Search results for: income security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4357

Search results for: income security

3427 Effect of Ease of Doing Business to Economic Growth among Selected Countries in Asia

Authors: Teodorica G. Ani

Abstract:

Economic activity requires an encouraging regulatory environment and effective rules that are transparent and accessible to all. The World Bank has been publishing the annual Doing Business reports since 2004 to investigate the scope and manner of regulations that enhance business activity and those that constrain it. A streamlined business environment supporting the development of competitive small and medium enterprises (SMEs) may expand employment opportunities and improve the living conditions of low income households. Asia has emerged as one of the most attractive markets in the world. Economies in East Asia and the Pacific were among the most active in making it easier for local firms to do business. The study aimed to describe the ease of doing business and its effect to economic growth among selected economies in Asia for the year 2014. The study covered 29 economies in East Asia, Southeast Asia, South Asia and Middle Asia. Ease of doing business is measured by the Doing Business indicators (DBI) of the World Bank. The indicators cover ten aspects of the ease of doing business such as starting a business, dealing with construction permits, getting electricity, registering property, getting credit, protecting investors, paying taxes, trading across borders, enforcing contracts and resolving insolvency. In the study, Gross Domestic Product (GDP) was used as the proxy variable for economic growth. Descriptive research was the research design used. Graphical analysis was used to describe the income and doing business among selected economies. In addition, multiple regression was used to determine the effect of doing business to economic growth. The study presented the income among selected economies. The graph showed China has the highest income while Maldives produces the lowest and that observation were supported by gathered literatures. The study also presented the status of the ten indicators of doing business among selected economies. The graphs showed varying trends on how easy to start a business, deal with construction permits and to register property. Starting a business is easiest in Singapore followed by Hong Kong. The study found out that the variations in ease of doing business is explained by starting a business, dealing with construction permits and registering property. Moreover, an explanation of the regression result implies that a day increase in the average number of days it takes to complete a procedure will decrease the value of GDP in general. The research proposed inputs to policy which may increase the awareness of local government units of different economies on the simplification of the policies of the different components used in measuring doing business.

Keywords: doing business, economic growth, gross domestic product, Asia

Procedia PDF Downloads 379
3426 China and the Criminalization of Aggression. The Juxtaposition of Justice and the Maintenance of International Peace and Security

Authors: Elisabetta Baldassini

Abstract:

Responses to atrocities are always unique and context-dependent. They cannot be foretold nor easily prompted. However, the events of the twentieth century had set the scene for the international community to explore new and more robust systems in response to war atrocities, with the ultimate goal being the restoration and maintenance of peace and security. The outlawry of war and the attribution of individual liability for international crimes were two major landmarks that set the roots for the development of international criminal law. From the London Conference (1945) for the establishment of the first international military tribunal in Nuremberg to Rome at the inauguration of the first permanent international criminal court, the development of international criminal law has shaped in itself a fluctuating degree of tensions between justice and maintenance of international peace and security, the cardinal dichotomy of this article. The adoption of judicial measures to achieve peace indeed set justice as an essential feature at the heart of the new international system. Blackhole of this dichotomy is the crime of aggression. Aggression was at first the key component of a wide body of peace projects prosecuted under the charges of crimes against peace. However, the wide array of controversies around aggression mostly related to its definition, determination and the involvement of the Security Council silenced, partly, a degree of efforts and agreements. Notwithstanding the establishment of the International Criminal Court (ICC), jurisdiction over the crime of aggression was suspended until an agreement over the definition and the conditions for the Court’s exercise of jurisdiction was reached. Compromised over the crime was achieved in Kampala in 2010 and the Court’s jurisdiction over the crime of aggression was eventually activated on 17 July 2018. China has steadily supported the advancement of international criminal justice together with the establishment of a permanent international judicial body to prosecute grave crimes and has proactively participated at the various stages of the codification and development of the crime of aggression. However, China has also expressed systematic reservations and setbacks. With the use of primary and secondary sources, including semi-structured interviews, this research aims at analyzing the role that China has played throughout the substantive historical development of the crime of aggression, demonstrating a sharp inclination in the maintenance of international peace and security. Such state behavior seems to reflect national and international political mechanisms that gravitate around a distinct rationale that involves a share of culture and tradition.

Keywords: maintenance of peace and security, cultural expression of justice, crime of aggression, China

Procedia PDF Downloads 228
3425 Determination of Cr Content in Canned Fish Marketed in Iran

Authors: Soheil Sobhanardakani, Seyed Vali Hosseini, Lima Tayebi

Abstract:

The presence of heavy metals in the environment could constitute a hazard to food security and public health. These can be accumulated in aquatic animals such as fish. Samples of four popular brands of canned fish in the Iranian market (yellowfin tuna, common Kilka, Kawakawa, and longtail tuna) were analyzed for level of Cr after wet digestion with acids using graphite furnace atomic absorption spectrophotometry. The mean concentrations for Cr in the different brands were: 2.57, 3.24, 3.16, and 1.65 μg/g for brands A, B, C, and D respectively. Significant differences were observed in the Cr levels between all of the different brands of canned fish evaluated in this study. The Cr concentrations for the varieties of canned fishes were generally within the FAO/WHO, U.S. FDA, and U.S. EPA recommended limits for fish.

Keywords: heavy metals, essential metals, canned fish, food security

Procedia PDF Downloads 293
3424 Cultural Omnivorousness in Fikirtepe Urban Regenaration Area

Authors: Burcin Basyazici

Abstract:

The history of urban regeneration in Istanbul dates to the 1980s and has been generated by various reasons, from political state-based decisions to cultural migrations and/or translocations and economical private sector-based reasons. However, one of the latest regeneration areas in Fikirtepe that have been still under construction for ten years becomes dissimilar to other regeneration areas in Istanbul. The region is located very close to Kadıkoy's downtown area but was still considered a slum due to its inhabitants -who mostly belong to lower-income immigrants. The process begun in 2011 with the decision of the government, and the settlement has been emptied and demolished also by the government -together with the investors and construction companies. Although there has been much research on the process of deconstruction and the relocation of landlords, there hasn’t been any research on what happened after the regeneration. While many high-rise luxurious gated communities were constructed and inhabited in five years, many constructions have stopped due to the latest economic devastation in Turkey. Then the region stayed as an unfinished construction area with its new upper-income and upper-middle-income residents and old low-income landlords. This situation has also changed the commercial activities in Fikirtepe. While some new retail facilities have been offered for new residents, some of the oldest ones have also survived in new-Fikirtepe. This study aims to investigate the urban everyday life of Fikirtepe with relation to its retail-based regeneration with the help of the theories of Bourdieu called cultural capital and cultural omnivorousness. To achieve this aim, after presenting the historical background of urban regeneration in Istanbul, Bourdieu’s conceptualism of cultural capital, habitus, and the consumption tendencies related to those are introduced and discussed within the scope of the Fikirtepe case. To represent the retail-based regeneration in the area, the current situation of retail premises is mapped by comparing to its pre-situation before urban gentrification. To better understand the change of cultural capital and the consumption tendencies of the new residents, eighteen semi-structured in-depth interviews have been conducted with twelve inhabitants from three different luxurious gated communities and six shop owners containing the new ones after regeneration and old ones before it. The interview questions have been structured to understand the motivation of change and/or inhibition of retail premises and the consumption tendencies of the new residents. In conclusion, the study shows that even though the cultural capital has been changed in Fikirtepe, the new residents also tend to act as culturally omnivorous by referring to Bourdieu's theories on multi-cultural tendencies of the upper-class and upper-middle-class societies, that should be questioned regarding the cultural regeneration in in-town urban regeneration areas in metropoles.

Keywords: bourdieu, cultural omnivorousness, fikirtepe, urban regeneration in istanbul

Procedia PDF Downloads 163
3423 Calibrating Risk Factors for Road Safety in Low Income Countries

Authors: Atheer Al-Nuaimi, Harry Evdorides

Abstract:

Daily, many individuals die or get harmed on streets around the globe, which requires more particular solutions for transport safety issues. International road assessment program (iRAP) is one of the models that are considering many variables which influence road user’s safety. In iRAP, roads have been partitioned into five-star ratings from 1 star (the most reduced level) to 5 star (the most noteworthy level). These levels are calculated from risk factors which represent the effect of the geometric and traffic conditions on rod safety. The result of iRAP philosophy are the countermeasures that can be utilized to enhance safety levels and lessen fatalities numbers. These countermeasures can be utilized independently as a single treatment or in combination with other countermeasures for a section or an entire road. There is a general understanding that the efficiency of a countermeasure is liable to reduction when it is used in combination with various countermeasures. That is, crash diminishment estimations of single countermeasures cannot be summed easily. In the iRAP model, the fatalities estimations are calculated using a specific methodology. However, this methodology suffers overestimations. Therefore, this study has developed a calibration method to estimate fatalities numbers more accurately.

Keywords: crash risk factors, international road assessment program, low-income countries, road safety

Procedia PDF Downloads 146
3422 View Synthesis of Kinetic Depth Imagery for 3D Security X-Ray Imaging

Authors: O. Abusaeeda, J. P. O. Evans, D. Downes

Abstract:

We demonstrate the synthesis of intermediary views within a sequence of X-ray images that exhibit depth from motion or kinetic depth effect in a visual display. Each synthetic image replaces the requirement for a linear X-ray detector array during the image acquisition process. Scale invariant feature transform, SIFT, in combination with epipolar morphing is employed to produce synthetic imagery. Comparison between synthetic and ground truth images is reported to quantify the performance of the approach. Our work is a key aspect in the development of a 3D imaging modality for the screening of luggage at airport checkpoints. This programme of research is in collaboration with the UK Home Office and the US Dept. of Homeland Security.

Keywords: X-ray, kinetic depth, KDE, view synthesis

Procedia PDF Downloads 265
3421 Power, Pluralism, and History: Norms in International Societies

Authors: Nicole Cervenka

Abstract:

On the question of norms in international politics, scholars are divided over whether norms are a tool for power politics or a genuine reflection of an emergent international society. The line is drawn between rationalism and idealism, but this dialectical relationship needs to be broken down if we hope to come to a comprehensive understanding of how norms play out in international society. The concept of an elusive international society is a simplification of a more pluralistic, cosmopolitan, and diverse collection of international societies. The English School effectively overcomes realist-idealist dichotomies and provides a pluralistic, comprehensive explanation and description of international societies through its application to two distinct areas: human rights as well as security and war. We argue that international norms have always been present in human rights, war, and international security, forming international societies that can be complimentary or oppositional, beneficial or problematic. Power politics are present, but they can only be regarded as partially explanatory of the role of norms in international politics, which must also include history, international law, the media, NGOs, and others to fully represent the normative influences in international societies. A side-by-side comparison of international norms of war/security and human rights show how much international societies converge. World War II was a turning point in terms of international law, these forces of international society have deeper historical roots. Norms of human rights and war/security are often norms of restraint, guiding appropriate treatment of individuals. This can at times give primacy to the individual over the sovereign state. However, state power politics and hegemony are still intact. It cannot be said that there is an emergent international society—international societies are part of broader historical backdrops. Furthermore, states and, more generally, power politics, are important components in international societies, but international norms are far from mere tools of power politics. They define a more diverse, complicated, and ever-present conception of international societies.

Keywords: English school, international societies, norms, pluralism

Procedia PDF Downloads 384
3420 Opportunities for Reducing Post-Harvest Losses of Cactus Pear (Opuntia Ficus-Indica) to Improve Small-Holder Farmers Income in Eastern Tigray, Northern Ethiopia: Value Chain Approach

Authors: Meron Zenaselase Rata, Euridice Leyequien Abarca

Abstract:

The production of major crops in Northern Ethiopia, especially the Tigray Region, is at subsistence level due to drought, erratic rainfall, and poor soil fertility. Since cactus pear is a drought-resistant plant, it is considered as a lifesaver fruit and a strategy for poverty reduction in a drought-affected area of the region. Despite its contribution to household income and food security in the area, the cactus pear sub-sector is experiencing many constraints with limited attention given to its post-harvest loss management. Therefore, this research was carried out to identify opportunities for reducing post-harvest losses and recommend possible strategies to reduce post-harvest losses, thereby improving production and smallholder’s income. Both probability and non-probability sampling techniques were employed to collect the data. Ganta Afeshum district was selected from Eastern Tigray, and two peasant associations (Buket and Golea) were also selected from the district purposively for being potential in cactus pear production. Simple random sampling techniques were employed to survey 30 households from each of the two peasant associations, and a semi-structured questionnaire was used as a tool for data collection. Moreover, in this research 2 collectors, 2 wholesalers, 1 processor, 3 retailers, 2 consumers were interviewed; and two focus group discussion was also done with 14 key farmers using semi-structured checklist; and key informant interview with governmental and non-governmental organizations were interviewed to gather more information about the cactus pear production, post-harvest losses, the strategies used to reduce the post-harvest losses and suggestions to improve the post-harvest management. To enter and analyze the quantitative data, SPSS version 20 was used, whereas MS-word were used to transcribe the qualitative data. The data were presented using frequency and descriptive tables and graphs. The data analysis was also done using a chain map, correlations, stakeholder matrix, and gross margin. Mean comparisons like ANOVA and t-test between variables were used. The analysis result shows that the present cactus pear value chain involves main actors and supporters. However, there is inadequate information flow and informal market linkages among actors in the cactus pear value chain. The farmer's gross margin is higher when they sell to the processor than sell to collectors. The significant postharvest loss in the cactus pear value chain is at the producer level, followed by wholesalers and retailers. The maximum and minimum volume of post-harvest losses at the producer level is 4212 and 240 kgs per season. The post-harvest loss was caused by limited farmers skill on-farm management and harvesting, low market price, limited market information, absence of producer organization, poor post-harvest handling, absence of cold storage, absence of collection centers, poor infrastructure, inadequate credit access, using traditional transportation system, absence of quality control, illegal traders, inadequate research and extension services and using inappropriate packaging material. Therefore, some of the recommendations were providing adequate practical training, forming producer organizations, and constructing collection centers.

Keywords: cactus pear, post-harvest losses, profit margin, value-chain

Procedia PDF Downloads 131
3419 Research on Malware Application Patterns of Using Permission Monitoring System

Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim

Abstract:

This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.

Keywords: malware patterns, application permission, application analysis, security

Procedia PDF Downloads 525
3418 Interventions to Improve the Performance of Community Based Health Insurance in Low- and Lower Middle-Income-Countries: a Systematic Review

Authors: Scarlet Tabot Enanga Longsti

Abstract:

Community-Based Health Insurance (CBHI) schemes have been proposed as a possible means to achieve affordable health care in low-and lower-middle-income countries. The existing evidence provides mixed results on the impact of CBHI schemes on healthcare utilisation and out -of-pocket payments (OOPP) for healthcare. Over 900 CBHI schemes have been implemented in underdeveloped countries, and these schemes have undergone different modifications over the years. Prior reviews have suggested that different designs of CBHI schemes may result in different outcomes. Objectives: This review sought to determine the interventions that affect the impact of CBHI schemes on OOPP and health service utilisation. Interventions in this study referred to any action or modification in the design of a CBHI scheme that affected the impact of the scheme on OOPP and/or healthcare utilization. Methods: Any CBHI study that was done in a lower middle-income country, that used an experimental design, that included OOPP or health care utilisation as outcome variables, and that was published in either English or French was included in this study. Studies were searched for in MEDLINE, Embase, CINAHL, EconLit, IBSS, Web of Science, Cochrane Library, and Global Index Medicus from July to August 2023. Bias was assessed using Joanna Brigs Institute tools for quality assessment for randomized control trials and quasi experimental studies. A narrative synthesis was done. Results: 12 studies were included in the review, with a total of 69 villages, 13,653 households, and 62,786 participants. Average premium collection was 4.8 USD/year. Most CBHI schemes had flat rates. The study revealed that a range of interventions impact OOPP and health care utilisation. Five categories of interventions were identified. The intervention with the highest impact on OOPP and utilisation was “Audit visits”. Next in line came external funds, training scheme workers, and engaging community leaders and village heads to advertise the scheme. Free healthcare led to a significant increase in utilisation of health services, a significant reduction in Catastrophic health expenditure, but an insignificant effect on OOPP among insured compared with uninsured. Conclusions: Community-Based Health Insurance could pave the way for Universal Health Care in low and middle-income countries. However, this can only be possible if careful thought is given to how schemes are designed. Due to the heterogeneity of studies and results on CBHI schemes, there is need for further research for more effective designs to be developed.

Keywords: community based health insurance, developing countries, health service utilisation, out of pocket payment

Procedia PDF Downloads 67
3417 Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey

Authors: Priti Kumari, Tricha Anjali

Abstract:

Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.

Keywords: attacks, body area network, key distribution, key refreshment, pre-shared keys

Procedia PDF Downloads 364
3416 Society-Centric Warfare: Lessons from Afghanistan

Authors: Amin Tarzi

Abstract:

The government of the Islamic Republic of Afghanistan was expected to keep the Taliban insurgents at bay after the departure of North Atlantic Treaty Organization (NATO)-led forces in 2021, especially given the two decades of effort to establish security forces to safeguard Western-backed governing institutions. This articles reviews the reasons for the failure of the much larger and better-equipped Afghan National Security Forces (ANSF) to stop the Taliban from taking over the Afghan capital of Kabul in a few days and analyzes the often-forgotten dimension of strategic calculations in this dialogue—namely the societal dimension. In this article, the author argues that this is one of the primary reasons that the ANSF and the Afghan government collapsed.

Keywords: societal warfare, Afghanistan, NATO, Taliban, military strategy

Procedia PDF Downloads 100
3415 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean

Authors: Jessica Kate Simonds

Abstract:

The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.

Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies

Procedia PDF Downloads 185
3414 Assessing Livelihood Vulnerability to Climate Change and Adaptation Strategies in Rajanpur District, Pakistan

Authors: Muhammad Afzal, Shahbaz Mushtaq, Duc-Anh-An-Vo, Kathryn Reardon Smith, Thanh Ma

Abstract:

Climate change has become one of the most challenging environmental issues in the 21st century. Climate change-induced natural disasters, especially floods, are the major factors of livelihood vulnerability, impacting millions of individuals worldwide. Evaluating and mitigating the effects of floods requires an in-depth understanding of the relationship between vulnerability and livelihood capital assets. Using an integrated approach, sustainable livelihood framework, and system thinking approach, the study developed a conceptual model of a generalized livelihood system in District Rajanpur, Pakistan. The model visualizes the livelihood vulnerability system as a whole and identifies the key feedback loops likely to influence the livelihood vulnerability. The study suggests that such conceptual models provide effective communication and understanding tools to stakeholders and decision-makers to anticipate the problem and design appropriate policies. It can also serve as an evaluation technique for rural livelihood policy and identify key systematic interventions. The key finding of the study reveals that household income, health, and education are the major factors behind the livelihood vulnerability of the rural poor of District Rajanpur. The Pakistani government tried to reduce the livelihood vulnerability of the region through different income, health, and education programs, but still, many changes are required to make these programs more effective especially during the flood times. The government provided only cash to vulnerable and marginalized families through income support programs, but this study suggests that along with the cash, the government must provide seed storage facilities and access to crop insurance to the farmers. Similarly, the government should establish basic health units in villages and frequent visits of medical mobile vans should be arranged with advanced medical lab facilities during and after the flood.

Keywords: livelihood vulnerability, rural communities, flood, sustainable livelihood framework, system dynamics, Pakistan

Procedia PDF Downloads 50
3413 Wage Differentiation Patterns of Households Revisited for Turkey in Same Industry Employment: A Pseudo-Panel Approach

Authors: Yasin Kutuk, Bengi Yanik Ilhan

Abstract:

Previous studies investigate the wage differentiations among regions in Turkey between couples who work in the same industry and those who work in different industries by using the models that is appropriate for cross sectional data. However, since there is no available panel data for this investigation in Turkey, pseudo panels using repeated cross-section data sets of the Household Labor Force Surveys 2004-2014 are employed in order to open a new way to examine wage differentiation patterns. For this purpose, household heads are separated into groups with respect to their household composition. These groups’ membership is assumed to be fixed over time such as age groups, education, gender, and NUTS1 (12 regions) Level. The average behavior of them can be tracked overtime same as in the panel data. Estimates using the pseudo panel data would be consistent with the estimates using genuine panel data on individuals if samples are representative of the population which has fixed composition, characteristics. With controlling the socioeconomic factors, wage differentiation of household income is affected by social, cultural and economic changes after global economic crisis emerged in US. It is also revealed whether wage differentiation is changing among the birth cohorts.

Keywords: wage income, same industry, pseudo panel, panel data econometrics

Procedia PDF Downloads 397
3412 Securing Online Voting With Blockchain and Smart Contracts

Authors: Anant Mehrotra, Krish Phagwani

Abstract:

Democratic voting is vital for any country, but current methods like ballot papers or EVMs have drawbacks, including transparency issues, low voter turnout, and security concerns. Blockchain technology offers a potential solution by providing a secure, decentralized, and transparent platform for e-voting. With features like immutability, security, and anonymity, blockchain combined with smart contracts can enhance trust and prevent vote tampering. This paper explores an Ethereum-based e-voting application using Solidity, showcasing a web app that prevents duplicate voting through a token-based system, while also discussing the advantages and limitations of blockchain in digital voting. Voting is a crucial component of democratic decision-making, yet current methods, like paper ballots, remain outdated and inefficient. This paper reviews blockchain-based voting systems, highlighting strategies and guidelines to create a comprehensive electronic voting system that leverages cryptographic techniques, such as zero-knowledge proofs, to enhance privacy. It addresses limitations of existing e-voting solutions, including cost, identity management, and scalability, and provides key insights for organizations looking to design their own blockchain-based voting systems.

Keywords: electronic voting, smart contracts, blockchain nased voting, security

Procedia PDF Downloads 10
3411 The Importance of Changing the Traditional Mode of Higher Education in Bangladesh: Creating Huge Job Opportunities for Home and Abroad

Authors: M. M. Shahidul Hassan, Omiya Hassan

Abstract:

Bangladesh has set its goal to reach upper middle-income country status by 2024. To attain this status, the country must satisfy the World Bank requirement of achieving minimum Gross National Income (GNI). Number of youth job seekers in the country is increasing. University graduates are looking for decent jobs. So, the vital issue of this country is to understand how the GNI and jobs can be increased. The objective of this paper is to address these issues and find ways to create more job opportunities for youths at home and abroad which will increase the country’s GNI. The paper studies proportion of different goods Bangladesh exported, and also the percentage of employment in different sectors. The data used here for the purpose of analysis have been collected from the available literature. These data are then plotted and analyzed. Through these studies, it is concluded that growth in sectors like agricultural, ready-made garments (RMG), jute industries and fisheries are declining and the business community is not interested in setting up capital-intensive industries. Under this situation, the country needs to explore other business opportunities for a higher economic growth rate. Knowledge can substitute the physical resource. Since the country consists of the large youth population, higher education will play a key role in economic development. It now needs graduates with higher-order skills with innovative quality. Such dispositions demand changes in a university’s curriculum, teaching and assessment method which will function young generations as active learners and creators. By bringing these changes in higher education, a knowledge-based society can be created. The application of such knowledge and creativity will then become the commodity of Bangladesh which will help to reach its goal as an upper middle-income country.

Keywords: Bangladesh, economic sectors, economic growth, higher education, knowledge-based economy, massifcation of higher education, teaching and learning, universities’ role in society

Procedia PDF Downloads 171
3410 Learning Environment and Motivation of Cavite National High School Students

Authors: Madelaine F. Gatchalian, Mary Jane D. Tepora

Abstract:

This study was designed to determine the relationship between learning environment and motivation of CNHS, SY 2012-2013. There were 376 respondents taken randomly. Frequency distribution, percentage, mean, standard deviation, Mann Whitney Test, Kruskall Wallis One-way ANOVA and Spearman Rank Correlational Coefficient were used in analyzing the data. As to age, most of the respondents were 13 years old while female students outnumbered the male students. Majority of parents’ educational attainment of CNHS students were high school/vocational graduates. Most fathers worked in the private sector, while majority of the mothers were unemployed whose family income range from Php 5,000.00 to Php 14,999.00. Most of the respondents were first child composed of five family members. Findings showed no significant differences in perceived learning environment when respondents were grouped in terms of age, sex, parents’ educational attainment, parents’ occupation, sibling order and number of family members. Only monthly family income showed significant differences in perceived learning environment. There are no significant differences in perceived learning motivation when respondents were grouped in terms of age, sex, parents’ educational attainment (father), parents’ occupation (father), sibling order, and number of family members. Parents’ educational attainment (mother), parents’ occupation (mother) and monthly family income showed significant differences in perceived learning motivation. There is significant relationship between the six subscales of perceived learning environment, namely: student cohesiveness, teacher support, involvement, task orientation, cooperation and equity and perceived learning motivation of CNHS students, SY, 2012-2013. The results of this study indicated that learning environment including student cohesiveness, teachers support, involvement, task orientation, cooperation and equity is significantly related to students’ learning motivation.

Keywords: learning environment, motivation, demographic profile, secondary students

Procedia PDF Downloads 376
3409 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 227
3408 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.

Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs

Procedia PDF Downloads 97
3407 A Model of Human Security: A Comparison of Vulnerabilities and Timespace

Authors: Anders Troedsson

Abstract:

For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.

Keywords: human security, timespace, vulnerabilities, risk perception

Procedia PDF Downloads 336
3406 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia

Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro

Abstract:

Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.

Keywords: border security, defense, energy, national interest, threat

Procedia PDF Downloads 482
3405 The Continuing Saga of Poverty Reduction and Food Security in the Philippines

Authors: Shienna Marie Esteban

Abstract:

The economic growth experience of the Philippines is one of the fastest in Asia. However, the said growth has not yet trickled down to every Filipino. This is evident to agricultural-dependent population. Moreover, the contribution of the agriculture sector to GDP has been dwindling while large number of labor force is still dependent on a relatively small share of GDP. As a result, poverty incidence worsened among rural poor causing hunger and malnutrition. Therefore, the existing agricultural policies in the Philippines are pushing to achieve greater food production and productivity to alleviate poverty and food insecurity. Through a review of related literature and collection and analysis of secondary data from DA, DBM, BAS - CountrySTAT, PSA, NSCB, PIDS, IRRI, UN-FAO, IFPRI, and World Bank among others, the study revealed that Philippines is still far from its goals of poverty reduction and food security. In addition, the agricultural sector is underperforming. The productivity growth of the sector comes out mediocre. The common observation is that weakness is attributed to the failures of policy and institutional environments of the agriculture sector. The policy environment failed to create a structure appropriate for the rapid growth of the sector due to institutional and governance weaknesses. A recommendation is to go through institutional and policy reforms through legislative or executive mandates should take form to improve the implementation and enforcement of existing policies.

Keywords: agriculture, food security, policy, poverty

Procedia PDF Downloads 311
3404 Insecurity and Insurgency on Economic Development of Nigeria

Authors: Uche Lucy Onyekwelu, Uche B. Ugwuanyi

Abstract:

Suffice to say that socio-economic disruptions of any form is likely to affect the wellbeing of the citizenry. The upsurge of social disequilibrium caused by the incessant disruptive tendencies exhibited by youths and some others in Nigeria are not helping matters. In Nigeria the social unrest has caused different forms of draw backs in Socio Economic Development. This study has empirically evaluated the impact of insecurity and insurgency on the Economic Development of Nigeria. The paper noted that the different forms of insecurity in Nigeria are namely: Insurgency and Banditry as witnessed in Northern Nigeria; Militancy: Niger Delta area and self-determination groups pursuing various forms of agenda such as Sit –at- Home Syndrome in the South Eastern Nigeria and other secessionist movements. All these have in one way or the other hampered Economic development in Nigeria. Data for this study were collected through primary and secondary sources using questionnaire and some existing documentations. Cost of investment in different aspects of security outfits in Nigeria represents the independent variable while the differentials in the Gross Domestic Product(GDP) and Human Development Index(HDI) are the measures of the dependent variable. Descriptive statistics and Simple Linear Regression analytical tool were employed in the data analysis. The result revealed that Insurgency/Insecurity negatively affect the economic development of the different parts of Nigeria. Following the findings, a model to analyse the effect of insecurity and insurgency was developed, named INSECUREDEVNIG. It implies that the economic development of Nigeria will continue to deteriorate if insurgency and insecurity continue. The study therefore recommends that the government should do all it could to nurture its human capital, adequately fund the state security apparatus and employ individuals of high integrity to manage the various security outfits in Nigeria. The government should also as a matter of urgency train the security personnel in intelligence cum Information and Communications Technology to enable them ensure the effectiveness of implementation of security policies needed to sustain Gross Domestic Product and Human Capital Index of Nigeria.

Keywords: insecurity, insurgency, gross domestic product, human development index, Nigeria

Procedia PDF Downloads 102
3403 Compromising Quality of Life in Low-Income Settlements: The Case of Ashrayan Prakalpa, Khulna

Authors: Salma Akter, Md. Kamal Uddin

Abstract:

Quality of life is a vast and comprehensive concept refers overall well-being of society. Current research and efforts of policymakers and planners are concerned to increase the urban quality of life through the sustainable development of city and country. While such efforts effectively improve the quality of life of urban dwellers through improved social, economic and housing infrastructures, very little has been paid to improve low-income settlement users more specifically government provided shelter projects. The top-down shelter policies and its objective indicators (physical design elements and physical environmental elements) indicators on low-income groups merely can ensure grassroots needs, aspiration and well-being refer as subjective qualities obliged to compromise with the quality of life. This research, therefore, aims to measure the quality of life of such government-provided low-income settlements. To do so, a conceptual framework has been developed to measure quality of life with arguing that quality of life depends on both objective and subjective indicators and needs to measure across three scales of living environment refers to macro (community), meso (neighborhood or shelter/built environment), and micro (family). The top-down shelter project, Dakshin Chandani Mahal Ashrayan Prakalpa is a resettlement/housing project of Government of Bangladesh for providing shelters and human resources development activities like education, microcredit, and training programme to landless, homeless and rootless people has been taken as case study. The study area is located at Dighalia Upazila, Khulna Bangladesh. In terms of methodology, this research is primarily exploratory and adopts a case study method and deductive approach for evaluating the quality of life. Data have been obtained from relevant literature review, key informant interview, focus group discussion, necessary drawings, photographs and participant observation across dwelling, neighborhood, and community level. Findings have revealed that Shelter users mostly compromise the quality of life at community level due to insufficient physical design elements and facilities while neighborhood and dwelling level have been manifested similar result like former ones. Thus, the outcome of this study can be beneficial for a global-level understating of the compromising the ‘quality of life’ under top-down shelter policy. Locally, for instance, in the context of Bangladesh, it can help policymakers and concerned authorities to formulate the shelter policies and take initiatives to improve the well-being of marginalized.

Keywords: Ashrayan Prakalpa, compromise, displaced people, quality of life

Procedia PDF Downloads 217
3402 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 192
3401 An Approach to Consumption of Exhaustible Resources Based on Islamic Justice and Hartwick Criteria

Authors: Hamed Najafi, Ghasem Nikjou

Abstract:

Nowadays, there is an increasing attention to the resources scarcity issues. Because of failure in present patterns in the field of the allocation of exhaustible resources between generations and the challenges related to economic justice supply, it is supposed, to present a pattern from the Islamic perspective in this essay. By using content analysis of religious texts, we conclude that governments should remove the gap which is exists between the per capita income of the poor and their minimum consumption (necessary consumption). In order to preserve the exhaustible resources for poor people) not for all), between all generations, government should invest exhaustible resources on endless resources according to Hartwick’s criteria and should spend these benefits for poor people. But, if benefits did not cover the gap between minimum consumption and per capita income of poor levels in one generation, in this case, the government is responsible for covering this gap through the direct consumption of exhaustible resources. For an exact answer to this question, ‘how much of exhaustible resources should expense to maintain justice between generations?’ The theoretical and mathematical modeling has been used and proper function has been provided. The consumption pattern is presented for economic policy makers in Muslim countries, and non-Muslim even, it can be useful.

Keywords: exhaustible resources, Islamic justice, intergenerational justice, distribution of resources, Hartwick criteria

Procedia PDF Downloads 189
3400 Knowledge, Attitude, and Practices of Small Scale Farmers on Organic Agriculture in a Rural Community in Ifugao, Philippines

Authors: Marah Joy A. Nanglegan

Abstract:

A survey was conducted to describe knowledge, attitude, practices, information needs, and information seeking behavior of small-scale farmers on Organic Agriculture Production (OAP) in a rural community in Ifugao, Philippines. Respondents’ age ranged from 23-67 years old. Most of them are male, married, and have reached high school level. The major source of income is farming with an average monthly income of less than Php 5,000 for a household size of seven. More than fifty percent of the respondents are members of a farmer’s organization. Farm size is less than one hectare. Majority of them own their farms and have been farming for more than twenty years. Very few attended training on Organic Agriculture Production (OAP). Most of them are not aware of any OAP program in their community. Hence, their farming practices are mostly conventional. The overall level of knowledge on OAP among all respondents was below the average. On attitude, most of the respondents agreed that organic farming would decrease production costs by reducing input purchases. They believe it benefits both the consumer and the producer. In fact, they are aware of the many benefits of organic farming, especially on health. Likewise, many of them agreed on the benefits of organic farming to soil fertility, to the environment, and to increase the income of farmers. Many of them, however, see organic farming as troublesome and difficult in terms of time and effort, obtaining organic inputs, limited production, and marketing aspects. They also have heavy reliance on pesticides and herbicides to control pests and diseases. On practices, majority of the respondents stated that they practiced crop rotation, manual weeding, and the use of animal manure. Most of them desired to do organic farming but needed information such as production techniques, costs, and marketing opportunities. Their most preferred communication channel is through extension agents and contact farmers. Their most preferred communication method is through trainings and seminars as well as through farm demonstrations. Results of this study will serve as a basis for developing appropriate communication strategies to improve knowledge, attitude, and practices of respondents on organic agriculture as well as enhance the promotion of organic agriculture production in the community.

Keywords: Ifugao, knowledge attitude practices, organic agriculture, Philippines

Procedia PDF Downloads 164
3399 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks

Authors: Sungchul Ha, Hyunwoo Kim

Abstract:

In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.

Keywords: MANETs, IDS, power control, minimum spanning tree

Procedia PDF Downloads 372
3398 Determinants of Hospital Obstetric Unit Closures in the United States 2002-2013: Loss of Hospital Obstetric Care 2002-2013

Authors: Peiyin Hung, Katy Kozhimannil, Michelle Casey, Ira Moscovice

Abstract:

Background/Objective: The loss of obstetric services has been a pressing concern in urban and rural areas nationwide. This study aims to determine factors that contribute to the loss of obstetric care through closures of a hospital or obstetric unit. Methods: Data from 2002-2013 American Hospital Association annual surveys were used to identify hospitals providing obstetric services. We linked these data to Medicare Healthcare Cost Report Information for hospital financial indicators, the US Census Bureau’s American Community Survey for zip-code level characteristics, and Area Health Resource files for county- level clinician supply measures. A discrete-time multinomial logit model was used to determine contributing factors to obstetric unit or hospital closures. Results: Of 3,551 hospitals providing obstetrics services during 2002-2013, 82% kept units open, 12% stopped providing obstetrics services, and 6% closed down completely. State-level variations existed. Factors that significantly increased hospitals’ probability of obstetric unit closures included lower than 250 annual birth volume (adjusted marginal effects [95% confidence interval]=34.1% [28%, 40%]), closer proximity to another hospital with obstetric services (per 10 miles: -1.5% [-2.4, -0.5%]), being in a county with lower family physician supply (-7.8% [-15.0%, -0.6%), being in a zip code with higher percentage of non-white females (per 10%: 10.2% [2.1%, 18.3%]), and with lower income (per $1,000 income: -0.14% [-0.28%, -0.01%]). Conclusions: Over the past 12 years, loss of obstetric services has disproportionately affected areas served by low-volume urban and rural hospitals, non-white and low-income communities, and counties with fewer family physicians, signaling a need to address maternity care access in these communities.

Keywords: access to care, obstetric care, service line discontinuation, hospital, obstetric unit closures

Procedia PDF Downloads 222