Search results for: security analysis
28743 A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium
Authors: Louise Reyntjens
Abstract:
The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed.Keywords: Belgium, counterterrorism strategies, human rights, immigration law
Procedia PDF Downloads 10628742 Wireless Transmission of Big Data Using Novel Secure Algorithm
Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha
Abstract:
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance
Procedia PDF Downloads 49028741 Multilevel Gray Scale Image Encryption through 2D Cellular Automata
Authors: Rupali Bhardwaj
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient
Procedia PDF Downloads 37728740 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork
Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting
Abstract:
This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark
Procedia PDF Downloads 26828739 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 24128738 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services
Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen
Abstract:
Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes
Procedia PDF Downloads 27528737 Identity and Access Management for Medical Cyber-Physical Systems: New Technology and Security Solutions
Authors: Abdulrahman Yarali, Machica McClain
Abstract:
In the context of the increasing use of Cyber-Physical Systems (CPS) across critical infrastructure sectors, this paper addresses a crucial and emerging topic: the integration of Identity and Access Management (IAM) with Internet of Things (IoT) devices in Medical Cyber-Physical Systems (MCPS). It underscores the significance of robust IAM solutions in the expanding interconnection of IoT devices in healthcare settings, leveraging AI, ML, DL, Zero Trust Architecture (ZTA), biometric authentication advancements, and blockchain technologies. The paper advocates for the potential benefits of transitioning from traditional, static IAM frameworks to dynamic, adaptive solutions that can effectively counter sophisticated cyber threats, ensure the integrity and reliability of CPS, and significantly bolster the overall security posture. The paper calls for strategic planning, collaboration, and continuous innovation to harness these benefits. By emphasizing the importance of securing CPS against evolving threats, this research contributes to the ongoing discourse on cybersecurity and advocates for a collaborative approach to foster innovation and enhance the resilience of critical infrastructure in the digital era.Keywords: CPS, IAM, IoT, AI, ML, authentication, models, policies, healthcare
Procedia PDF Downloads 2228736 The Impact Of Türki̇ye’s Decision-making Mechanism On The Transformation In Türkiye-syria Relations (2002-2024)
Authors: Ibrahim Akkan
Abstract:
This study analyses the transformation of Türkiye's Syria policy between 2002 and 2024 and the impact of domestic political dynamics in this process. Since the collapse of the Ottoman Empire, Türkiye and Syria have had a tense relationship for a long time due to reasons such as border issues, water sharing, security concerns and the activities of terrorist organizations. However, the process that started with the Adana Agreement in 1998 gained momentum with the Justice and Development Party (Ak Party) coming to power in 2002 and a historical period of rapprochement began between the two countries. During this period, Türkiye adopted the concept of “zero problems with neighbors” in its foreign policy and deepened its strategic partnerships in the region. Turkish-Syrian relations also developed within this framework, the trade volume between the two countries increased and cooperation was strengthened through mutual visits and diplomatic agreements. However, the Arab Spring that started in 2011 was a sharp turning point in Turkish-Syrian relations. The harsh stance of the Bashar Assad administration against the popular uprisings in Syria caused Türkiye to take a stance against Assad and support opposition groups. This process led to the severing of diplomatic ties between the two countries and the gradual deterioration of relations until 2024. Türkiye directly intervened in the civil war in Syria after the Arab Spring and conducted military operations in northern Syria that highlighted security policies. The main purpose of this study is to examine the transformation in Türkiye's Syria policies between 2002 and 2024 and to analyze the role of domestic political dynamics in Türkiye in this transformation. The main research question of the study is how domestic political actors in Türkiye, especially decision-makers (leaders, governments, political parties), shape foreign policy. In this context, the extent to which the leadership of the Ak Party government is decisive in decision-making processes and how the impact of domestic dynamics on foreign policy emerges will be studied. In this study, how both the pressures of the international system and domestic political dynamics shape foreign policy will be analyzed using the theoretical framework of neoclassical realism. How decision-making processes are decisive in foreign policy will be examined through a case study specific to Türkiye-Syria relations. In addition, the strategic preferences of leaders such as Recep Tayyip Erdoğan and Ahmet Davutoğlu in foreign policy and how these preferences overlap with developments in domestic politics will be evaluated using the discourse analysis method. This study aims to make a new contribution to the literature by providing a comprehensive analysis of how domestic dynamics shape foreign policy in Türkiye-Syria relations.Keywords: decision-making mechanisms, foreign policy analysis, neoclassical realism, syria, türkiye
Procedia PDF Downloads 128735 Strategic Redesign of Public Spaces with a Sustainable Approach: Case Study of Parque Huancavilca, Guayaquil
Authors: Juan Carlos Briones Macias
Abstract:
Currently, the Huancavilca City Park in Guayaquil is an abandoned public space that is discovering a growing problem of insecurity, where various problems have been perceived, such as the lack of green areas, deteriorating furniture, insufficient lighting, the use of inadequate cladding materials and very sunny areas due to the lack of planning in the design of green areas. The objective of this scientific article is to redesign Huancavilca Park through public space design strategies for more attractive and comfortable areas, becoming a point of interaction in a safe and accessible way. A mixed methodology (qualitative and quantitative) was applied, obtaining information based on surveys, interviews, field observations, and systematizing the data in the traditional weighting of the structuring aspects of the park. The results were obtained from the methodological design scheme of iterative analysis of public spaces by Jan Güell. It is concluded that the use of urban strategies in the structuring elements of the park, such as vegetation, furniture, generating new activities, and security interventions, will specifically solve all the problems of the Huancavilca Park tested in a Pareto 80/20 Diagram.Keywords: public space, green areas, vegetation, street furniture, urban analysis
Procedia PDF Downloads 14628734 Undersea Communications Infrastructure: Risks, Opportunities, and Geopolitical Considerations
Authors: Lori W. Gordon, Karen A. Jones
Abstract:
Today’s high-speed data connectivity depends on a vast global network of infrastructure across space, air, land, and sea, with undersea cable infrastructure (UCI) serving as the primary means for intercontinental and ‘long-haul’ communications. The UCI landscape is changing and includes an increasing variety of state actors, such as the growing economies of Brazil, Russia, India, China, and South Africa. Non-state commercial actors, such as hyper-scale content providers including Google, Facebook, Microsoft, and Amazon, are also seeking to control their data and networks through significant investments in submarine cables. Active investments by both state and non-state actors will invariably influence the growth, geopolitics, and security of this sector. Beyond these hyper-scale content providers, there are new commercial satellite communication providers. These new players include traditional geosynchronous (GEO) satellites that offer broad coverage, high throughput GEO satellites offering high capacity with spot beam technology, low earth orbit (LEO) ‘mega constellations’ – global broadband services. And potential new entrants such as High Altitude Platforms (HAPS) offer low latency connectivity, LEO constellations offer high-speed optical mesh networks, i.e., ‘fiber in the sky.’ This paper focuses on understanding the role of submarine cables within the larger context of the global data commons, spanning space, terrestrial, air, and sea networks, including an analysis of national security policy and geopolitical implications. As network operators and commercial and government stakeholders plan for emerging technologies and architectures, hedging risks for future connectivity will ensure that our data backbone will be secure for years to come.Keywords: communications, global, infrastructure, technology
Procedia PDF Downloads 8728733 Impact of Different Ripening Accelerators on the Microbial Load and Proximate Composition of Plantain (Musa paradisiaca) and Banana (Musa sapientum), during the Ripening Process, and the Nutrition Implication for Food Security
Authors: Wisdom Robert Duruji, Oluwasegun Christopher Akinleye
Abstract:
This study reports on the impact of different ripening accelerators on the microbial load and proximate composition of plantain (Musa paradisiaca) and Banana (Musa sapientum) during the ripening process, and the nutrition implication for food security. The study comprised of four treatments, namely: Calcium carbide, Irvingia gabonensis fruits, Newbouldia laevis leaves and a control, where no ripening accelerator was applied to the fingers of plantain and banana. The unripe and ripened plantain and banana were subjected to microbial analysis by isolating and enumerating their micro flora using pour plate method; and also, their proximate composition was determined using standard methods. The result indicated that the bacteria count of plantain increased from 3.25 ± 0.33 for unripe to 5.31 ± 0.30 log cfu/g for (treated) ripened, and that of banana increased from 3.69 ± 0.11 for unripe to 5.26 ± 0.21 log cfu/g for ripened. Also, the fungal count of plantain increased from 3.20 ± 0.16 for unripe to 4.88 ± 0.22 log sfu/g for ripened; and that of banana increased from 3.61 ± 0.19 for unripe to 5.43 ± 0.26 for ripened. Ripened plantain fingers without any ripening accelerator (control) had significantly (p < 0.05) higher values of crude protein 3.56 ± 0.06%, crude fat 0.42 ± 0.04%, total ash 2.74 ± 0.15 and carbohydrate 31.10 ± 0.20; but with significantly lower value of moisture 62.14 ± 0.07% when compared with treated plantain. The proximate composition trend of treated and banana fingers control is similar to that of treated and plantain control, except that higher moisture content of 75.11 ± 0.07% and lesser protein, crude fat, total ash and carbohydrate were obtained from treated and ripened banana control when the treatments were compared with that of plantain. The study concluded that plantain is more nutritious (mealy) than a banana; also, the ripening accelerators increased the microbial load and reduced the nutritional status of plantain and banana.Keywords: food nutrition, calcium carbide, rvingia gabonensis, newbouldia laevis, plantain, banana
Procedia PDF Downloads 32328732 Women Mayors and Management of Spanish Councils: An Empirical Analysis
Authors: Carmen Maria Hernandez-Nicolas, Juan Francisco Martín-Ugedo, Antonio Mínguez-Vera
Abstract:
This paper analyses the influence of gender of the mayors of Spanish local governments on different budget items using a sample of 8,243 town councils between 2002 and 2010 period and 64,361 observations. The system Generalized Method of Moments (GMM) technique was employed to examine this panel data. This powerful methodology allows controlling for the endogenity of the variables and the heterogeneity of the sample. Unlike previous works focused on the study of gender influence on firm decisions, the present work analyzes the influence of the gender of the major in the council’s decisions. Specifically, we examine the differences in financial liabilities, security, protection and social promotion expenses and income items relating to public management. In addition, the study focuses on the Spanish context, which is characterized by the presence of decentralization of public responsibility to a greater extent than in neighboring countries, feeding the debate on the operational efficiency of local government increased with an open debate on the importance of gender in public management. The results show that female mayors tend to have lower expenses in general without significant differences in incomes obtained for men and women majors. We also find that female majors incur fewer financial liabilities, one of the most important problems in the Spanish public sector. However, despite of cutting in the public sector, these councils have higher expenditure on security, protection and social promotion. According to these evidences, the presence of women in politics may serve to improve the councils’ economic situation and it is not only necessary for social justice but for economics efficiency. Besides, in councils with more inhabitants, women mayors are more common, but women who served for a very long time are less common.Keywords: councils, gender, local budgets, public management, women mayors
Procedia PDF Downloads 40028731 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation
Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques
Procedia PDF Downloads 28728730 A Comparison of Methods for Neural Network Aggregation
Authors: John Pomerat, Aviv Segev
Abstract:
Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning
Procedia PDF Downloads 16228729 Enhancing Project Success: A Case Study of Investment Strategies and Planning Practices in Rwanda’s Housing Projects Managed by Rwanda Social Security Board
Authors: Amina Umulisa
Abstract:
Background: Despite efforts to enhance profitability and project planning, Rwanda has experienced a decline in project success rates, notably in housing projects managed by the Rwanda Social Security Board (RSSB). This study aims to assess the impact of investment strategies and project planning practices on the performance of pension funds projects in Rwanda, focusing on housing projects by RSSB. Methods: Using descriptive and correlational research designs, this study surveyed 109 randomly selected respondents from a pool of 148 workers. Data analysis was conducted using descriptive and inferential statistics in STATA version 18. Results: Findings revealed that 54% of respondents acknowledged the importance of personnel generation. Additionally, 61% agreed with the effectiveness of training programs, and 79% supported the cost of human resource utilization. In terms of project management practices, 65.7% could determine when a project needed adjustments, 65.7% agreed with the approved budget, and 73% supported forecasted expenses. Furthermore, 68% agreed with order placement, 76.0% with using the right materials, and 64.4% with defining project scope. The study found significant associations between order placement and project quality outcomes (r=0.711, P-value <0.001), as well as with time management (Pearson was 0.701 and sing was 0.00) and cost management (r=0.885, P-value <0.001). Moreover, project time targets were found to significantly affect quality management (Pearson was 0.798, sing was 0.000), time management, and cost management (r=0.740, P-value <0.001). Conclusion: The findings highlight the positive association between the project implementation stage and quality management, indicating effective project planning practices among senior staff. However, there is a need to enhance project team collaboration and coordination to improve the performance of constructed houses.Keywords: project success rates, investment strategies, training programs, cost management
Procedia PDF Downloads 5228728 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda
Authors: Seember Susan Aondoakura
Abstract:
This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.Keywords: conflict, protection, security, SGBV
Procedia PDF Downloads 9628727 Investigating the Performance of Power Industry in a Developing Nation for Industrialization and Environmental Security
Authors: Abel Edeowede Abhulimen
Abstract:
Due to supply irregularity and frequent outages, the need for reliability in power supply has grown unsatisfactorily over time in developing nations, impeding industrialization and fueling insecurity. This article attempts to break down the Nigerian power issue into its numerous sub-sectors in order to pinpoint the industry's ailment and suggest a viable fix. Monthly average performance data were obtained for the various sub-sectors across the industry for eight consecutive quarters. Whereas the amount of energy generated was found to be insufficient to engender industrialization in a nation like Nigeria, the transmission infrastructure was inadequate for the amount of power needed to be wheeled. Additionally, the distribution sub-sector was plagued with problems such as revenue collection inefficiency, severe enough to impede the growth of the entire industry. The country's goal of attaining energy sufficiency and industrialization would significantly be closer to reality with a conscious effort to increase the base of power generation through aggressive investment in Combined Cycle Gas Turbines (CCGT), decentralization of the transmission infrastructure, and strict monitoring of the distribution sub-sector for improved accountability and system reliability.Keywords: performance, power industry, industrialization, security, energy
Procedia PDF Downloads 7228726 An Empirical Study of Factors that Impact Government E-Services Acceptance by Citizens: Case Study from UAE
Authors: Emad Bataineh, Sara Al-Mutawa
Abstract:
The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Five factors were adopted as determinants of acceptance of e-services: ease of use, security, trust, web skills, and language. The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services. The overall findings revealed that security language, web skills and support significantly affected ease of use and perceived usefulness. However, the trust doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness. This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE.Keywords: e-government portal, e-service, usability, TAM model
Procedia PDF Downloads 43028725 A Multi-Perspective, Qualitative Study into Quality of Life for Elderly People Living at Home and the Challenges for Professional Services in the Netherlands
Authors: Hennie Boeije, Renate Verkaik, Joke Korevaar
Abstract:
In Dutch national policy, it is promoted that the elderly remain living at home longer. They are less often admitted to a nursing home or only later in life. While living at home, it is important that they experience a good quality of life. Care providers in primary care support this. In this study, it was investigated what quality of life means for the elderly and which characteristics care should have that supports living at home longer with quality of life. To explore this topic, a qualitative methodology was used. Four focus groups were conducted: two with elderly people who live at home and their family caregivers, one with district nurses employed in-home care services and one with elderly care physicians working in primary care. Next to this individual interviews were employed with general practitioners (GPs). In total 32 participants took part in the study. The data were thematically analysed with MaxQDA software for qualitative analysis and reported. Quality of life is a multi-faceted term for elderly. The essence of their description is that they can still undertake activities that matter to them. Good physical health, mental well-being and social connections enable them to do this. Own control over their life is important for some. They are of opinion that how they experience life and manage old age is related to their resilience and coping. Key terms in the definitions of quality of life by GPs are also physical and mental health and social contacts. These are the three pillars. Next, to this elderly care, physicians mention security and safety and district nurses add control over their own life and meaningful daily activities. They agree that with frail elderly people, the balance is delicate and a change in one of the three pillars can cause it to collapse like a house of cards. When discussing what support is needed, professionals agree on access to care with a low threshold, prevention, and life course planning. When care is provided in a timely manner, a worsening of the situation can be prevented. They agree that hospital care often is not needed since most of the problems with the elderly have to do with care and security rather than with a cure per se. GPs can consult elderly care physicians to lower their workload and to bring in specific knowledge. District nurses often signal changes in the situation of the elderly. According to them, the elderly predominantly need someone to watch over them and provide them with a feeling of security. Life course planning and advance care planning can contribute to uniform treatment in line with older adults’ wishes. In conclusion, all stakeholders, including elderly persons, agree on what entails quality of life and the quality of care that is needed to support that. A future challenge is to shape conditions for the right skill mix of professionals, cooperation between the professions and breaking down differences in financing and supply. For the elderly, the challenge is preparing for aging.Keywords: elderly living at home, quality of life, quality of care, professional cooperation, life course planning, advance care planning
Procedia PDF Downloads 12828724 Sustaining Efficiency in Electricity Distribution to Enhance Effective Human Security for the Vulnerable People in Ghana
Authors: Anthony Nyamekeh-Armah Adjei, Toshiaki Aoki
Abstract:
The unreliable and poor efficiency of electricity distribution leading to frequent power outages and high losses are the major challenge facing the power distribution sector in Ghana. Distribution system routes electricity from the power generating station at a higher voltage through the transmission grid and steps it down through the low voltage lines to end users. Approximately all electricity problems and disturbances that have increased the call for renewable and sustainable energy in recent years have their roots in the distribution system. Therefore, sustaining electricity distribution efficiency can potentially contribute to the reserve of natural energy resources use in power generation, reducing greenhouse gas emission (GHG), decreasing tariffs for consumers and effective human security. Human Security is a people-centered approach where individual human being is the principal object of concern, focuses on protecting the vital core of all human lives in ways for meeting basic needs that enhance the safety and protection of individuals and communities. The vulnerability is the diminished capacity of an individual or group to anticipate, resist and recover from the effect of natural, human-induced disaster. The research objectives are to explore the causes of frequent power outages to consumers, high losses in the distribution network and the effect of poor electricity distribution efficiency on the vulnerable (poor and ordinary) people that mostly depend on electricity for their daily activities or life to survive. The importance of the study is that in a developing country like Ghana where raising a capital for new infrastructure project is difficult, it would be beneficial to enhance the efficiency that will significantly minimize the high energy losses, reduce power outage, to ensure safe and reliable delivery of electric power to consumers to secure the security of people’s livelihood. The methodology used in this study is both interview and questionnaire survey to analyze the response from the respondents on causes of power outages and high losses facing the electricity company of Ghana (ECG) and its effect on the livelihood on the vulnerable people. Among the outcome of both administered questionnaire and the interview survey from the field were; poor maintenance of existing sub-stations, use of aging equipment, use of poor distribution infrastructure and poor metering and billing system. The main observation of this paper is that the poor network efficiency (high losses and power outages) affects the livelihood of the vulnerable people. Therefore, the paper recommends that policymakers should insist on all regulation guiding electricity distribution to improve system efficiency. In conclusion, there should be decentralization of off-grid solar PV technologies to provide a sustainable and cost-effective, which can increase daily productivity and improve the quality of life of the vulnerable people in the rural communities.Keywords: electricity efficiency, high losses, human security, power outage
Procedia PDF Downloads 28628723 Media Coverage of the Turkish Armenian Journalist Hrant Dink Assassination: The Analysis of Media News in the Aftermath of the Assassination
Authors: Nusret Mesut Sahin
Abstract:
Hrant Dink, a prominent Turkish-Armenian journalist, and editor-in-chief of the bilingual Turkish-Armenian newspaper Agos, was assassinated in Istanbul on January 19th, 2007 by a nationalist extremist, Ogun Samast. Dink had been voicing the atrocities against the Armenians between 1915 and 1922 during the Ottoman rule, and his comments on the issue appeared in the Turkish media many times before his assassination. Despite intensive media coverage of his assassination, there is not enough research analyzing how national and international media presented Dink’s assassination. In this research, a content analysis of national and international news articles (N= 139) is conducted to identify whether there is a significant difference in national and international media’s coverage of the assassination. The content of the newspaper articles is categorized and coded according to the topics covered. The findings of this research suggested that Dink’s assassination wounded Turkey’s image as a democratic country. It has also been found that the Turkish media focused on security forces and their responsibility in Dink’s assassination, whereas international media focused more on the Article 301 of the Turkish penal code, freedom of expression, and atrocities against the Armenians during the Ottoman rule.Keywords: Hrant Dink, Armenian, journalist, assassination
Procedia PDF Downloads 15228722 The Effect of Job Insecurity on Attitude towards Change and Organizational Citizenship Behavior: Moderating Role of Islamic Work Ethics
Authors: Khurram Shahzad, Muhammad Usman
Abstract:
The main aim of this study is to examine the direct and interactive effects of job insecurity and Islamic work ethics on employee’s attitude towards change and organizational citizenship behavior. Design/methodology/approach: The data was collected from 171 male and female university teachers of Pakistan. Self administered, close ended questionnaires were used to collect the data. Data was analyzed through correlation and regression analysis. Findings: Through the analysis of data, it was found that job insecurity has a strong negative effect on the attitude towards change of university teachers. On the contrary, job insecurity has no significant effect on organizational citizenship behavior of university teachers. Our results also show that Islamic work ethics does not moderate the relationship of job insecurity and attitude towards change, while a strong moderation effect of Islamic wok ethics is found on the relationship of job insecurity and organizational citizenship behavior. Originality/value: This study for the first time examines the relationship of job insecurity with employee’s attitude towards change and organizational citizenship behavior with the moderating effect of Islamic work ethics.Keywords: job security, islamic work ethics, attitude towards change, organizational citizenship behavior
Procedia PDF Downloads 47528721 The Situation of Transgender Individuals Was Worsened During Covid-19
Authors: Kajal Attri
Abstract:
Introduction: Transgender people are considered third gender in India, although they still face identification issues and alienated from society. Furthermore, they face several challenges, including discrimination in employment, resources, education, and property as a result, most transgender people make a living through begging at traffic lights, trains, and buses; attending auspicious occasions such as childbirth and weddings; and engaging in sex work, which includes both home-based and street-based sex work. During COVID-19, maintaining social distance exacerbates transgender people's circumstances and prevents them from accessing health care services, sexual reassignment surgery, identity-based resources, government security, and financial stability. Nonetheless, the pandemic raised unfavorable attitudes about transgender persons, such as unsupportive family members and trouble forming emotional relationships. This study focuses on how we missed transgender people during COVID-19 to provide better facilities to cope with this situation when they are already the most vulnerable segment of the society. Methodology: The research was conducted using secondary data from published publications and grey literature obtained from four databases: Pubmed, Psychinfo, Science direct, and Google scholar. The literature included total 25 articles that met the inclusion criteria for a review. Result and Discussion: Transgender people, who are considered the most vulnerable sector of society, have already faced several obstacles as a result of the outbreak. The analysis underscores the difficulties that transgender persons faced during COVID-19, such as, They had trouble accessing the government's social security programmes during the lockdown, which provide rations and pensions since they lack the necessary identifying cards. The impact of COVID-19 leaves transgender people at heightened risk of poverty and ill health because they exist on the margins of society, those livelihood base on sex work, begging, and participation on auspicious occasions. They had a significant risk of contracting SARS-CoV2 because they lived in congested areas or did not have permanent shelter, and they were predominantly infected with HIV, cancer, and other non-communicable illnesses. The pandemic raised unfavorable attitudes about transgender persons, such as unsupportive family members and trouble forming emotional relationships. Conclusion: The study comes forward with useful suggestions based on content analysis and information to reduce the existing woes of transgenders during any pandemic like COVID-19.Keywords: COVID-19, transgender, lockdown, transwomen, stigmatization
Procedia PDF Downloads 7528720 Women's Vulnerability to Cross-Border Criminality in Saki/Iseyin Area of Oyo State in Nigeria: Insight and Experiences
Authors: Samuel Kehinde Okunade, Daniel Sunday Tolorunshagba
Abstract:
Globally women are classified to be part of the vulnerable group in any environment. In a conflict-ridden environment, women being vulnerable often suffer the consequences as it relates to security and access to basic social services such as medical care. This is the situation in border communities in Nigeria where cross-border crimes are on the rife, thus, putting women at a disadvantaged position and, eventually, victims of such inimical activities. Border communities in the Saki/Iseyin area of Oyo state are a case in point where the lives of inhabitants are daily threatened most, especially women. In light of the above, this article examined the security situation of the Saki/Iseyin area of Oyo State with a view to ascertaining its status in terms of safety of lives and property. This paper also explored the experiences of women in the border communities within the area as it relates to their safety, the safety of their children, access to good health facilities in their immediate environment, and above all, how they have been able to cope or manage the situation. The qualitative research model was adopted utilizing a phenomenological case study approach. A Focused Group Discussion was conducted with 10 pregnant women and 10 mothers in Okerete and Abugudu communities while a Key Informant Interview was conducted with the women leaders in both communities of the Saki/Iseyin border area of Oyo State. The findings of the study revealed the poor state of basic infrastructure. So bad to a point that inhabitants of these communities no longer see themselves as Nigerians because they have been neglected by the government for too long. The only solution is for the government to embark on developmental projects within these communities so that they can live a good life just as those in the cities do. More importantly, this will increase the loyalty of these communities to the Nigeria state by defending and resisting all forms of cross-border criminal activities that go on along the porous borders.Keywords: security, women, Saki/Iseyin border area, cross-border criminalities, basic infrastructure
Procedia PDF Downloads 12928719 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives
Authors: Nawt Almutairi, Ramzi El-Haddadeh
Abstract:
With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.Keywords: e-service, satisfaction, trust, loyalty
Procedia PDF Downloads 25928718 Global City Typologies: 300 Cities and Over 100 Datasets
Authors: M. Novak, E. Munoz, A. Jana, M. Nelemans
Abstract:
Cities and local governments the world over are interested to employ circular strategies as a means to bring about food security, create employment and increase resilience. The selection and implementation of circular strategies is facilitated by modeling the effects of strategies locally and understanding the impacts such strategies have had in other (comparable) cities and how that would translate locally. Urban areas are heterogeneous because of their geographic, economic, social characteristics, governance, and culture. In order to better understand the effect of circular strategies on urban systems, we create a dataset for over 300 cities around the world designed to facilitate circular strategy scenario modeling. This new dataset integrates data from over 20 prominent global national and urban data sources, such as the Global Human Settlements layer and International Labour Organisation, as well as incorporating employment data from over 150 cities collected bottom up from local departments and data providers. The dataset is made to be reproducible. Various clustering techniques are explored in the paper. The result is sets of clusters of cities, which can be used for further research, analysis, and support comparative, regional, and national policy making on circular cities.Keywords: data integration, urban innovation, cluster analysis, circular economy, city profiles, scenario modelling
Procedia PDF Downloads 18028717 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis
Authors: R. Rama Kishore, Sunesh
Abstract:
This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy
Procedia PDF Downloads 25328716 Rural Territorial Sustainable Development: Interinstitutional Dialogue and Transition to Sustainable Livelihoods
Authors: Aico Nogueira
Abstract:
This paper examines the interinstitutional dialogues within the Brazilian federal structures, which comprises federal, state and local levels, around the themes of new approaches and interventions aimed to promote sustainable rural development, particularly rural development as part of a territorial approach. The work seeks to understand to what extent the various levels of the state interact with these strategies, particularly with the locally constituted powers, focusing on the importance of the transition of traditional agriculture methods to more sustainable agroecological systems and its effects on food security and sustainable rural development. The research analyses as case studies the Sustainable Rural Territories Development Program (PRONAT) of the Ministry of Agrarian Development at the federal level, as well as the State of São Paulo and the Vale do Ribeira Territory, an area characterized by environmental and social vulnerability, restrictive environmental laws and attempts to promote sustainable development. In order to examine how the interrelationships between different levels of governance and civil society, in addition to the neo-institutionalist polity centered literature, the research uses an adaptation of the concept of arena in Ostrom and Hannigan, produced at different scales of decision-making processes, as well as the multilevel governance literature. Document analysis, interviews, focus groups and direct observation techniques are also used. The main findings of this study are that how different levels of governance understand and organize themselves for this work and have a direct impact on the actions taken. Consequently, programs formulated for this purpose are not associated with the creation of institutions capable of breaking with a traditional sectoral view that has historically prevailed in policymaking. And the transition from traditional agriculture to agroecological production systems is hampered by a sectorial foundation, based on large-scale production and the strengthening of the traditional country's land concentration model.Keywords: agroecology, food security, inter-institutional dialogue, rural poverty, sustainable rural development, territorial development
Procedia PDF Downloads 20228715 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System
Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav
Abstract:
The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization
Procedia PDF Downloads 40928714 A Review of Spatial Analysis as a Geographic Information Management Tool
Authors: Chidiebere C. Agoha, Armstong C. Awuzie, Chukwuebuka N. Onwubuariri, Joy O. Njoku
Abstract:
Spatial analysis is a field of study that utilizes geographic or spatial information to understand and analyze patterns, relationships, and trends in data. It is characterized by the use of geographic or spatial information, which allows for the analysis of data in the context of its location and surroundings. It is different from non-spatial or aspatial techniques, which do not consider the geographic context and may not provide as complete of an understanding of the data. Spatial analysis is applied in a variety of fields, which includes urban planning, environmental science, geosciences, epidemiology, marketing, to gain insights and make decisions about complex spatial problems. This review paper explores definitions of spatial analysis from various sources, including examples of its application and different analysis techniques such as Buffer analysis, interpolation, and Kernel density analysis (multi-distance spatial cluster analysis). It also contrasts spatial analysis with non-spatial analysis.Keywords: aspatial technique, buffer analysis, epidemiology, interpolation
Procedia PDF Downloads 319