Search results for: national security hazards
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7232

Search results for: national security hazards

6212 A Study on the Current State and Policy Implications of Engineer Operated National Research Facility and Equipment in Korea

Authors: Chang-Yong Kim, Dong-Woo Kim, Whon-Hyun Lee, Yong-Joo Kim, Tae-Won Chung, Kyung-Mi Lee, Han-Sol Kim, Eun-Joo Lee, Euh Duck Jeong

Abstract:

In the past, together with the annual increase in investment on national R&D projects, the government’s budget investment in FE has steadily maintained. In the case of major developed countries, R&D and its supporting works are distinguished and professionalized in their own right, in so far as having a training system for facilities, equipment operation, and maintenance personnel. In Korea, however, research personnel conduct both research and equipment operation, leading to quantitative shortages of operational manpower and qualitative problems due to insecure employment such as maintenance issues or the loss of effectiveness of necessary equipment. Therefore, the purpose of this study was to identify the current status of engineer operated national research FE in Korea based on a 2017 survey results of domestic facilities and to suggest policy implications. A total of 395 research institutes that carried out national R&D projects and registered more than two FE since 2005 were surveyed on-line for two months. The survey showed that 395 non-profit research facilities were operating 45,155 pieces of equipment with 2,211 engineer operated national research FE, meaning that each engineer had to manage 21 items of FE. Among these, 43.9% of the workers were employed in temporary positions, including indefinite term contracts. Furthermore, the salary and treatment of the engineer personnel were relatively low compared to researchers. In short, engineers who exclusively focused on managing and maintaining FE play a very important role in increasing research immersion and obtaining highly reliable research results. Moreover, institutional efforts and government support for securing operators are severely lacking as domestic national R&D policies are mostly focused on researchers. The 2017 survey on FE also showed that 48.1% of all research facilities did not even employ engineers. In order to solve the shortage of the engineer personnel, the government will start the pilot project in 2012, and then only the 'research equipment engineer training project' from 2013. Considering the above, a national long-term manpower training plan that addresses the quantitative and qualitative shortage of operators needs to be established through a study of the current situation. In conclusion, the findings indicate that this should not only include a plan which connects training to employment but also measures the creation of additional jobs by re-defining and re-establishing operator roles and improving working conditions.

Keywords: engineer, Korea, maintenance, operation, research facilities and equipment

Procedia PDF Downloads 186
6211 Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey

Authors: Priti Kumari, Tricha Anjali

Abstract:

Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.

Keywords: attacks, body area network, key distribution, key refreshment, pre-shared keys

Procedia PDF Downloads 356
6210 Formation of Self Help Groups (SHGs) Protected Human Rights and Ensured Human Security of Female Sex Workers at Brothel in Bangladesh

Authors: Md. Nurul Alom Siddikqe

Abstract:

The purpose of this intervention was to describe how the marginalized people protect their rights and increase their self-dignity and self-esteem among brothel-based sex workers in 6 cities which are the victim of trafficked who came from different periphery areas Bangladesh. Eventually the sex workers are tortured by the pimp, clients, Msahi (so called guardian of bonded sex workers), Babu (So called husband) highly discriminated, vulnerable and stigmatized due to their occupation, movement, behavior and activities, which has got social disapproval. However, stigma, discrimination and violation of human rights not only bar them to access legal services, education of their kids, health, movement of outside of brothel, deprived of funeral after death, but also make them inaccessible due to their invisibility. Conducted an assessment among brothel-based sex workers setup to know their knowledge on human rights and find out their harassment and violence in their community. Inspired them to think about to be united and also assisted them to formation of self help group (SHG). Developed capacity of the SHG and developed leadership of its members through different trainings like administrative, financial management, public speaking and resource mobilization. Developed strategy to enhance the capacity of SHG so that they can collectively claim their rights and develop strategic partnership and network with the relevant service provider’s for restoring all sorts of rights. Conducted meeting with stakeholder including duty bearers, civil society organizations, media people and local government initiatives. Developed Networking with human rights commission, local elite, religious leaders and form human right watch committees at community level. Organized rally and observed national and international days along with government counterparts. By utilizing the project resources the members of SHG became capable to raise their collective voices against violence, discrimination and stigma as well as protected them from insecurity. The members of SHG have been participating in social program/event the SHG got membership of district level NGO coordination meeting through invitation from Deputy Commissioner, Civil Surgeon and Social welfare office of Government of Bangladesh. The Law Enforcement Agency is ensuring safety and security and the education department of government enrolled their children in primary level education. The Government provided land for grave yard after death for the Muslim sex workers and same for the other religious group. The SHGs are registered with government respective authorities. The SHGs are working with support from different development partners and implementing different projects sometime as consortium leaders. Opportunity created to take the vocational training from the government reputed department. The harassment by the clients reduced remarkably, babu, Mashi and other counterparts recognized the sex workers rights and ensure security with government counterpart access increased in legal, health and education. Indications are that the brothel based sex workers understood about their rights and became capable of ensuring their security through working under the self-help groups meaningfully.

Keywords: brothel, discrimination, harassment, stigma

Procedia PDF Downloads 352
6209 Re-Examining Contracts in Managing and Exploiting Strategic National Resources: A Case in Divestation Process in the Share Distribution of Mining Corporation in West Nusa Tenggara, Indonesia

Authors: Hayyan ul Haq, Zainal Asikin

Abstract:

This work aims to explore the appropriate solution in solving legal problems stemmed from managing and exploiting strategic natural resources in Indonesia. This discussion will be focused on the exploitation of gold mining, i.e. divestation process in the New Mont Corporation, West Nusa Tenggara. These legal problems relate to the deviation of the national budget regulation, UU. No. 19/2012, and the implementation of the divestastion process, which infringes PP. No. 50/2007 concerning the Impelementation Procedure of Regional Cooperation, which is an implementation regulation of UU No. 1/2004 on State’s Treasury. The cooperation model, have been developed by the Provincial Government, failed to create a permanent legal solution through normative approach. It has merely used practical approach that tends (instant solution), by using some loopholes in the divestation process. The above blunders have accumulated by other secondary legal blunders, i.e. good governance principles, particularly justice, transparency, efficiency, effective principles and competitiveness principle. To solve the above problems, this work offers constitutionalisation of contract that aimed at reviewing and coherencing all deviated contracts, rules and policies that have deprived the national and societies’ interest to optimize the strategic natural resources towards the greatest benefit for the greatest number of people..

Keywords: constitutionalisation of contract, strategic national resources, divestation, the greatest benefit for the greatest number of people, Indonesian Pancasila values

Procedia PDF Downloads 451
6208 Examining Kokugaku as a Pattern of Defining Identity in Global Comparison

Authors: Mária Ildikó Farkas

Abstract:

Kokugaku of the Edo period can be seen as a key factor of defining cultural (and national) identity in the 18th and early 19th century based on Japanese cultural heritage. Kokugaku focused on Japanese classics, on exploring, studying and reviving (or even inventing) ancient Japanese language, literature, myths, history and also political ideology. ‘Japanese culture’ as such was distinguished from Chinese (and all other) cultures, ‘Japanese identity’ was thus defined. Meiji scholars used kokugaku conceptions of Japan to construct a modern national identity based on the premodern and culturalist conceptions of community. The Japanese cultural movement of the 18-19th centuries (kokugaku) of defining cultural and national identity before modernization can be compared not to the development of Western Europe (where national identity strongly attached to modern nation states) or other parts of Asia (where these emerged after the Western colonization), but rather with the ‘national awakening’ movements of the peoples of East Central Europe, a comparison which have not been dealt with in the secondary literature yet. The role of a common language, culture, history and myths in the process of defining cultural identity – following mainly Miroslav Hroch’s comparative and interdisciplinary theory of national development – can be examined compared to the movements of defining identity of the peoples of East Central Europe (18th-19th c). In the shadow of a cultural and/or political ‘monolith’ (China for Japan and Germany for Central Europe), before modernity, ethnic groups or communities started to evolve their own identities with cultural movements focusing on their own language and culture, thus creating their cultural identity, and in the end, a new sense of community, the nation. Comparing actual texts (‘narratives’) of the kokugaku scholars and Central European writers of the nation building period (18th and early 19th centuries) can reveal the similarities of the discourses of deliberate searches for identity. Similar motives of argument can be identified in these narratives: ‘language’ as the primary bearer of collective identity, the role of language in culture, ‘culture’ as the main common attribute of the community; and similar aspirations to explore, search and develop native language, ‘genuine’ culture, ‘original’ traditions. This comparative research offering ‘development patterns’ for interpretation can help us understand processes that may be ambiguously considered ‘backward’ or even ‘deleterious’ (e.g. cultural nationalism) or just ‘unique’. ‘Cultural identity’ played a very important role in the formation of national identity during modernization especially in the case of non-Western communities, who had to face the danger of losing their identities in the course of ‘Westernization’ accompanying modernization.

Keywords: cultural identity, Japanese modernization, kokugaku, national awakening

Procedia PDF Downloads 259
6207 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean

Authors: Jessica Kate Simonds

Abstract:

The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.

Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies

Procedia PDF Downloads 179
6206 Applications of Greenhouse Data in Guatemala in the Analysis of Sustainability Indicators

Authors: Maria A. Castillo H., Andres R. Leandro, Jose F. Bienvenido B.

Abstract:

In 2015, Guatemala officially adopted the Sustainable Development Goals (SDG) according to the 2030 Agenda agreed by the United Nations Organization. In 2016, these objectives and goals were reviewed, and the National Priorities were established within the K'atún 2032 National Development Plan. In 2019 and 2021, progress was evaluated with 120 defined indicators, and the need to improve quality and availability of statistical data necessary for the analysis of sustainability indicators was detected, so the values to be reached in 2024 and 2032 were adjusted. The need for greater agricultural technology is one of the priorities established within SDG 2 "Zero Hunger". Within this area, protected agricultural production provides greater productivity throughout the year, reduces the use of chemical products to control pests and diseases, reduces the negative impact of climate and improves product quality. During the crisis caused by Covid-19, there was an increase in exports of fruits and vegetables produced in greenhouses from Guatemala. However, this information has not been considered in the 2021 revision of the Plan. The objective of this study is to evaluate the information available on Greenhouse Agricultural Production and its integration into the Sustainability Indicators for Guatemala. This study was carried out in four phases: 1. Analysis of the Goals established for SDG 2 and the indicators included in the K'atún Plan. 2. Analysis of Environmental, Social and Economic Indicator Models. 3. Definition of territorial levels in 2 geographic scales: Departments and Municipalities. 4. Diagnosis of the available data on technological agricultural production with emphasis on Greenhouses at the 2 geographical scales. A summary of the results is presented for each phase and finally some recommendations for future research are added. The main contribution of this work is to improve the available data that allow the incorporation of some agricultural technology indicators in the established goals, to evaluate their impact on Food Security and Nutrition, Employment and Investment, Poverty, the use of Water and Natural Resources, and to provide a methodology applicable to other production models and other geographical areas.

Keywords: greenhouses, protected agriculture, sustainable indicators, Guatemala, sustainability, SDG

Procedia PDF Downloads 78
6205 A Queer Approach to the National Irish Identity during 'The Troubles' in Belfast in Paul Mcveigh's 'The Good Son'

Authors: Eduardo Garcia Agustin

Abstract:

This paper focuses on how Mickey – the 10-year-old main character and narrator in Paul McVeigh’s novel The Good Son (2015) – becomes aware of his own queerness and its implications in a conflicting place and time such as Belfast during ‘The Troubles’ in the 1980s. Queer theory allows a comparative reading of identity issues such as national and gender discourses. As opposed to some other excluding social constructs that classify identities in an Us-Others binomial, queer has become a sort of umbrella term where there is room for more identities other than LGTBQ. Therefore, it offers some relevant tools to read this highly awarded novel by focusing on the intersectional construction of Mickey’s identity in progress within the social and familiar realms. The aim of this paper is to offer a queer reading of the The Good Son, which was awarded with the Polari First Book Prize in 2016, by showing the key role of Mickey’s conflictive realization of his own queerness in the polarized society of Northern Ireland in the 1980s, where there is no shade of grey. Within such a polarized context, Mickey’s perception of his own internal and external identity conflicts he is exposed to will show how necessary a certain touch of pink is as a potential escape to those conflicts.

Keywords: conflict, national identity, Northern Ireland, queer identity

Procedia PDF Downloads 525
6204 Critical Mathematics Education and School Education in India: A Study of the National Curriculum Framework 2022 for Foundational Stage

Authors: Eish Sharma

Abstract:

Literature around Mathematics education suggests that democratic attitudes can be strengthened through teaching and learning Mathematics. Furthermore, connections between critical education and Mathematics education are observed in the light of critical pedagogy to locate Critical Mathematics Education (CME) as the theoretical framework. Critical pedagogy applied to Mathematics education is identified as one of the key themes subsumed under Critical Mathematics Education. Through the application of critical pedagogy in mathematics, unequal power relations and social injustice can be identified, analyzed, and challenged. The research question is: have educational policies in India viewed the role of critical pedagogy applied to mathematics education (i.e., critical mathematics education) to ensure social justice as an educational aim? The National Curriculum Framework (NCF), 2005 upholds education for democracy and the role of mathematics education in facilitating the same. More than this, NCF 2005 rests on Critical Pedagogy Framework and it recommends that critical pedagogy must be practiced in all dimensions of school education. NCF 2005 visualizes critical pedagogy for social sciences as well as sciences, stating that the science curriculum, including mathematics, must be used as an “instrument for achieving social change to reduce the divide based on economic class, gender, caste, religion, and the region”. Furthermore, the implementation of NCF 2005 led to a reform in the syllabus and textbooks in school mathematics at the national level, and critical pedagogy was applied to mathematics textbooks at the primary level. This intervention led to ethnomathematics and critical mathematics education in the school curriculum in India for the first time at the national level. In October 2022, the Ministry of Education launched the National Curriculum Framework for Foundational Stage (NCF-FS), developed in light of the National Education Policy, 2020, for children in the three to eight years age group. I want to find out whether critical pedagogy-based education and critical pedagogy-based mathematics education are carried forward in NCF 2022. To find this, an argument analysis of specific sections of the National Curriculum Framework 2022 document needs to be executed. Des Gasper suggests two tables: The first table contains four columns, namely, text component, comments on meanings, possible reformulation of the same text, and identified conclusions and assumptions (both stated and unstated). This table is for understanding the components and meanings of the text and is based on Scriven’s model for understanding the components and meanings of words in the text. The second table contains four columns i.e., claim identified, given data, warrant, and stated qualifier/rebuttal. This table is for describing the structure of the argument, how and how well the components fit together and is called ‘George Table diagram based on Toulmin-Bunn Model’.

Keywords: critical mathematics education, critical pedagogy, social justice, etnomathematics

Procedia PDF Downloads 75
6203 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 223
6202 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.

Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs

Procedia PDF Downloads 90
6201 A Model of Human Security: A Comparison of Vulnerabilities and Timespace

Authors: Anders Troedsson

Abstract:

For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.

Keywords: human security, timespace, vulnerabilities, risk perception

Procedia PDF Downloads 328
6200 Trophic Ecology of Sarotherodon Melanotheron Heudelotii and Tilapia Guineensis from the Banc D'Arguin National Park, Mauritania

Authors: Néné Gallé Kide, Mamadou Dia, Lemhaba Ould Yarba, Youssouf Kone, Fatimetou Mint Khalil, Hajar Bouksir, Ghislane Salhi, Younès Saoud

Abstract:

The diet of Sarotherodon melanotheron and Tilapia guineensis were investigated in the National Park of Banc d'Arguin (PNBA) from September 2012 to October 2013. A total of 499 individuals ranging in size between 219 and 400 mm total length of S. melanotheron (253 males and 246 females), and 280 individuals of T.guineensis (229 males and 51 females) ranged between 180 and 424mm total length. We used for studying the feeding habits of both two species the frequency of occurrence method. The coefficient of emptiness was 40.88% for S. melanotheron and 38.57% for T. guineensis. Both two species were herbivorous and very close feedings. Their diet consists of Seagrass, green, red, blue, and brown algae, diatoms, gastropods, bivalves, Crustaceans, and mud. The Seagrass and green algae were prey preference of these two species. The diet feeding showed that the composition varies slightly depending on the season and size of individuals.

Keywords: Cichlidae, trophic ecology, National park, Banc d'Arguin, Mauritania

Procedia PDF Downloads 788
6199 The Continuing Saga of Poverty Reduction and Food Security in the Philippines

Authors: Shienna Marie Esteban

Abstract:

The economic growth experience of the Philippines is one of the fastest in Asia. However, the said growth has not yet trickled down to every Filipino. This is evident to agricultural-dependent population. Moreover, the contribution of the agriculture sector to GDP has been dwindling while large number of labor force is still dependent on a relatively small share of GDP. As a result, poverty incidence worsened among rural poor causing hunger and malnutrition. Therefore, the existing agricultural policies in the Philippines are pushing to achieve greater food production and productivity to alleviate poverty and food insecurity. Through a review of related literature and collection and analysis of secondary data from DA, DBM, BAS - CountrySTAT, PSA, NSCB, PIDS, IRRI, UN-FAO, IFPRI, and World Bank among others, the study revealed that Philippines is still far from its goals of poverty reduction and food security. In addition, the agricultural sector is underperforming. The productivity growth of the sector comes out mediocre. The common observation is that weakness is attributed to the failures of policy and institutional environments of the agriculture sector. The policy environment failed to create a structure appropriate for the rapid growth of the sector due to institutional and governance weaknesses. A recommendation is to go through institutional and policy reforms through legislative or executive mandates should take form to improve the implementation and enforcement of existing policies.

Keywords: agriculture, food security, policy, poverty

Procedia PDF Downloads 305
6198 The Influence of National Culture on Consumer Buying Behaviour: An Exploratory Study of Nigerian and British Consumers

Authors: Mohamed Haffar, Lombe Ngome Enongene, Mohammed Hamdan, Gbolahan Gbadamosi

Abstract:

Despite the considerable body of literature investigating the influence of National Culture (NC) dimensions on consumer behaviour, there is a lack of studies comparing the influence of NC in Africa with Western European countries. This study is intended to fill the vacuum in knowledge by exploring how NC affects consumer buyer behavior in Nigeria and the United Kingdom. The primary data were collected through in depth, semi-structured interviews conducted with three groups of individuals: British students, Nigerian students in the United Kingdom, and Nigerian-based students. This approach and new frontier to analyze culture and consumer behaviour could help understand residual cultural threads of people (that are ingrained in their being) irrespective of exposure to other cultures. The findings of this study show that Nigerian and British consumers differ remarkably in cultural orientations such as symbols, values and psychological standpoints. This ultimately affects the choices made at every stage of the decision building process, and proves beneficial for international retail marketing.

Keywords: national culture, consumer behaviour, international business, Nigeria

Procedia PDF Downloads 274
6197 Insecurity and Insurgency on Economic Development of Nigeria

Authors: Uche Lucy Onyekwelu, Uche B. Ugwuanyi

Abstract:

Suffice to say that socio-economic disruptions of any form is likely to affect the wellbeing of the citizenry. The upsurge of social disequilibrium caused by the incessant disruptive tendencies exhibited by youths and some others in Nigeria are not helping matters. In Nigeria the social unrest has caused different forms of draw backs in Socio Economic Development. This study has empirically evaluated the impact of insecurity and insurgency on the Economic Development of Nigeria. The paper noted that the different forms of insecurity in Nigeria are namely: Insurgency and Banditry as witnessed in Northern Nigeria; Militancy: Niger Delta area and self-determination groups pursuing various forms of agenda such as Sit –at- Home Syndrome in the South Eastern Nigeria and other secessionist movements. All these have in one way or the other hampered Economic development in Nigeria. Data for this study were collected through primary and secondary sources using questionnaire and some existing documentations. Cost of investment in different aspects of security outfits in Nigeria represents the independent variable while the differentials in the Gross Domestic Product(GDP) and Human Development Index(HDI) are the measures of the dependent variable. Descriptive statistics and Simple Linear Regression analytical tool were employed in the data analysis. The result revealed that Insurgency/Insecurity negatively affect the economic development of the different parts of Nigeria. Following the findings, a model to analyse the effect of insecurity and insurgency was developed, named INSECUREDEVNIG. It implies that the economic development of Nigeria will continue to deteriorate if insurgency and insecurity continue. The study therefore recommends that the government should do all it could to nurture its human capital, adequately fund the state security apparatus and employ individuals of high integrity to manage the various security outfits in Nigeria. The government should also as a matter of urgency train the security personnel in intelligence cum Information and Communications Technology to enable them ensure the effectiveness of implementation of security policies needed to sustain Gross Domestic Product and Human Capital Index of Nigeria.

Keywords: insecurity, insurgency, gross domestic product, human development index, Nigeria

Procedia PDF Downloads 93
6196 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 182
6195 Sustainable Recycling Practices to Reduce Health Hazards of Municipal Solid Waste in Patna, India

Authors: Anupama Singh, Papia Raj

Abstract:

Though Municipal Solid Waste (MSW) is a worldwide problem, yet its implications are enormous in developing countries, as they are unable to provide proper Municipal Solid Waste Management (MSWM) for the large volume of MSW. As a result, the collected wastes are dumped in open dumping at landfilling sites while the uncollected wastes remain strewn on the roadside, many-a-time clogging drainage. Such unsafe and inadequate management of MSW causes various public health hazards. For example, MSW directly on contact or by leachate contaminate the soil, surface water, and ground water; open burning causes air pollution; anaerobic digestion between the piles of MSW enhance the greenhouse gases i.e., carbon dioxide and methane (CO2 and CH4) into the atmosphere. Moreover, open dumping can cause spread of vector borne disease like cholera, typhoid, dysentery, and so on. Patna, the capital city of Bihar, one of the most underdeveloped provinces in India, is a unique representation of this situation. Patna has been identified as the ‘garbage city’. Over the last decade there has been an exponential increase in the quantity of MSW generation in Patna. Though a large proportion of such MSW is recyclable in nature, only a negligible portion is recycled. Plastic constitutes the major chunk of the recyclable waste. The chemical composition of plastic is versatile consisting of toxic compounds, such as, plasticizers, like adipates and phthalates. Pigmented plastic is highly toxic and it contains harmful metals such as copper, lead, chromium, cobalt, selenium, and cadmium. Human population becomes vulnerable to an array of health problems as they are exposed to these toxic chemicals multiple times a day through air, water, dust, and food. Based on analysis of health data it can be emphasized that in Patna there has been an increase in the incidence of specific diseases, such as, diarrhoea, dysentry, acute respiratory infection (ARI), asthma, and other chronic respiratory diseases (CRD). This trend can be attributed to improper MSWM. The results were reiterated through a survey (N=127) conducted during 2014-15 in selected areas of Patna. Random sampling method of data collection was used to better understand the relationship between different variables affecting public health due to exposure to MSW and lack of MSWM. The results derived through bivariate and logistic regression analysis of the survey data indicate that segregation of wastes at source, segregation behavior, collection bins in the area, distance of collection bins from residential area, and transportation of MSW are the major determinants of public health issues. Sustainable recycling is a robust method for MSWM with its pioneer concerns being environment, society, and economy. It thus ensures minimal threat to environment and ecology consequently improving public health conditions. Hence, this paper concludes that sustainable recycling would be the most viable approach to manage MSW in Patna and would eventually reduce public health hazards.

Keywords: municipal solid waste, Patna, public health, sustainable recycling

Procedia PDF Downloads 317
6194 The Rise of Populist Right-Wing Parties in Western Europe: A Case Study of the Front National in France

Authors: Jessica Da Silva

Abstract:

This paper examines France as a microcosm of the rise of right-wing populism in the broader European context. The attack on the Charlie Hebdo newspaper is arguably, a reaction to the aggressive European secularism spreading throughout Europe that sees its true enemy in the growth of extremist and violent interpretations of Islam. With each terrorist attack, the popularity of anti-immigrant policies and ideologies increases. What ultimately drives movements like the French National Front are the concepts of monoculture and ethnic identity. This paper analyses the character of right-wing populist parties using the National Front as a case study. Such parties generate anxiety and resentment by fomenting an irrational fear of the ‘other’. In this way, populists promote their identity on the basis of xenophobia, Islamophobia, and practices of social exclusion against targeted out-groups. They position immigrants and foreigners as ‘others’, claiming they are a threat to native cultures and a source of social and economic strife. Ultimately, right-wing populism exerts a negative influence over the democratic framework in Europe and opposes the European Union’s integration project. Right-wing populism attacks this supranational model because of its alleged inefficiency and departure from what it considers to be 'authentic' European traditions and citizenship. In this context, understanding the rise of radical right-wing populist parties is extremely important for the future of Europe, democracy and multiculturalism.

Keywords: cultural identity, Europeanization, front national, immigration, integration, Islamophobia, multiculturalism, nationalism, right-wing populist parties, xenophobia

Procedia PDF Downloads 351
6193 A Lifetime-Enhancing Monitoring Node Distribution Using Minimum Spanning Tree in Mobile Ad Hoc Networks

Authors: Sungchul Ha, Hyunwoo Kim

Abstract:

In mobile ad hoc networks, all nodes in a network only have limited resources and calculation ability. Therefore communication topology which have long lifetime is good for all nodes in mobile ad hoc networks. There are a variety of researches on security problems in wireless ad hoc networks. The existing many researches try to make efficient security schemes to reduce network power consumption and enhance network lifetime. Because a new node can join the network at any time, the wireless ad hoc networks are exposed to various threats and can be destroyed by attacks. Resource consumption is absolutely necessary to secure networks, but more resource consumption can be a critical problem to network lifetime. This paper focuses on efficient monitoring node distribution to enhance network lifetime in wireless ad hoc networks. Since the wireless ad hoc networks cannot use centralized infrastructure and security systems of wired networks, a new special IDS scheme is necessary. The scheme should not only cover all nodes in a network but also enhance the network lifetime. In this paper, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method. The simulation results show that the proposed algorithm has superior performance in comparison with existing algorithms.

Keywords: MANETs, IDS, power control, minimum spanning tree

Procedia PDF Downloads 363
6192 Oak Gall Wasps (Hymenoptera, Cynipidae, Cynipini) and Galls Form Recorded from Georgia

Authors: Marine Nozadze, George Japoshvili, George Melika

Abstract:

In 2020-2021 we studied oaks gall wasps of different oak species in Georgia at 7 locations of their natural distribution: 1. Quercuse petrea subsp. iberica - Mtskheta municipality, village. Mukhattskaro; 2. Quercus subsp. pendunculifloria - Kvareli municipality, village. Gramy;3. Quercus robur subsp. imeretina -Baghdati Municipality, Ajameti Reserve; 4. Quercus pontica -Chokhatauri municipality, village. Tskhratskaro; 5. Quercus macranthera -Tetritskaro Municipality, Algeti National Park; 6. Quercuse petrea subsp. iberica - Shuakhevi municipality, village. Uchamba 7. Quercus hartwissiana - Baghdatis municipality, village. Dimi. Samples were collected from early spring to late autumn. As a result, 7 forms of galls were collected and described wich caused by different species of oak gall wasps: 1. Neuroterus numismalis asexual gall 2. Neuroterus quercusbaccarum asexual galls 3. Cynips korsakovi asexual gall 4. Biorhiza pallida sexual gall 5. Neuroterus quercusbaccarum asexual galls 6. Neuroterus numismalis sexual gall 7. Cynips quercusfolii. Neuroterus quercusbaccarum asexual galls form the most represented of them: In Algeti National Park; In Mtskheta municipality; In Shuakhevi municipality and Ajameti reserve. The most damaged locations by oak gall wasps were Algeti National Park and Mtskheta Municipality, whereas the most biodiversity according to galls form was represented In Algeti National Park.

Keywords: gall wasps, oak, cynipidae, species

Procedia PDF Downloads 137
6191 Global Supply Chain Tuning: Role of National Culture

Authors: Aleksandr S. Demin, Anastasiia V. Ivanova

Abstract:

Purpose: The current economy tends to increase the influence of digital technologies and diminish the human role in management. However, it is impossible to deny that a person still leads a business with its own set of values and priorities. The article presented aims to incorporate the peculiarities of the national culture and the characteristics of the supply chain using the quantitative values of the national culture obtained by the scholars of comparative management (Hofstede, House, and others). Design/Methodology/Approach: The conducted research is based on the secondary data in the field of cross-country comparison achieved by Prof. Hofstede and received in the GLOBE project. The data mentioned are used to design different aspects of the supply chain both on the cross-functional and inter-organizational levels. The connection between a range of principles in general (roles assignment, customer service prioritization, coordination of supply chain partners) and in comparative management (acknowledgment of the national peculiarities of the country in which the company operates) is shown over economic and mathematical models, mainly linear programming models. Findings: The combination of the team management wheel concept, the business processes of the global supply chain, and the national culture characteristics let a transnational corporation to form a supply chain crew balanced in costs, functions, and personality. To elaborate on an effective customer service policy and logistics strategy in goods and services distribution in the country under review, two approaches are offered. The first approach relies exceptionally on the customer’s interest in the place of operation, while the second one takes into account the position of the transnational corporation and its previous experience in order to accord both organizational and national cultures. The effect of integration practice on the achievement of a specific supply chain goal in a specific location is advised to assess via types of correlation (positive, negative, non) and the value of national culture indices. Research Limitations: The models developed are intended to be used by transnational companies and business forms located in several nationally different areas. Some of the inputs to illustrate the application of the methods offered are simulated. That is why the numerical measurements should be used with caution. Practical Implications: The research can be of great interest for the supply chain managers who are responsible for the engineering of global supply chains in a transnational corporation and the further activities in doing business on the international area. As well, the methods, tools, and approaches suggested can be used by top managers searching for new ways of competitiveness and can be suitable for all staff members who are keen on the national culture traits topic. Originality/Value: The elaborated methods of decision-making with regard to the national environment suggest the mathematical and economic base to find a comprehensive solution.

Keywords: logistics integration, logistics services, multinational corporation, national culture, team management, service policy, supply chain management

Procedia PDF Downloads 101
6190 The Third Islamic Defend Action: The Completeness Model of Islamic Peace Movement in Indonesia

Authors: Husnul Isa Harahap

Abstract:

On December 2, 2016 occurred mass movements in Indonesia, led by the National Movement of Fatwa Guard, Indonesian Ulema Council (GNPF MUI). This movement is named 212 in accordance with the date, and also called The Third Islamic Defend Action, a continued movement of Islamic defend earlier (November 4, 2016 and October 14, 2016). All three movements have raised the issue of the demand that Basuki Tjahaja Purnama (Jakarta governor) also known as Ahok put on trial for allegedly insulting the Quran. The interesting view of this movement is that: first, the great social movement could emerge from a small but sensitive issues. Second, although this movement followed by radical Islamic groups, that movement known as the largest and most peaceful Islamic Movement in Indonesia. Third, the movement succeeded in answer the doubts of many parties that the social movements with large masses can not maintain security, order, and even the cleanliness of the site action. What causes all this happen? First, the emphasis on the use of basic religious elements that Islam is love for peace. Second, the role of leadership that is trusted and based on religious relationship. Third, this movement is well organized and trying reflect Islamic values.

Keywords: Islamic values, social movement, peaceful group, sensitive issue

Procedia PDF Downloads 316
6189 Empirical Investigation into Climate Change and Climate-Smart Agriculture for Food Security in Nigeria

Authors: J. Julius Adebayo

Abstract:

The objective of this paper is to assess the agro-climatic condition of Ibadan in the rain forest ecological zone of Nigeria, using rainfall pattern and temperature between 1978-2018. Data on rainfall and temperature in Ibadan, Oyo State for a period of 40 years were obtained from Meteorological Section of Forestry Research Institute of Nigeria, Ibadan and Oyo State Meteorology Centre. Time series analysis was employed to analyze the data. The trend revealed that rainfall is decreasing slowly and temperature is averagely increasing year after year. The model for rainfall and temperature are Yₜ = 1454.11-8*t and Yₜ = 31.5995 + 2.54 E-02*t respectively, where t is the time. On this basis, a forecast of 20 years (2019-2038) was generated, and the results showed a further downward trend on rainfall and upward trend in temperature, this indicates persistence rainfall shortage and very hot weather for agricultural practices in the southwest rain forest ecological zone. Suggestions on possible solutions to avert climate change crisis and also promote climate-smart agriculture for sustainable food and nutrition security were also discussed.

Keywords: climate change, rainfall pattern, temperature, time series analysis, food and nutrition security

Procedia PDF Downloads 134
6188 Impact of Organic Farming on Soil Fertility and Microbial Activity

Authors: Menuka Maharjan

Abstract:

In the name of food security, agriculture intensification through conventional farming is being implemented in Nepal. Government focus on increasing agriculture production completely ignores soil as well human health. This leads to create serious soil degradation, i.e., reduction of soil fertility and microbial activity and health hazard in the country. On this note, organic farming is sustainable agriculture approach which can address challenge of sustaining food security while protecting the environment. This creates a win-win situation both for people and the environment. However, people have limited knowledge on significance of organic farming for environment conservation and food security especially developing countries like Nepal. Thus, the objective of the study was to assess the impacts of organic farming on soil fertility and microbial activity compared to conventional farming and forest in Chitwan, Nepal. Total soil organic carbon (C) was highest in organic farming (24 mg C g⁻¹ soil) followed by conventional farming (15 mg C g⁻¹ soil) and forest (9 mg C g⁻¹ soil) in the topsoil layer (0-10 cm depth). A similar trend was found for total nitrogen (N) content in all three land uses with organic farming soil possessing the highest total N content in both 0-10 cm and 10-20 cm depth. Microbial biomass C and N were also highest under organic farming, especially in the topsoil layer (350 and 46 mg g⁻¹ soil, respectively). Similarly, microbial biomass phosphorus (P) was higher (3.6 and 1.0 mg P kg⁻¹ at 0-10 and 10-20 cm depth, respectively) in organic farming compared to conventional farming and forest at both depths. However, conventional farming and forest soils had similar microbial biomass (C, N, and P) content. After conversion of forest, the P stock significantly increased by 373% and 170% in soil under organic farming at 0-10 and 10-20 cm depth, respectively. In conventional farming, the P stock increased by 64% and 36% at 0-10 cm and 10-20 cm depth, respectively, compared to forest. Overall, organic farming practices, i.e., crop rotation, residue input and farmyard manure application, significantly alters soil fertility and microbial activity. Organic farming system is emerging as a sustainable land use system which can address the issues of food security and environment conservation by increasing sustainable agriculture production and carbon sequestration, respectively, supporting to achieve goals of sustainable development.

Keywords: organic farming, soil fertility, micobial biomas, food security

Procedia PDF Downloads 170
6187 The Fusion of Blockchain and AI in Supply Chain Finance: Scalability in Distributed Systems

Authors: Wu You, Burra Venkata Durga Kumar

Abstract:

This study examines the promising potential of integrating Blockchain and Artificial Intelligence (AI) technologies to scalability in Distributed Systems within the field of supply chain finance. The finance industry is continually confronted with scalability challenges in its Distributed Systems, particularly within the supply chain finance sector, impacting efficiency and security. Blockchain, with its inherent attributes of high scalability and secure distributed ledger system, coupled with AI's strengths in optimizing data processing and decision-making, holds the key to innovating the industry's approach to these issues. This study elucidates the synergistic interplay between Blockchain and AI, detailing how their fusion can drive a significant transformation in the supply chain finance sector's Distributed Systems. It offers specific use-cases within this field to illustrate the practical implications and potential benefits of this technological convergence. The study also discusses future possibilities and current challenges in implementing this groundbreaking approach within the context of supply chain finance. It concludes that the intersection of Blockchain and AI could ignite a new epoch of enhanced efficiency, security, and transparency in the Distributed Systems of supply chain finance within the financial industry.

Keywords: blockchain, artificial intelligence (AI), scaled distributed systems, supply chain finance, efficiency and security

Procedia PDF Downloads 84
6186 Susanne Bier, Lone Scherfig: Transnationalization Strategies

Authors: Ebru Thwaites Diken

Abstract:

This article analyzes the works of certain directors in Danish cinema, namely Susanne Bier and Lone Sherfig, in the context of transnationalisation of Danish cinema. It looks at how the films' narratives negotiate and reconstruct the local / national / regional and the global. Scholars such as Nestingen & Elkington (2005), Hjort (2010), Higbee and Lim (2010), Bondebjerg and Redvall (2011) address transnationalism of Danish cinema in terms of production and distribution processes and how film making trascends national boundaries. This paper employs a particular understanding of transnationalism - in terms of how ideas and characters travel - to analyze how the storytelling and style has evolved to connect the national, the regional and the global on the basis of the works of these two directors. Strategies such as Hollywoodization - i.e. focus on stardom and classical narration, adhering to conventional European genre formulas, producing Danish films in English language have been identifiable strategies in Danish cinema in the period after the 2000s. Susanne Bier and Lone Scherfig are significant for employing some of these strategies simultaneously. For this reason, this article will look at how these two directors have employed these strategies and negotiated the cultural boundaries and exchanges.

Keywords: transnational cinema, danish cinema, susanne bier, lone scherfig

Procedia PDF Downloads 67
6185 Solving 94-Bit ECDLP with 70 Computers in Parallel

Authors: Shunsuke Miyoshi, Yasuyuki Nogami, Takuya Kusaka, Nariyoshi Yamai

Abstract:

Elliptic curve discrete logarithm problem (ECDLP) is one of problems on which the security of pairing-based cryptography is based. This paper considers Pollard's rho method to evaluate the security of ECDLP on Barreto-Naehrig (BN) curve that is an efficient pairing-friendly curve. Some techniques are proposed to make the rho method efficient. Especially, the group structure on BN curve, distinguished point method, and Montgomery trick are well-known techniques. This paper applies these techniques and shows its optimization. According to the experimental results for which a large-scale parallel system with MySQL is applied, 94-bit ECDLP was solved about 28 hours by parallelizing 71 computers.

Keywords: Pollard's rho method, BN curve, Montgomery multiplication

Procedia PDF Downloads 258
6184 Tourism Management of the Heritage and Archaeological Sites in Egypt

Authors: Sabry A. El Azazy

Abstract:

The archaeological heritage sites are one of the most important touristic attractions worldwide. Egypt has various archaeological sites and historical locations that are classified within the list of the archaeological heritage destinations in the world, such as Cairo, Luxor, Aswan, Alexandria, and Sinai. This study focuses on how to manage the archaeological sites and provide them with all services according to the traveler's needs. Tourism management depends on strategic planning for supporting the national economy and sustainable development. Additionally, tourism management has to utilize highly effective standards of security, promotion, advertisement, sales, and marketing while taking into consideration the preservation of monuments. In Egypt, the archaeological heritage sites must be well-managed and protected, which would assist tourism management, especially in times of crisis. Recently, the monumental places and archeological heritage sites were affected by unstable conditions and were threatened. It is essential to focus on preserving our heritage. Moreover, more efforts and cooperation between the tourism organizations and ministry of archaeology have to be done in order to protect the archaeology and promote the tourism industry. Methodology: Qualitative methods have been used as the overall approach to this study. Interviews and observations have provided the researcher with the required in-depth insight to the research subject. The researcher was a lecturer of tourist guidance that allows visiting all historical sites in Egypt. Additionally, the researcher had the privilege to communicate with tourism specialists and attend meetings, conferences, and events that were focused on the research subject. Objectives: The main purpose of the research was gaining information in order to develop theoretical research on how to effectively benefit out of those historical sights both economically and culturally, and pursue further researches and scientific studies to be well-suited for tourism and hospitality sector. The researcher works hard to present further studies in a field related to tourism and archaeological heritage using previous experience. Pursing this course of study enables the researcher to acquire the necessary abilities and competencies to achieve the set goal successfully. Results: The professional tourism management focus on making Egypt one of the most important destinations in the world, and provide the heritage and archaeological sites with all services that will place those locations into the international map of tourism. Tourists interested in visiting Egypt and making tourism flourish supports and strengths Egypt's national economy and the local community, taking into consideration preserving our heritage and archaeology. Conclusions: Egypt has many tourism attractions represented in the heritage, archaeological sites, and touristic places. These places need more attention and efforts to be included in tourism programs and be opened for visitors from all over the world. These efforts will encourage both local and international tourism to see our great civilization and provide different touristic activities.

Keywords: archaeology, archaeological sites, heritage, ministry of archaeology, national economy, touristic attractions, tourism management, tourism organizations

Procedia PDF Downloads 141
6183 Humanitarian Aid and National Sovereignty: The Case of Kosovo

Authors: Nick Papanikolaou

Abstract:

In modern world politics, International relations are very complex not only in their construction but also in their interpretation the ex-Yugoslavian(western Balkans) countries, due to the establishment of independent states, have also risen pending geopolitical and territorial issues such as the Kosovo dispute widely known as an active frozen conflict. Science of anthropology and its subfield of anthropology of conflict can suggest a sustainable plan of communities coexistence and abolishment of fondamentalism. The 1244 Security Council Resolution provides a framework of implementation of a transitional international joint international armed presence for ensuring control and stability in the territory. The changing international relations landscape and the rise of the integration of the Western Balkans in the European Union have brought the question of Kosovo and all the till now internationally controlled system of governance to a dead end. A new solution that will ensure a sustainable future needs to be applied in order to solve this case in a way that rights of both albanians and Serbians will be equally respected and both populations will coexist peacefully. What this presentation aims for is to present a plan for the peaceful coexistence and sovreignty of habitants of Kosovo in a whole new way of governance.

Keywords: sovereignty, Kosovo, Western Balkans, anthropology of conflict

Procedia PDF Downloads 65