Search results for: European security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4316

Search results for: European security

3386 Empirical Investigation into Climate Change and Climate-Smart Agriculture for Food Security in Nigeria

Authors: J. Julius Adebayo

Abstract:

The objective of this paper is to assess the agro-climatic condition of Ibadan in the rain forest ecological zone of Nigeria, using rainfall pattern and temperature between 1978-2018. Data on rainfall and temperature in Ibadan, Oyo State for a period of 40 years were obtained from Meteorological Section of Forestry Research Institute of Nigeria, Ibadan and Oyo State Meteorology Centre. Time series analysis was employed to analyze the data. The trend revealed that rainfall is decreasing slowly and temperature is averagely increasing year after year. The model for rainfall and temperature are Yₜ = 1454.11-8*t and Yₜ = 31.5995 + 2.54 E-02*t respectively, where t is the time. On this basis, a forecast of 20 years (2019-2038) was generated, and the results showed a further downward trend on rainfall and upward trend in temperature, this indicates persistence rainfall shortage and very hot weather for agricultural practices in the southwest rain forest ecological zone. Suggestions on possible solutions to avert climate change crisis and also promote climate-smart agriculture for sustainable food and nutrition security were also discussed.

Keywords: climate change, rainfall pattern, temperature, time series analysis, food and nutrition security

Procedia PDF Downloads 137
3385 Impact of Organic Farming on Soil Fertility and Microbial Activity

Authors: Menuka Maharjan

Abstract:

In the name of food security, agriculture intensification through conventional farming is being implemented in Nepal. Government focus on increasing agriculture production completely ignores soil as well human health. This leads to create serious soil degradation, i.e., reduction of soil fertility and microbial activity and health hazard in the country. On this note, organic farming is sustainable agriculture approach which can address challenge of sustaining food security while protecting the environment. This creates a win-win situation both for people and the environment. However, people have limited knowledge on significance of organic farming for environment conservation and food security especially developing countries like Nepal. Thus, the objective of the study was to assess the impacts of organic farming on soil fertility and microbial activity compared to conventional farming and forest in Chitwan, Nepal. Total soil organic carbon (C) was highest in organic farming (24 mg C g⁻¹ soil) followed by conventional farming (15 mg C g⁻¹ soil) and forest (9 mg C g⁻¹ soil) in the topsoil layer (0-10 cm depth). A similar trend was found for total nitrogen (N) content in all three land uses with organic farming soil possessing the highest total N content in both 0-10 cm and 10-20 cm depth. Microbial biomass C and N were also highest under organic farming, especially in the topsoil layer (350 and 46 mg g⁻¹ soil, respectively). Similarly, microbial biomass phosphorus (P) was higher (3.6 and 1.0 mg P kg⁻¹ at 0-10 and 10-20 cm depth, respectively) in organic farming compared to conventional farming and forest at both depths. However, conventional farming and forest soils had similar microbial biomass (C, N, and P) content. After conversion of forest, the P stock significantly increased by 373% and 170% in soil under organic farming at 0-10 and 10-20 cm depth, respectively. In conventional farming, the P stock increased by 64% and 36% at 0-10 cm and 10-20 cm depth, respectively, compared to forest. Overall, organic farming practices, i.e., crop rotation, residue input and farmyard manure application, significantly alters soil fertility and microbial activity. Organic farming system is emerging as a sustainable land use system which can address the issues of food security and environment conservation by increasing sustainable agriculture production and carbon sequestration, respectively, supporting to achieve goals of sustainable development.

Keywords: organic farming, soil fertility, micobial biomas, food security

Procedia PDF Downloads 172
3384 The Fusion of Blockchain and AI in Supply Chain Finance: Scalability in Distributed Systems

Authors: Wu You, Burra Venkata Durga Kumar

Abstract:

This study examines the promising potential of integrating Blockchain and Artificial Intelligence (AI) technologies to scalability in Distributed Systems within the field of supply chain finance. The finance industry is continually confronted with scalability challenges in its Distributed Systems, particularly within the supply chain finance sector, impacting efficiency and security. Blockchain, with its inherent attributes of high scalability and secure distributed ledger system, coupled with AI's strengths in optimizing data processing and decision-making, holds the key to innovating the industry's approach to these issues. This study elucidates the synergistic interplay between Blockchain and AI, detailing how their fusion can drive a significant transformation in the supply chain finance sector's Distributed Systems. It offers specific use-cases within this field to illustrate the practical implications and potential benefits of this technological convergence. The study also discusses future possibilities and current challenges in implementing this groundbreaking approach within the context of supply chain finance. It concludes that the intersection of Blockchain and AI could ignite a new epoch of enhanced efficiency, security, and transparency in the Distributed Systems of supply chain finance within the financial industry.

Keywords: blockchain, artificial intelligence (AI), scaled distributed systems, supply chain finance, efficiency and security

Procedia PDF Downloads 85
3383 Impact of COVID-19 Pandemic in the European Air Transport Command during 2020-2021

Authors: Martin Gascón Hove, Ralph Vermeltfoort, Alessandro Fiorini, Erwan Dulaurent, Henning von Perbandt

Abstract:

Introduction: The outbreak of the COVID-19 pandemic has completely changed the global health situation, with more than 400 million cases published and over 5 million deaths. European Air Transport Command (EATC) is integrated by seven nations, and among its capabilities is that of aeromedical evacuation (AM). Material and methods: Impact of novel coronavirus was analysed based on the number and characteristics of patients and executed missions within EATC and, particularly by Spain, during the biennium 2020-2021. Results: One thousand sixty patients were transported in 186 missions. Neither death nor disease contagion was reported during AM performances. Military cases transferred were 986, mostly routine priority (91,4%), and 74 were civilians, who were transported in 17 missions, and 81,1% of which were categorized as urgent. Niger led the list of original countries, with 191 evacuated patients. 76,1% of requests came from Italy and Germany. Airbus A310 was the most used aircraft (32,2%). Germany transported 222 patients of another nationality, while Spain executed eight missions and repatriated 68 cases, 58 of which were from Mali. Conclusions: COVID-19 has led to a surged number of evacuated patients inside EATC, which has proven to be a safe and effective means of transportation, even in critical cases. Spain has gained prominence since its annexation in 2015.

Keywords: COVID-19, SARS-CoV-2, pandemic, aviation, Spain

Procedia PDF Downloads 139
3382 Solving 94-Bit ECDLP with 70 Computers in Parallel

Authors: Shunsuke Miyoshi, Yasuyuki Nogami, Takuya Kusaka, Nariyoshi Yamai

Abstract:

Elliptic curve discrete logarithm problem (ECDLP) is one of problems on which the security of pairing-based cryptography is based. This paper considers Pollard's rho method to evaluate the security of ECDLP on Barreto-Naehrig (BN) curve that is an efficient pairing-friendly curve. Some techniques are proposed to make the rho method efficient. Especially, the group structure on BN curve, distinguished point method, and Montgomery trick are well-known techniques. This paper applies these techniques and shows its optimization. According to the experimental results for which a large-scale parallel system with MySQL is applied, 94-bit ECDLP was solved about 28 hours by parallelizing 71 computers.

Keywords: Pollard's rho method, BN curve, Montgomery multiplication

Procedia PDF Downloads 262
3381 A Study of the Impact of the Global Financial Crisis on the Financial Performance of Banks in Mauritius

Authors: Narvada Ramdhany, Reena Bhattu Babajee

Abstract:

The 2007-2008 Global Financial Crisis which initiated in the US had a global outreach, impacting the financial and banking sectors of several economies; such as European countries, developing and emerging countries in Asia, Latin America and Africa. European countries represent one of the main sources of export earnings for Mauritius and given that Europe has been quite profoundly affected by the crisis, the Mauritian economy also could have been negatively affected. This study is being undertaken to see if the crisis had a spill-over effect on the Mauritian banking system. It will also enable to determine if the measures put in place to counteract the crisis by regulatory authorities have been effective. The study will be carried out on 17 banks and data will be collected over a time frame of seven years; with a pre-crisis period from 2005 to 2007 and a post-crisis period from 2009 to 2011. The impact of the crisis as such will be measured through the financial performance of the banks, using financial ratios and regression analysis. The results show that during the period concerned Mauritian banks have remained solvent and relatively stable. One of the main explanations put forward to explain the resilience of the banking sector to the crisis is that foreign exposure was relatively low. Another explanation put forward is that Mauritian banks normally transact mainly with prime borrowers unlike most the banks which were affected by the financial crisis.  

Keywords: global financial crisis, banking sector, financial performance, Mauritian banks

Procedia PDF Downloads 433
3380 Cybersecurity Challenges in the Era of Open Banking

Authors: Krish Batra

Abstract:

The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.

Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices

Procedia PDF Downloads 52
3379 The Cost-Effectiveness of Pancreatic Surgical Cancer Care in the US vs. the European Union: Results of a Review of the Peer-Reviewed Scientific Literature

Authors: Shannon Hearney, Jeffrey Hoch

Abstract:

While all cancers are costly to treat, pancreatic cancer is a notoriously costly and deadly form of cancer. Across the world there are a variety of treatment centers ranging from small clinics to large, high-volume hospitals as well as differing structures of payment and access. It has been noted that centers that treat a high volume of pancreatic cancer patients have higher quality of care, it is unclear if that care is cost-effective. In the US there is no clear consensus on the cost-effectiveness of high-volume centers for the surgical care of pancreatic cancer. Other European countries, like Finland and Italy have shown that high-volume centers have lower mortality rates and can have lower costs, there however, is still a gap in knowledge about these centers cost-effectiveness globally. This paper seeks to review the current literature in Europe and the US to gain a better understanding of the state of high-volume pancreatic surgical centers cost-effectiveness while considering the contextual differences in health system structure. A review of major reference databases such as Medline, Embase and PubMed will be conducted for cost-effectiveness studies on the surgical treatment of pancreatic cancer at high-volume centers. Possible MeSH terms to be included, but not limited to, are: “pancreatic cancer”, “cost analysis”, “cost-effectiveness”, “economic evaluation”, “pancreatic neoplasms”, “surgical”, “Europe” “socialized medicine”, “privatized medicine”, “for-profit”, and “high-volume”. Studies must also have been available in the English language. This review will encompass European scientific literature, as well as those in the US. Based on our preliminary findings, we anticipate high-volume hospitals to provide better care at greater costs. We anticipate that high-volume hospitals may be cost-effective in different contexts depending on the national structure of a healthcare system. Countries with more centralized and socialized healthcare may yield results that are more cost-effective. High-volume centers may differ in their cost-effectiveness of the surgical care of pancreatic cancer internationally especially when comparing those in the United States to others throughout Europe.

Keywords: cost-effectiveness analysis, economic evaluation, pancreatic cancer, scientific literature review

Procedia PDF Downloads 87
3378 "Prezafe" to "Parizafe": Parallel Development of Izafe in Germanic

Authors: Yexin Qu

Abstract:

Izafe is a construction typically found in Iranian languages, which is attested already in Old Avestan and Old Persian. The narrow sense of izafe can be described as the linear structure of [NP pt Modifier] with pt as an uninflectable particle or clitic. The history of the Iranian izafe has the following stages: Stage I: Verbless nominal relative clauses, Stage II: Verbless nominal relative clauses with Case Attraction; and Stage III: Narrow sense izafe. Previous works suggest that embedded relative clauses and correlatives in other Indo-European languages might be relevant for the source of the izafe-construction. Stage I, as the precursor of narrow sense izafe, or so-called “prezafe” is not found in branches other than Iranian. Comparable cases have been demonstrated in Vedic, Greek, and some rare cases in Latin. This suggests “prezafe” may date back very early in Indo-European. Izafe-like structures are not attested in branches such as Balto-Slavic and Germanic, but Balto-Slavic definite adjectives and Germanic weak adjectives can be compared to the verbless nominal relative clauses and analyzed as developments of verbless relative clauses parallel to izafe in Indo-Iranian, as are called “parizafe” in this paper. In this paper, the verbless RC is compared with Germanic weak adjectives. The Germanic languages used n-stem derivation to form determined derivatives, which are semantically equivalent to the appositive RC and eventually became weak adjectives. To be more precise, starting from an adjective “X”, the Germanic weak adjective structure is formed as [det X-n], literally “the X”, with the meaning “the X one”, which can be shown to be semantically equivalent to “the one which is X”. In this paper, Stage I suggest that, syntactically, the Germanic verbless relative clauses went through CP to DP relabeling like Iranian, based on the following observations: (1) Germanic relative pronouns (e.g., Gothic saei, Old English se) and determiners (e.g., Gothic sa, Old English se) are both from the *so/to pronominal roots; (2) the semantic equivalence of Germanic weak adjectives and the izafe structure. This may suggest that Germanic may also have had “Prezafe” Stages I and II. In conclusion: “Prezafe” in Stage I may have been a phenomenon of the proto-language, Stage II was the result of independent parallel developments and then each branch had its own strategy.

Keywords: izafe, relative clause, Germanic, Indo-European

Procedia PDF Downloads 63
3377 Security in Resource Constraints: Network Energy Efficient Encryption

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.

Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC

Procedia PDF Downloads 139
3376 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 120
3375 Decision Making on Smart Energy Grid Development for Availability and Security of Supply Achievement Using Reliability Merits

Authors: F. Iberraken, R. Medjoudj, D. Aissani

Abstract:

The development of the smart grids concept is built around two separate definitions, namely: The European one oriented towards sustainable development and the American one oriented towards reliability and security of supply. In this paper, we have investigated reliability merits enabling decision-makers to provide a high quality of service. It is based on system behavior using interruptions and failures modeling and forecasting from one hand and on the contribution of information and communication technologies (ICT) to mitigate catastrophic ones such as blackouts from the other hand. It was found that this concept has been adopted by developing and emerging countries in short and medium terms followed by sustainability concept at long term planning. This work has highlighted the reliability merits such as: Benefits, opportunities, costs and risks considered as consistent units of measuring power customer satisfaction. From the decision making point of view, we have used the analytic hierarchy process (AHP) to achieve customer satisfaction, based on the reliability merits and the contribution of such energy resources. Certainly nowadays, fossil and nuclear ones are dominating energy production but great advances are already made to jump into cleaner ones. It was demonstrated that theses resources are not only environmentally but also economically and socially sustainable. The paper is organized as follows: Section one is devoted to the introduction, where an implicit review of smart grids development is given for the two main concepts (for USA and Europeans countries). The AHP method and the BOCR developments of reliability merits against power customer satisfaction are developed in section two. The benefits where expressed by the high level of availability, maintenance actions applicability and power quality. Opportunities were highlighted by the implementation of ICT in data transfer and processing, the mastering of peak demand control, the decentralization of the production and the power system management in default conditions. Costs were evaluated using cost-benefit analysis, including the investment expenditures in network security, becoming a target to hackers and terrorists, and the profits of operating as decentralized systems, with a reduced energy not supplied, thanks to the availability of storage units issued from renewable resources and to the current power lines (CPL) enabling the power dispatcher to manage optimally the load shedding. For risks, we have razed the adhesion of citizens to contribute financially to the system and to the utility restructuring. What is the degree of their agreement compared to the guarantees proposed by the managers about the information integrity? From technical point of view, have they sufficient information and knowledge to meet a smart home and a smart system? In section three, an application of AHP method is made to achieve power customer satisfaction based on the main energy resources as alternatives, using knowledge issued from a country that has a great advance in energy mutation. Results and discussions are given in section four. It was given us to conclude that the option to a given resource depends on the attitude of the decision maker (prudent, optimistic or pessimistic), and that status quo is neither sustainable nor satisfactory.

Keywords: reliability, AHP, renewable energy resources, smart grids

Procedia PDF Downloads 440
3374 Assessing the Impact of the Rome II Regulation's General Rule on Cross-Border Road Traffic Accidents: A Critique of Recent Case Law

Authors: Emma Roberts

Abstract:

The Rome II Regulation has established a uniform regime of conflict of law rules across the European Union (except for Denmark) which determines the law applicable in non-contractual obligations disputes. It marks a significant development towards the Europeanization of private international law and aims to provide the most appropriate connecting factors to achieve both legal certainty and justice in individual cases. Many non-contractual obligations are recognised to present such distinct factors that, to achieve these aims, a special rule is provided for determining the applicable law in cases in respect of product liability and environmental torts, for example. Throughout the legislative process, the European Parliament sought to establish a separate rule for road traffic accidents, recognising that these cases too present such novel situations that a blanket application of a lex loci damni approach would not provide an appropriate answer. Such attempts were rejected and, as a result, cases arising out of road traffic accidents are subject to the Regulation’s general lex loci damni rule along with its escape clause and limited exception. This paper offers a critique of the Regulation’s response to cross-border road traffic accident cases. In England and Wales, there have been few cases that have applied the Regulation’s provisions to date, but significantly the majority of such cases are in respect of road traffic accidents. This paper examines the decisions in those cases and challenges the legislators’ decision not to provide a special rule for such incidences. Owing to the diversity in compensation systems globally, applying the Regulation’s general rule to cases of road traffic accidents – given the breadth of matters that are to be subject to the lex cause – cannot ensure an outcome that provides ‘justice in individual cases’ as is assured by the Regulation's recitals. Not only does this paper suggest that the absence of a special rule for road traffic accidents means that the Regulation fails to achieve one of its principal aims, but it further makes out a compelling case for the legislative body of the European Union to implement a corrective instrument.

Keywords: accidents abroad, applicable law, cross-border torts, non-contractual obligations, road traffic accidents

Procedia PDF Downloads 253
3373 Cyber Security and Risk Assessment of the e-Banking Services

Authors: Aisha F. Bushager

Abstract:

Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.

Keywords: cyber security, e-banking, risk assessment, threats identification

Procedia PDF Downloads 346
3372 Achieving Sustainable Development Through the Lens of Eco-innovation, Renewable Energy, and Human Capital

Authors: Emma Serwaa Obobisa, Winifred Essaah

Abstract:

Significant worldwide trends including urbanization, industrialization, globalization, and the impending digitization have all contributed to human prosperity. However, the majority of these advancements fail to take sustainability into account, which caused the earth to manifest its retaliation in many forms. Since the world is already well-advanced, mankind needs a mature development that instills sustainability in its acts. As a result, the United Nations established the Sustainable Development Goals (SDGs), which set forth guidelines for human behavior to ensure that the ecosystem and mankind coexist as a unified, autonomous system. The study investigates the role of eco-innovation, renewable energy consumption, human capital, environmental tax, and natural resources in achieving European Union countries' sustainable development goals. The results show that eco-innovation, renewable energy consumption, human capital, and environmental tax have a negative relationship with consumption-based CO₂ emissions but a positive relationship with natural resources. These findings suggest that governments in European Union countries commit to encouraging environmentally friendly technology advances and green investment. It also stresses the need to enforce regulations that regulate the activities of polluting firms in the region with strictness.

Keywords: sustainable development, Eco-innovation, renewable energy, CO₂ emissions

Procedia PDF Downloads 33
3371 ISIS Women Recruitment in Spain and De-Radicalization Programs in Prisons

Authors: Inmaculada Yuste Martinez

Abstract:

Since July 5, 2014, Abubaker al Bagdadi, leader of the Islamic State since 2010 climbed the pulpit of the Great Mosque of Al Nuri of Mosul and proclaimed the Caliphate, the number of fighters who have travelled to Syria to join the Caliphate has increased as never before. Although it is true that the phenomenon of foreign fighters is not a new phenomenon, as it occurred after the Spanish Civil War, Republicans from Ireland and the conflict of the Balkans among others, it is highly relevant the fact that in this case, it has reached figures unknown in Europe until now. The approval of the resolution 2178 (2014) of the Security Council, foreign terrorist fighters placed the subject a priority position on the International agenda. The available data allow us to affirm that women have increasingly assumed operative functions in jihadist terrorism and in the activities linked to it in the development of attacks in the European Union, including minors and young adults. In the case of Spain, one in four of the detainees in 2016 were women, a significant increase compared to 2015. This contrasts with the fact that until 2014 no woman had been prosecuted in Spain for terrorist activities of a jihadist nature. It is fundamental when we talk about the prevention of radicalization and counterterrorism that we do not underestimate the potential threat to the security of countries like Spain that women from the West can assume to the global jihadist movement. This work aims to deepen the radicalization processes of these women and their profiles influencing the female inmate population. It also wants to focus on the importance of creating de-radicalization programs for these inmates since women are a crucial element in radicalization processes. A special focus it is made on young radicalized female inmate population as this target group is the most recoverable and on which it would result more fruitful to intervene. De-radicalization programs must also be designed to fit their profiles and circumstances; a sensitive environment will be prisons and juvenile centers, areas that until now had been unrelated to this problem and which are already hosting the first convicted in judicial offices in Spanish territory. A qualitative research and an empirical and analytical method has been implemented in this work, focused on the cases that took place in Spain of young women and the imaginary that the Islamic State uses for the processes of radicalization for this target group and how it does not fit with their real role in the Jihad, as opposed to other movements in which women do have a real and active role in the armed conflict as YPJ do it as a part of the armed wing of the Democratic Union Party of Syria.

Keywords: caliphate, de-radicalization, foreign fighter, gender perspective, ISIS, jihadism, recruitment

Procedia PDF Downloads 166
3370 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 394
3369 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 109
3368 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies

Authors: Arun Prabhakar

Abstract:

Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.

Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling

Procedia PDF Downloads 134
3367 The Economic Impact of Mediation: An Analysis in Time of Crisis

Authors: C. M. Cebola, V. H. Ferreira

Abstract:

In the past decade mediation has been legally implemented in European legal systems, especially after the publication by the European Union of the Directive 2008/52/EC on certain aspects of mediation in civil and mercantile matters. Developments in international trade and globalization in this new century have led to an increase of the number of litigations, often cross-border, and the courts have failed to respond adequately. We do not advocate that mediation should be promoted as the solution for all justice problems, but as a means with its own specificities that the parties may choose to consider as the best way to resolve their disputes. Thus, the implementation of mediation should be based on the advantages of its application. From the economic point of view, competitive negotiation can generate negative external effects in social terms. A solution reached in a court of law is not always the most efficient one considering all elements of society (economic social benefit). On the other hand, the administration of justice adds in economic terms transaction costs that can be mitigated by the application of other forms of conflict resolution, such as mediation. In this paper, the economic benefits of mediation will be analysed in the light of various studies on the functioning of justice. Several theoretical arguments will be confronted with empirical studies to demonstrate that mediation has significant positive economic effects. The objective is to contribute to the dissemination of mediation between companies and citizens, but also to demonstrate the cost to governments and states of still limited use of mediation, particularly in the current economic crisis and propose actions to develop the application of mediation.

Keywords: economic impact, litigation costs, mediation, solutions

Procedia PDF Downloads 277
3366 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices

Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman

Abstract:

The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.

Keywords: hospital, light fidelity, Li-Fi, medical devices, security

Procedia PDF Downloads 98
3365 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han

Abstract:

As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.

Keywords: actuator, user authentication, security evaluation, haptic actuator

Procedia PDF Downloads 341
3364 World on the Edge: Migration and Cross Border Crimes in West Africa

Authors: Adeyemi Kamil Hamzah

Abstract:

The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.

Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation

Procedia PDF Downloads 220
3363 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment

Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

Abstract:

In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.

Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment

Procedia PDF Downloads 173
3362 Gypsum Composites with CDW as Raw Material

Authors: R. Santos Jiménez, A. San-Antonio-González, M. del Río Merino, M. González Cortina, C. Viñas Arrebola

Abstract:

On average, Europe generates around 890 million tons of construction and demolition waste (CDW) per year and only 50% of these CDW are recycled. This is far from the objectives determined in the European Directive for 2020 and aware of this situation, the European Countries are implementing national policies to prevent the waste that can be avoidable and to promote measures to increase recycling and recovering. In Spain, one of these measures has been the development of a CDW recycling guide for the manufacture of mortar, concrete, bricks and lightweight aggregates. However, there is still not enough information on the possibility of incorporating CDW materials in the manufacture of gypsum products. In view of the foregoing, the Universidad Politécnica de Madrid is creating a database with information on the possibility of incorporating CDW materials in the manufacture of gypsum products. The objective of this study is to improve this database by analysing the feasibility of incorporating two different CDW in a gypsum matrix: ceramic waste bricks (perforated brick and double hollow brick), and extruded polystyrene (XPS) waste. Results show that it is possible to incorporate up to 25% of ceramic waste and 4% of XPS waste over the weight of gypsum in a gypsum matrix. Furhtermore, with the addition of ceramic waste an 8% of surface hardness increase and a 25% of capillary water absorption reduction can be obtained. On the other hand, with the addition of XPS, a 26% reduction of density and a 37% improvement of thermal conductivity can be obtained.

Keywords: CDW, waste materials, ceramic waste, XPS, construction materials, gypsum

Procedia PDF Downloads 506
3361 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security

Authors: Carmen J. Savelli, Romy Conzade

Abstract:

Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.

Keywords: food safety, food security, nutrition, policy

Procedia PDF Downloads 416
3360 The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues

Authors: Akram Waheb Nasef Alzordoky

Abstract:

The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 14
3359 Determinants of International Volatility Passthroughs of Agricultural Commodities: A Panel Analysis of Developing Countries

Authors: Tetsuji Tanaka, Jin Guo

Abstract:

The extant literature has not succeeded in uncovering the common determinants of price volatility transmissions of agricultural commodities from international to local markets, and further, has rarely investigated the role of self-sufficiency measures in the context of national food security. We analyzed various factors to determine the degree of price volatility transmissions of wheat, rice, and maize between world and domestic markets using GARCH models with dynamic conditional correlation (DCC) specifications and panel-feasible generalized least square models. We found that the grain autarky system has the potential to diminish volatility pass-throughs for three grain commodities. Furthermore, it was discovered that the substitutive commodity consumption behavior between maize and wheat buffers the volatility transmissions of both, but rice does not function as a transmission-relieving element, either for the volatilities of wheat or maize. The effectiveness of grain consumption substitution to insulate the pass-throughs from global markets is greater than that of cereal self-sufficiency. These implications are extremely beneficial for developing governments to protect their domestic food markets from uncertainty in foreign countries and as such, improves food security.

Keywords: food security, GARCH, grain self-sufficiency, volatility transmission

Procedia PDF Downloads 153
3358 Climate Change and Human Migration

Authors: Sungwoo Park

Abstract:

The paper attempts to investigate the correlation between climate change and migration that has caused violent disputes in some regions of the world. Recently, NGOs and educational institutions have proposed claims that migratory patterns and violent uprisings are intertwined with climate change. Thus, the paper is primarily concerned with collecting evidences provided from scholars, validating this significant connection between climate change and migration, and evaluating and suggesting current and future research approaches respectively to enhance the acknowledgment and protection of environmental refugees. In order to examine the linkage of environmental migration, primary sources, such as political speeches, and secondary sources like theses from environmental policy analysts, books, and reports are used. More specifically, the investigation focuses on an civil war in Syria to draw a connection between environmental migration and violent dispute that threatens the global security. The examination undertaken specifically analyzes examples where forced migration occurred due to climate change. In Bangladesh, Pakistan, and Kiribati, residents have been at risk of fleeing their countries because of abnormal climate patterns, such as the rise of sea level or an excessive heat stress. As the brutal uprising in Syria has proven that climate change can pose a significant threat to global security, correlation between climate change and migration is surely worth delving into.

Keywords: climate change, climate migration, global security, refugee crisis

Procedia PDF Downloads 343
3357 PhD Students’ Challenges with Impact-Factor in Kazakhstan

Authors: Duishon Shamatov

Abstract:

This presentation is about Kazakhstan’s PhD students’ experiences with impact-factor publication requirement. Since the break-up of the USSR, Kazakhstan has been attempting to improve its higher education system at undergraduate and graduate levels. From March, 2010 Kazakhstan joined Bologna process and entered European space of higher education. To align with the European system of higher education, three level of preparation of specialists (undergraduate, master and PhD) was adopted to replace the Soviet system. The changes were aimed at promoting high quality higher education that meets the demands of labor market and growing needs of the industrial-innovative development of the country, and meeting the international standards. The shift to the European system has brought many benefits, but there are also some serious challenges. One of those challenges is related to the requirements for the PhD candidates to publish in national and international journals. Thus, a PhD candidate should have 7 publications in total, out of which one has to be in an international impact factor journal. A qualitative research was conducted to explore the PhD students’ views of their experiences with impact-factor publications. With the help of purposeful sampling, 30 PhD students from seven universities across Kazakhstan were selected for individual and focus group interviews. The key findings of the study are as follows. While the Kazakh PhD students have no difficulties in publishing in local journals, they face great challenges in attempting to publish in impact-factor journals for a range of reasons. They include but not limited to lack of research and publication skills, poorer knowledge of academic English, not familiarity with the peer review publication processes and expectations, and very short time to get published due to their PhD programme requirements. This situation is pushing some these young scholars explore alternative ways to get published in impact factor journals and they seek to publish by any means and often by any costs (which means even paying large sum of money for a publication). This in turn, creates a myth in the scholars’ circles in Kazakhstan, that to get published in impact factor journals, one should necessarily pay much money. This paper offers some policy recommendations on how to improve preparation of future PhD candidates in Kazakhstan.

Keywords: Bologna process, impact-factor publications, post-graduate education, Kazakhstan

Procedia PDF Downloads 374