secondary data from DA, DBM, BAS - CountrySTAT, PSA, NSCB, PIDS, IRRI, UN-FAO, IFPRI, and World Bank among others, the study revealed that Philippines is still far from its goals of poverty reduction and food security. In addition, the agricultural sector is underperforming. The productivity growth of the sector comes out mediocre. The common observation is that weakness is attributed to the failures of policy and institutional environments of the agriculture sector. The policy environment failed to create a structure appropriate for the rapid growth of the sector due to institutional and governance weaknesses. A recommendation is to go through institutional and policy reforms through legislative or executive mandates should take form to improve the implementation and enforcement of existing policies.

Keywords: agriculture, food security, policy, poverty

Procedia PDF Downloads 308
3412 Insecurity and Insurgency on Economic Development of Nigeria

Authors: Uche Lucy Onyekwelu, Uche B. Ugwuanyi

Abstract:

Suffice to say that socio-economic disruptions of any form is likely to affect the wellbeing of the citizenry. The upsurge of social disequilibrium caused by the incessant disruptive tendencies exhibited by youths and some others in Nigeria are not helping matters. In Nigeria the social unrest has caused different forms of draw backs in Socio Economic Development. This study has empirically evaluated the impact of insecurity and insurgency on the Economic Development of Nigeria. The paper noted that the different forms of insecurity in Nigeria are namely: Insurgency and Banditry as witnessed in Northern Nigeria; Militancy: Niger Delta area and self-determination groups pursuing various forms of agenda such as Sit –at- Home Syndrome in the South Eastern Nigeria and other secessionist movements. All these have in one way or the other hampered Economic development in Nigeria. Data for this study were collected through primary and secondary sources using questionnaire and some existing documentations. Cost of investment in different aspects of security outfits in Nigeria represents the independent variable while the differentials in the Gross Domestic Product(GDP) and Human Development Index(HDI) are the measures of the dependent variable. Descriptive statistics and Simple Linear Regression analytical tool were employed in the data analysis. The result revealed that Insurgency/Insecurity negatively affect the economic development of the different parts of Nigeria. Following the findings, a model to analyse the effect of insecurity and insurgency was developed, named INSECUREDEVNIG. It implies that the economic development of Nigeria will continue to deteriorate if insurgency and insecurity continue. The study therefore recommends that the government should do all it could to nurture its human capital, adequately fund the state security apparatus and employ individuals of high integrity to manage the various security outfits in Nigeria. The government should also as a matter of urgency train the security personnel in intelligence cum Information and Communications Technology to enable them ensure the effectiveness of implementation of security policies needed to sustain Gross Domestic Product and Human Capital Index of Nigeria.

Keywords: insecurity, insurgency, gross domestic product, human development index, Nigeria

Procedia PDF Downloads 99
3411 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 185