Search results for: internal security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5124

Search results for: internal security

4074 Privacy for the Internet of Things and its Different Dimensions

Authors: Maryam M Esfahani

Abstract:

The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.

Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies

Procedia PDF Downloads 97
4073 Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict

Authors: Christopher Holroyd

Abstract:

With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important.

Keywords: human trafficking, reconstruction, security, terrorism

Procedia PDF Downloads 132
4072 Case Study Analysis for Driver's Company in the Transport Sector with the Help of Data Mining

Authors: Diana Katherine Gonzalez Galindo, David Rolando Suarez Mora

Abstract:

With this study, we used data mining as a new alternative of the solution to evaluate the comments of the customers in order to find a pattern that helps us to determine some behaviors to reduce the deactivation of the partners of the LEVEL app. In one of the greatest business created in the last times, the partners are being affected due to an internal process that compensates the customer for a bad experience, but these comments could be false towards the driver, that’s why we made an investigation to collect information to restructure this process, many partners have been disassociated due to this internal process and many of them refuse the comments given by the customer. The main methodology used in this case study is the observation, we recollect information in real time what gave us the opportunity to see the most common issues to get the most accurate solution. With this new process helped by data mining, we could get a prediction based on the behaviors of the customer and some basic data recollected such as the age, the gender, and others; this could help us in future to improve another process. This investigation gives more opportunities to the partner to keep his account active even if the customer writes a message through the app. The term is trying to avoid a recession of drivers in the future offering improving in the processes, at the same time we are in search of stablishing a strategy which benefits both the app’s managers and the associated driver.

Keywords: agent, driver, deactivation, rider

Procedia PDF Downloads 278
4071 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 365
4070 Feasibility of Battery Electric Vehicles in Saudi Arabia: Cost and Sensitivity Analysis

Authors: Tawfiq Albishri, Abdulmajeed Alqahtani

Abstract:

Battery electric vehicles (BEVs) are increasingly seen as a sustainable alternative to internal combustion engine (ICE) vehicles, primarily due to their environmental and economic benefits. Saudi Arabia's interest in investing in renewable energy and reducing greenhouse gas emissions presents significant potential for the widespread adoption of BEVs in the country. However, several factors have hindered the adoption of BEVs in Saudi Arabia, with high ownership costs being the most prominent barrier. This cost discrepancy is primarily due to the lack of localized production of BEVs and their components, leading to increased import costs, as well as the high initial cost of BEVs compared to ICE vehicles. This paper aims to evaluate the feasibility of BEVs compared to ICE vehicles in Saudi Arabia by conducting a cost of ownership analysis. Furthermore, a sensitivity analysis will be conducted to determine the most significant contributor to the ownership costs of BEVs that, if changed, could expedite their adoption in Saudi Arabia.

Keywords: battery electric vehicles, internal combustion engine, renewable energy, greenhouse gas emissions, total cost of ownership

Procedia PDF Downloads 83
4069 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation

Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin

Abstract:

The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.

Keywords: ISMS success factors, IT project management, IS success, information security

Procedia PDF Downloads 313
4068 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India

Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer

Abstract:

The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.

Keywords: East Himalaya, local community, wild edible plants, nutrition, food security

Procedia PDF Downloads 261
4067 New Vision of 'Social Europe': Renationalising the Integration Process in the Internal Market of the European Union

Authors: Robert Grzeszczak, Magdalena Gniadzik

Abstract:

The article deals with one of the most significant issues concerning the functioning of the internal market of the European Union – the free movement of workers and free movement of persons. The purpose is to identify the political and legal effects of the “renationalisation process” on the EU and its Member States. The concept of renationalisation is expressed through Member States’ aim to verify the relationship with the EU. The tendency is more visible in the public opinion of several MS’s of the ‘EU core’ and may be confirmed by the changes applied by the regulatory body. The thesis for the article is the return of renationalisation tendencies in the area of the Single Market, which is supported by, among others, an open criticism of the foundations of EU integration or considerations on withdrawal from the EU by some MS. This analysis will focus primarily on the effects that renationalisation may have on the free movement of persons. The free movement of persons is one of the key issues for the development of the European integration. It is still subject to theoretical reflections, new doubts and practical issues. The latest developments in politics, law and jurisprudence demonstrate the need to reflect on the attempts to redefine certain principles regarding migrant EU workers and their protection against nationality-based discrimination.

Keywords: European Union, Singel Market, free movement of persons, posting of workers

Procedia PDF Downloads 229
4066 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners

Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi

Abstract:

Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.

Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression

Procedia PDF Downloads 221
4065 The Challenges of Business Incubations: A Case of Malaysian Incubators

Authors: Logaiswari Indiran, Zainab Khalifah, Kamariah Ismail

Abstract:

Business incubators have now been recognized as effective tools in providing business assistance to start-up firms. In both developed and developing countries, the number of incubators is growing tremendously. As the birth rate of incubators increases, so do its challenges. Malaysia, as one of the developing countries in the Asian continent, has also established a number of business incubators to breed and foster the growth and survival of start-up firms. Thus, this study discusses the incubation model applied in Malaysia and the challenges faced by these incubators using secondary data including policies, previous literature, and reports related to Malaysian incubators. The findings of this study call the government to rethink the key role of incubator managers and staffs, internal structure of the incubator concept and process, intellectual properties management, strategic alliances with universities-industries and funding supports in enhancing the support provided by the business incubators in Malaysia. The key challenges highlighted in this study signal important policy lessons for other developing countries that aim to create and map an effective business incubator ecosystem.

Keywords: business incubators, incubation challenges, funding support, incubator managers, internal structure, start-up firms

Procedia PDF Downloads 272
4064 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 319
4063 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 165
4062 Phylogenetic Analysis Based On the Internal Transcribed Spacer-2 (ITS2) Sequences of Diadegma semiclausum (Hymenoptera: Ichneumonidae) Populations Reveals Significant Adaptive Evolution

Authors: Ebraheem Al-Jouri, Youssef Abu-Ahmad, Ramasamy Srinivasan

Abstract:

The parasitoid, Diadegma semiclausum (Hymenoptera: Ichneumonidae) is one of the most effective exotic parasitoids of diamondback moth (DBM), Plutella xylostella in the lowland areas of Homs, Syria. Molecular evolution studies are useful tools to shed light on the molecular bases of insect geographical spread and adaptation to new hosts and environment and for designing better control strategies. In this study, molecular evolution analysis was performed based on the 42 nuclear internal transcribed spacer-2 (ITS2) sequences representing the D. semiclausum and eight other Diadegma spp. from Syria and worldwide. Possible recombination events were identified by RDP4 program. Four potential recombinants of the American D. insulare and D. fenestrale (Jeju) were detected. After detecting and removing recombinant sequences, the ratio of non-synonymous (dN) to synonymous (dS) substitutions per site (dN/dS=ɷ) has been used to identify codon positions involved in adaptive processes. Bayesian techniques were applied to detect selective pressures at a codon level by using five different approaches including: fixed effects likelihood (FEL), internal fixed effects likelihood (IFEL), random effects method (REL), mixed effects model of evolution (MEME) and Program analysis of maximum liklehood (PAML). Among the 40 positively selected amino acids (aa) that differed significantly between clades of Diadegma species, three aa under positive selection were only identified in D. semiclausum. Additionally, all D. semiclausum branches tree were highly found under episodic diversifying selection (EDS) at p≤0.05. Our study provide evidence that both recombination and positive selection have contributed to the molecular diversity of Diadegma spp. and highlights the significant contribution of D. semiclausum in adaptive evolution and influence the fitness in the DBM parasitoid.

Keywords: diadegma sp, DBM, ITS2, phylogeny, recombination, dN/dS, evolution, positive selection

Procedia PDF Downloads 415
4061 Landmines and the Postcolonial Security Discourse in Zimbabwe

Authors: Fradreck Jockonia Mujuru

Abstract:

The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.

Keywords: landmines, postcolonial, repression, security, violence

Procedia PDF Downloads 75
4060 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 138
4059 Internal Power Recovery in Cryogenic Cooling Plants Part I: Expander Development

Authors: Ambra Giovannelli, Erika Maria Archilei

Abstract:

The amount of the electrical power required by refrigeration systems is relevant worldwide. It is evaluated in the order of 15% of the total electricity production taking refrigeration and air-conditioning into consideration. For this reason, in the last years several energy saving techniques have been proposed to reduce the power demand of such plants. The paper deals with the development of an innovative internal recovery system for cryogenic cooling plants. Such a system consists in a Compressor-Expander Group (CEG) designed on the basis of the automotive turbocharging technology. In particular, the paper is focused on the design of the expander, the critical component of the CEG system. Due to the low volumetric flow entering the expander and the high expansion ratio, a commercial turbocharger expander wheel was strongly modified. It was equipped with a transonic nozzle, designed to have a radially inflow full admission. To verify the performance of such a machine and suggest improvements, two different set of nozzles have been designed and modelled by means of the commercial Ansys-CFX software. steady-state 3D CFD simulations of the second-generation prototype are presented and compared with the initial ones.

Keywords: vapour cCompression systems, energy saving, refrigeration plant, organic fluids, radial turbine

Procedia PDF Downloads 208
4058 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 219
4057 Simplified 3R2C Building Thermal Network Model: A Case Study

Authors: S. M. Mahbobur Rahman

Abstract:

Whole building energy simulation models are widely used for predicting future energy consumption, performance diagnosis and optimum control.  Black box building energy modeling approach has been heavily studied in the past decade. The thermal response of a building can also be modeled using a network of interconnected resistors (R) and capacitors (C) at each node called R-C network. In this study, a model building, Case 600, as described in the “Standard Method of Test for the Evaluation of Building Energy Analysis Computer Program”, ASHRAE standard 140, is studied along with a 3R2C thermal network model and the ASHRAE clear sky solar radiation model. Although building an energy model involves two important parts of building component i.e., the envelope and internal mass, the effect of building internal mass is not considered in this study. All the characteristic parameters of the building envelope are evaluated as on Case 600. Finally, monthly building energy consumption from the thermal network model is compared with a simple-box energy model within reasonable accuracy. From the results, 0.6-9.4% variation of monthly energy consumption is observed because of the south-facing windows.

Keywords: ASHRAE case study, clear sky solar radiation model, energy modeling, thermal network model

Procedia PDF Downloads 143
4056 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism

Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe

Abstract:

National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.

Keywords: counter-terrorism, discourse, Nigeria, security, terrorism

Procedia PDF Downloads 485
4055 Decomposition of the Customer-Server Interaction in Grocery Shops

Authors: Andreas Ahrens, Ojaras Purvinis, Jelena Zascerinska

Abstract:

A successful shopping experience without overcrowded shops and long waiting times undoubtedly leads to the release of happiness hormones and is generally considered the goal of any optimization. Factors influencing the shopping experience can be divided into internal and external ones. External factors are related, e. g. to the arrival of the customers to the shop, whereas internal are linked with the service process itself when checking out (waiting in the queue to the cash register and the scanning of the goods as well as the payment process itself) or any other non-expected delay when changing the status from a visitor to a buyer by choosing goods or items. This paper divides the customer-server interaction into five phases starting with the customer's arrival at the shop, the selection of goods, the buyer waiting in the queue to the cash register, the payment process, and ending with the customer or buyer's departure. Our simulation results show how five phases are intertwined and influence the overall shopping experience. Parameters for measuring the shopping experience are estimated based on the burstiness level in each of the five phases of the customer-server interaction.

Keywords: customers’ burstiness, cash register, customers’ wait-ing time, gap distribution function

Procedia PDF Downloads 146
4054 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia

Authors: Clara Voyvodic

Abstract:

Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.

Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences

Procedia PDF Downloads 131
4053 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network

Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar

Abstract:

Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.

Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network

Procedia PDF Downloads 107
4052 Social Inclusion of Rural Elderly Left Behind by Internal Labor Migration: A Case Study in a Chinese Rural Village in Anhui Province

Authors: Lei Liu

Abstract:

Since the famous opening up and reform strategy of China, lots of migrants have flowed from rural areas to urban areas. In this paper, the author investigates the rural elderly left behind, which are defined aged people left alone at home while their adult children have to migrant outside. This phenomenon is a quite general and serious social problem that cannot be ignored, accompanied by the process of urbanization and regional transferring of rural labor. The Chinese internal migration not only exerts great influence to China’s economy and urbanization but also obviously reduces the labor and care to rural aged people. Contrary to assumptions in some migration and aging studies, which show the inevitable negative effects of migration upon the old age care, the author highlights unique features in their daily strategies of house holding to integrate into society with the analysis of the conception of social inclusion. Through life history interviews with elderly left behind in one rural village, this article sheds light on three different factors of social inclusion, namely, economic inclusion, social identity and political inclusion and shows its necessaries to fully understand the status of the social wellbeing of rural elderly left behind.

Keywords: labor migration, elderly left behind, social inclusion, rural China

Procedia PDF Downloads 303
4051 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 182
4050 Exploring the Dynamics in the EU-Association of Southeast Asia Nations Interregional Relationship, 2012-2017

Authors: Xuechen Chen

Abstract:

The EU-ASEAN relations which can be dated back to 1972 represents one of the oldest group-to-group relationship in international politics. Despite a longstanding dialogue partnership, the EU and ASEAN have long been reluctant to forge deeper and substantial cooperation in political and security domains. However, the year of 2012 witnessed a salient shift in EU-ASEAN relations, with the EU significantly elevating ASEAN's profile in its external relations. Given the limited scholarly attention that has been devoted to this change in ASEAN-EU relations, this article explores why there has been a greater level of engagement and approximation between the EU and ASEAN. In particular, it asks why the EU, which had long been reluctant to recognize ASEAN as a strategic partner, has changed its policy towards ASEAN. Drawing on social constructivism, this article argues that the EU’s and ASEAN’s evolving identity-formation processes have played a significant role in reshaping their mutual perceptions, which subsequently leads to the modification of the interregional policies of both actors. The methodology of this study is based on content analysis of a wide range of official documents and policy papers from the EU and ASEAN, as well as more than 20 in-depth elite interviews with diplomats and experts working on the EU-ASEAN relationship from both organisations. Departing from the existing works which mainly adopt a Eurocentric perspective when analysing the EU-ASEAN interregionalism, this study suggests that the approximation of the EU-ASEAN relationship between 2012 and 2017 is driven by both actors’ adjustment of international identities, together with the internal dynamics and systematic changes within both regions.

Keywords: Association of Southeast Asia Nations, European Union, EU foreign policy, interregionalism

Procedia PDF Downloads 145
4049 Design of IMC-PID Controller Cascaded Filter for Simplified Decoupling Control System

Authors: Le Linh, Truong Nguyen Luan Vu, Le Hieu Giang

Abstract:

In this work, the IMC-PID controller cascaded filter based on Internal Model Control (IMC) scheme is systematically proposed for the simplified decoupling control system. The simplified decoupling is firstly introduced for multivariable processes by using coefficient matching to obtain a stable, proper, and causal simplified decoupler. Accordingly, transfer functions of decoupled apparent processes can be expressed as a set of n equivalent independent processes and then derived as a ratio of the original open-loop transfer function to the diagonal element of the dynamic relative gain array. The IMC-PID controller in series with filter is then directly employed to enhance the overall performance of the decoupling control system while avoiding difficulties arising from properties inherent to simplified decoupling. Some simulation studies are considered to demonstrate the simplicity and effectiveness of the proposed method. Simulations were conducted by tuning various controllers of the multivariate processes with multiple time delays. The results indicate that the proposed method consistently performs well with fast and well-balanced closed-loop time responses.

Keywords: coefficient matching method, internal model control (IMC) scheme, PID controller cascaded filter, simplified decoupler

Procedia PDF Downloads 440
4048 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 291
4047 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing

Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi

Abstract:

This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.

Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning

Procedia PDF Downloads 30
4046 Law, Resistance, and Development in Georgia: A Case of Namakhvani HPP

Authors: Konstantine Eristavi

Abstract:

The paper will contribute to the discussion on the pitfalls, limits, and possibilities of legal and rights discourse in opposing large infrastructural projects in the context of neoliberal globalisation. To this end, the paper will analyse the struggle against the Namakhvani HPP project in Georgia. The latter has been hailed by the government as one of the largest energy projects in the history of the country, with an enormous potential impact on energy security, energy independence, economic growth, and development. This takes place against the backdrop of decades of market-led -or neoliberal- model of development in Georgia, characterised by structural adjustments, deregulation, privatisation, and Laissez-Fair approach to foreign investment. In this context, the Georgian state vies with other low and middle-income countries for foreign capital by offering to potential investors, on the one hand, exemptions from social and environmental regulations and, on the other hand, huge legal concessions and safeguards, thereby participating in what is often called a “race to the bottom.” The Namakhvani project is a good example of this. At every stage, the project has been marred with violations of laws and regulations concerning transparency, participation, social and environmental regulations, and so on. Moreover, the leaked contract between the state and the developer reveals the contractual safeguards which effectively insulate the investment throughout the duration of the contract from the changes in the national law that might adversely affect investors’ rights and returns. These clauses, aimed at preserving investors' economic position, place the contract above national law in many respects and even conflict with fundamental constitutional rights. In response to the perceived deficiencies of the project, one of the largest and most diverse social movements in the history of post-soviet Georgia has been assembled, consisting of the local population, conservative and leftist groups, human rights and environmental NGOs, etc. Crucially, the resistance movement is actively using legal tools. In order to analyse both the limitations and possibilities of legal discourse, the paper will distinguish between internal and immanent critiques. Law as internal critique, in the context of the struggles around the Namakhvani project, while potentially fruitful in hindering the project, risks neglecting and reproducing those factors -e.g., the particular model of development- that made such contractual concessions and safeguards and concomitant rights violations possible in the first place. On the other hand, the use of rights and law as part of immanent critique articulates a certain incapacity on the part of the addressee government to uphold existing laws and rights due to structural factors, hence, pointing to a need for a fundamental change. This 'ruptural' form of legal discourse that the movement employs makes it possible to go beyond the discussion around the breaches of law and enables a critical deliberation on the development model within which these violations and extraordinary contractual safeguards become necessary. It will be argued that it is this form of immanent critique that expresses the emancipatory potential of legal discourse.

Keywords: law, resistance, development, rights

Procedia PDF Downloads 79
4045 Insider Fraud and its Risks to FinTechs

Authors: Claire Maillet

Abstract:

Insider fraud, including its various forms such as employee fraud or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective or past employer. ‘Employee’ covers anyone employed by the company, including contractors, agency workers, directors and part time staff. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic and the cost-of-living crisis, which have generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime; Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud. Given that the number of FinTechs is on the rise and there is a significant lack of empirically based solutions for reducing insider fraud, these are gaps in the research space that this thesis aims to fill. Finally, Kassem (2022) notes that “academic research plays a crucial role in raising awareness about fraud and researching effective methods for countering it”. Thus, this thesis may be used as an opportune tool to provide an extensive list of controls spanning detection, deterrence and prevention, that are recommended to be implemented to help combat the insider threat.

Keywords: insider fraud, internal fraud, pandemic, Covid-19

Procedia PDF Downloads 20