Search results for: information security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14950

Search results for: information security awareness

13870 Mass Media and Tobacco in Bangladesh: An Investigation on the Role of Mass Media in the Light of Tobacco Control

Authors: Tahsina Sadeque Kapil Ahmed

Abstract:

Context: The tobacco epidemic is one of the biggest public health threats the world has ever faced. Tobacco use is a widespread phenomenon in Bangladesh, and that causes numerous deaths and disabilities in a year. The studies conducted elsewhere have strengthened the evidence that mass media campaigns conducted in the context of comprehensive tobacco control programs can promote quitting and reduce smoking, as well as smokeless tobacco prevalence. Awareness building campaigns in mass-media against tobacco use should be prioritized more, and this paper will be an initiative towards enhancing mass-media’s role in controlling tobacco in Bangladesh. Objective: the main objective of this study is to investigate the role of mass-media in controlling tobacco in Bangladesh. Methods: This is a qualitative study and both primary, as well as secondary data were used where information gathered through the Key Informant Interviews (KIIs) and media contents. The employees of media houses (five national papers, two online news portals and six TV channels) were selected as study respondent. Media Content Analysis is used through the broad range of ‘texts’ from transcripts of interviews and discussions along with the materials like reports, footages, advertisements, talk-shows, articles etc. Results: The study result documented several opinions of discussants where Mass media was found to play a strong role in support of the amended tobacco control law and its implication that could be created public support against tobacco farming, exposing to companies’ tactics and other tobacco control activities. The study results also revealed that in controlling tobacco supply and demand effectively, media has been assisting the government and anti-tobacco activities productively. Majority of the Key Informants opined spontaneously on tobacco control program publicity, organizational interference, and influence of other activities on media. They also emphasized role of media for activities of anti-tobacco organizations, awareness building actions, popularization of tobacco control law and its amendment. Conclusion and Recommendation: The study shows evidence that mass media coverage of tobacco control issues is influencing the context of comprehensive tobacco control programs. To reduce tobacco consumption, along with strict enforcement efforts, media should be used to assist with the implementation of the tobacco control law. A sustained nationwide campaign to educate the masses against the dangers of smoking and smokeless tobacco is needed, and media can play an important role in creating further awareness about the dangers associated with tobacco consumption.

Keywords: Bangladesh media, mass media, role of media, tobacco control

Procedia PDF Downloads 213
13869 Spatial Correlation of Channel State Information in Real Long Range Measurement

Authors: Ahmed Abdelghany, Bernard Uguen, Christophe Moy, Dominique Lemur

Abstract:

The Internet of Things (IoT) is developed to ensure monitoring and connectivity within different applications. Thus, it is critical to study the channel propagation characteristics in Low Power Wide Area Network (LPWAN), especially Long Range Wide Area Network (LoRaWAN). In this paper, an in-depth investigation of the reciprocity between the uplink and downlink Channel State Information (CSI) is done by performing an outdoor measurement campaign in the area of Campus Beaulieu in Rennes. At each different location, the CSI reciprocity is quantified using the Pearson Correlation Coefficient (PCC) which shows a very high linear correlation between the uplink and downlink CSI. This reciprocity feature could be utilized for the physical layer security between the node and the gateway. On the other hand, most of the CSI shapes from different locations are highly uncorrelated from each other. Hence, it can be anticipated that this could achieve significant localization gain by utilizing the frequency hopping in the LoRa systems by getting access to a wider band.

Keywords: IoT, LPWAN, LoRa, effective signal power, onsite measurement

Procedia PDF Downloads 162
13868 Contextualizing Household Food Security: A Comparison of Two Villages, Ambros and Maramanzhi, South Africa

Authors: Felicity Aphiwe Mkhongi, Walter Musakwa

Abstract:

Smallholder crop production is a defining factor in achieving food security, particularly at the household level. However, the number of abandoned arable fields is increasing in communal areas of South Africa. While substantial efforts have been devoted to addressing food insecurity in the country, ownership of arable land has not been supplemented with sustainable food production for households. This paper analyses household food security in the context of deagrarianization in two villages, Ambros (Eastern Cape) and Maramanzhi (Limpopo). Semi-structured questionnaires were administered to acquire both qualitative and quantitative data from 106 heads of households. The IBM SPSS Statistics 28.0 computer program was applied to complete data analysis. From the findings of the study, it was evident that compared to arable fields, a greater proportion of households own home-gardens with an average size of 2100m in Ambros and 3400m in Maramanzhi village. The majority of arable fields were abandoned, particularly in Ambros village. Household food access challenges were measured using the Household Food Insecurity Access Scale (HFIAS). This food security indicator revealed that the majority of households were mildly food insecure owing to food shortages emanating from insufficient monthly income and waning household crop production. Food was rated as a very important reason for engaging in cultivation in both villages of the study, but deagrarianization has eroded opportunities for increasing household crop production. Among other possible solutions, this study recommends that the government invest more in agriculture to allow for sustainable strategies that revive abandoned arable land, such as arable fields in communal areas of South Africa, as this could increase food production for households.

Keywords: cultivation, deagrarianization, food security, rural households, smallholder farmers

Procedia PDF Downloads 56
13867 Election Administration for Pakistan’s Overseas Voters: An Interview Study

Authors: Adnan Skhawat Ali

Abstract:

Overseas voting was a long debatable issue in Pakistan because major political parties claimed that their overseas voters could not participate in the electoral system. In the history of Pakistan, the first time Election Management body- Election Commission of Pakistan (ECP), gave political rights to overseas Pakistanis in 2018 and promoted the true spirit of democracy to give political rights to those people who are living abroad. The main aim of this study is to highlight the crucial factors that are the main hindrance to overseas voting registration. This study conducted purposive sampling and held overseas voters’, from all over the world interviewed for the deep understanding of their behavior towards national politics and elections. This study highlighted the factors which are hindrances in the registration of overseas voters and election administration. These factors are lack of mass media campaign, lack of technical knowledge, complicated registration process, and no information sharing cells in concerned embassies and consulates. ECP should disseminate information about overseas voting via foreign embassies or consulate generals because these are more effective ways to provide information to the Pakistani community/overseas and conduct mass media awareness campaigns to properly inform citizens. Citizens have not only supported the country in terms of remittances but have also made the country’s image in front of other country’s citizens.

Keywords: election administration, political parties, election management body, overseas Pakistanis, elections, registration of overseas voters

Procedia PDF Downloads 4
13866 Sea Border Dispute between Greece and Turkey in the Mediterrenean: Implications for Turkey’s Maritime Security and Its Military Spending

Authors: Aslihan Caliskan

Abstract:

The term Mediterranean comes from the Latin “mediterraneus” (Medius, "middle" plus Terra, "land, earth"). For the ancient Romans, the Mediterranean was the center of the earth as they knew it. The desire to gain control of the Mediterranean has led to disputes between many nations throughout history, some of which continue to this day. The recent major natural gas discoveries in the Mediterranean have aggravated ongoing tensions in some neighboring countries. The sea border dispute between Turkey and Greece & Greek-Cypriot side is one of the most critical conflicts in the Mediterranean Sea region. This unresolved dispute has many implications for all countries involved, as well as for third parties that have direct or indirect interests in the region. The research question of this context is what are the implications of this controversial sea border problem on the maritime security of Turkey and its military spending. In this paper, the quantitative method is used. Records from the Turkish Defense Ministry, data from the Turkish naval forces have been obtained. In addition, literature research and the United Nations Convention on the Law of the Sea (UNCLOS) application cases were evaluated, and an incident analysis was carried out. This research shows that the sea border dispute issue has a significant impact on the Turkish military both in terms of the structures required to ensure maritime and border security, as well as rising military costs and its macroeconomic implications. The paper begins with a brief overview of relevant principles and methods applied for delimiting th esea borders. The paper continues with a brief description and a background of the sea border dispute between Turkey and Greece & Greek-Cypriot side in the light of the United Nations Convention on the Law of the Sea (UNCLOS). An analysis of the implications of the dispute on Turkey’s maritime security and its military spending is provided in the following chapters. The paper ends with concluding remarks of the author, including suggestions for the way forward.

Keywords: sea border security, mediterranean sea, greece-turkey dispute, limitation of sea, united nations convention on the law of the sea (UNCLOS)

Procedia PDF Downloads 186
13865 An Appraisal of the Knowledge Attitude and Practice (Kap) on Plastic Waste Pollution as a Resilience Pathway for Mitigating Climate Change Case of Durumi 1 Urban Slum Area of Abuja Nigeria

Authors: Pascal U. Onu, Doris A. Ogbang, Emmanuel Okechukwu.

Abstract:

Background: Plastics in their various forms have become ubiquitous in a very short space of time. This ubiquitous nature has plagued and daunted nations globally, overwhelming their ability to manage the environmental impact, especially its linkages to climate change. This has mobilized nations globally and triggered debates on the best approaches to ensure sustainability in terms of its production and utilization, as total elimination seems unrealistic. Objective: This study undertook to understand the pattern of plastic waste management, and its pollution awareness levels by the residents of the study area. Methods: Data were obtained through questionnaires designed specifically for plastic waste and qualitatively via journals and articles. Simple descriptive survey techniques with a survey population size of 300 respondents using kobo collect were employed. Results: Analysis based on disaggregated data indicated a proportionate distribution among male and female respondents (53% male and 47% female, respectively). Overall awareness levels on plastic waste's contribution to climate change, compared to its environmental impact, are reflective of a dire need for increased efforts in strengthening awareness creation, especially across gender populations and religious backgrounds. Drainage blockage topped the ranks among common problems caused by plastic waste within the area. Various plastic waste disposal methods were ranked, while pro-environmental measures for reducing the waste menace showed more willingness from males at 52%. Conclusion: These outcomes are instructive and suggest the need for renewed and increased awareness/education on the nexus of plastic pollution to climate change and also appropriate synergies/collaboration between government, private sector, and local communities, especially in the area of recycling to improve sustainability in plastic waste management.

Keywords: plastic waste, KAP, climate change, Nigeria

Procedia PDF Downloads 40
13864 The Influence of Website Quality on Customer E-Satisfaction in Low Cost Airline

Authors: Zainab Khalifah, Wong Chiet Bing, Noor Hazarina Hashim

Abstract:

The evolution of customer behavior in purchasing products or services through the Internet leads to airline companies engaging in the e-ticketing process in order to maintain their business. A well-designed website is vitally significant for the airline companies to provide effective communication, support, and competitive advantage. This study was conducted to identify the dimensions of website quality for low cost airline and to investigate the relationship between the website quality and customer e-satisfaction at low cost airline. A total of 381 responses were conveniently collected among local passengers at Low Cost Carrier Terminal, Kuala Lumpur via questionnaire distribution. This study found that the five determinant factors of website quality for AirAsia were Information Content, Navigation, Responsiveness, Personalization, and Security and Privacy. The results of this study revealed that there is a positive relationship between the five dimensions of website quality and customer e-satisfaction, and also information content was the most significant contributor to customer e-satisfaction.

Keywords: website quality, customer e-satisfaction, low cost airline, e-ticketing

Procedia PDF Downloads 422
13863 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia

Authors: Saleh Dabil

Abstract:

This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: (1) the supermarket profile (volume, location, standard and type of the store), (2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), (3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first is ‘the well distributing of the duties and responsibilities between the employees especially for security purposes’. Second is ‘installation of strong security system’ and ‘making well-designed store layout’. Third is ‘giving training for general employees’ and ‘to give periodically security skills training of employees’. There are other suggestions in the study can be looked up in the text.

Keywords: organized crime, retail, theft, loss prevention, store environment

Procedia PDF Downloads 196
13862 Trend and Cuses of Decline in Trifoliate Yam (Dioscorea dumentorum) Production in Enugu State, Nigeria: Implication for Food Security and Biodiversity Conservation

Authors: J. C. Iwuchukwu, K. C. Okwor

Abstract:

In recent time and in the study area, yam farmers are moving into less laborious and more economical crops and very few yam farmers are growing trifoliate yam. In yam markets, little or no bitter yam is displayed or sold. The work was therefore designed to ascertain trend and causes of decline in trifoliate yam production in Enugu state. Three agricultural zones, six blocks, eighteen circles and one hundred and eight trifoliate yam farmers that were purposively selected constituted sample for the study. An interview schedule was used to collect data while percentage, mean score and standard deviation were used for data analysis. Findings of the study revealed that the respondents had no extension contact, Majority (90.7%) sourced information on trifoliate yam from neighbours/friends/relatives and produced mainly for consumption (67.6%) during rainy season (70.4%). Trifoliate yam was produced manually(71.3%) and organically (58.3%) in a mixture of other crops (87%) using indigenous/local varieties (73.1%). Mean size of land allocated to trifoliate yam production was relatively steady, mean cost of input and income were increasing while output was decreasing within the years under consideration (before 2001 to 2014). Poor/lack of finance(M=1.8) and drudgery associated with trifoliate yam product(M=1.72) were some of the causes of decline in trifoliate yam production in the area. The study recommended that more research and public enlightenment campaigns on the importance of trifoliate yam should be carried out to encourage and consolidate farmers and the masses effort in production and consumption of the crop so that it will not go extinct and then contribute to food security.

Keywords: causes, decline, trend, trifoliate yam

Procedia PDF Downloads 403
13861 Attitude and Knowledge of Primary Health Care Physicians and Local Inhabitants about Leishmaniasis and Sandfly in West Alexandria, Egypt

Authors: Randa M. Ali, Naguiba F. Loutfy, Osama M. Awad

Abstract:

Background: Leishmaniasis is a worldwide disease, affecting 88 countries, it is estimated that about 350 million people are at risk of leishmaniasis. Overall prevalence is 12 million people with annual mortality of about 60,000. Annual incidence is 1,500,000 cases of cutaneous leishmaniasis (CL) worldwide and half million cases of visceral Leishmaniasis (VL). Objectives: The objective of this study was to assess primary health care physicians knowledge (PHP) and attitude about leishmaniasis and to assess awareness of local inhabitants about the disease and its vector in four areas in west Alexandria, Egypt. Methods: This study was a cross sectional survey that was conducted in four PHC units in west Alexandria. All physicians currently working in these units during the study period were invited to participate in the study, only 20 PHP completed the questionnaire. 60 local inhabitant were selected randomly from the four areas of the study, 15 from each area; Data was collected through two different specially designed questionnaires. Results: 11(55%) percent of the physicians had satisfactory knowledge, they answered more than 9 (60%) questions out of a total 14 questions about leishmaniasis and sandfly. The second part of the questionnaire is concerned with attitude of the primary health care physicians about leishmaniasis, 17 (85%) had good attitude and 3 (15%) had poor attitude. The second questionnaire showed that the awareness of local inhabitants about leishmaniasis and sandly as a vector of the disease is poor and needs to be corrected. Most of the respondents (90%) had not heard about leishmaniasis, Only 3 (5%) of the interviewed inhabitants said they know sandfly and its role in transmission of leishmaniasis. Conclusions: knowledge and attitudes of physicians are acceptable. However, there is, room for improvement and could be done through formal training courses and distribution of guidelines. In addition to raising the awareness of primary health care physicians about the importance of early detection and notification of cases of lesihmaniasis. Moreover, health education for raising awareness of the public regarding the vector and the disease is necessary because related studies have demonstrated that if the inhabitants do not perceive mosquitoes to be responsible for diseases such as malaria they do not take enough measures to protect themselves against the vector.

Keywords: leishmaniasis, PHP, knowledge, attitude, local inhabitants

Procedia PDF Downloads 449
13860 Foresight in Food Supply System in Bogota

Authors: Suarez-Puello Alejandro, Baquero-Ruiz Andrés F, Suarez-Puello Rodrigo

Abstract:

This paper discusses the results of a foresight exercise which analyzes Bogota’s fruit, vegetable and tuber supply chain strategy- described at the Food Supply and Security Master Plan (FSSMP)-to provide the inhabitants of Bogotá, Colombia, with basic food products at a fair price. The methodology consisted of using quantitative and qualitative foresight tools such as system dynamics and variable selection methods to better represent interactions among stakeholders and obtain more integral results that could shed light on this complex situation. At first, the Master Plan is an input to establish the objectives and scope of the exercise. Then, stakeholders and their relationships are identified. Later, system dynamics is used to model product, information and money flow along the fruit, vegetable and tuber supply chain. Two scenarios are presented, discussing actions by the public sector and the reactions that could be expected from the whole food supply system. Finally, these impacts are compared to the Food Supply and Security Master Plan’s objectives suggesting recommendations that could improve its execution. This foresight exercise performed at a governmental level is intended to promote the widen the use of foresight as an anticipatory, decision-making tool that offers solutions to complex problems.

Keywords: decision making, foresight, public policies, supply chain, system dynamics

Procedia PDF Downloads 439
13859 Buddhism and Innovative Sustainable Development

Authors: Sraman Sree Mattananda

Abstract:

This present article is an analytical research on ‘Buddhism and Innovative Sustainable Development.' The main purpose of researching is to the better understanding of many social science theories both in politics and in economics. And the understanding of both Buddhism and science is complementary in order to enable any individual to live a full and meaningful human life. How people can avoid conflict, socially, economically, politically and spiritually using Buddhist teachings for a sustainable development. The aim of studying is also to comprehend every human to be aware that peoples’ happiness and sorrow depends on the choices that they had taken to do what was perceptional right and wrong. Everything that happens does have a reason. This study will be supported by the supply of environmental knowledge, philosophy, and experience. Within the domestic and international cultures, this knowledge might provide a significant basis for the contemporary and the future world. Happiness and unsatisfactoriness of mind depend on the consequences of what we had already done. This is to give deep sense to adjust the nature of all that exists and desire not to attach to them and to liberate oneself leaving the reality as it is. An implicit of references will be drawn from the primary sources, secondary sources, internet sources, and other Scholar’s diamond writings, to prove the investigation of philosophical and theoretical analysis. After the investigation of philosophical and theoretical analysis, the article will demonstrate about, what Buddha advised the follows to stop over-exploitation and how to eradicate conflicts to gain a peaceful society. This will be a lively awareness in the approach to the understanding of the Buddhist view of reality and adopt with middle path. The last part of the article will concern with the Buddhist Challenge of sustaining the society and how Buddhist contemporary scholars interpret sustainable development issues. Mahatma Gandhi’s emphasize to use Buddhist Non-Violence will be demonstrating to gain peace, freedom, and security. Twelve things that concern us when we want to explore the issues of sustainability, demonstrated by A Little Book of Hope will be cleared. How individual hearts can implicate to the contemporary globe will be demonstrated to obtain healthy and practical environment. Finally, generating new awareness and care by minimizing the negative impact on earth resources will reduce the degradation of the planet which would pose a challenge to sustain Development.

Keywords: Buddhism, economic, sustainable development, Buddhist ethics

Procedia PDF Downloads 217
13858 Untapped Market of Islamic Pension Fund: Muslim Attitude and Expectation

Authors: Yunice Karina Tumewang

Abstract:

As we have seen, the number of Muslim and their awareness toward financial products and services that conform to Islamic principles are growing rapidly today. Thus, it makes the market environment potentially beneficial for Shari-compliant funds with the expanding prospective client base. However, over the last decade, only small portion of this huge potential market has been covered by the established Islamic asset management firms. This study aims to examine the factors of this untapped market particularly in the demand side. This study will use the qualitative method with primary data through a questionnaire distributed to 500 samples of Muslim population. It will shed light on Muslim attitudes and expectations toward Sharia-compliant retirement planning and pensions. It will also help to raise the awareness of market players to see Islamic pension fund as a promising industry in the foreseeable future.

Keywords: Islamic marketing, Islamic finance, Islamic asset management, Islamic pension fund

Procedia PDF Downloads 338
13857 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 398
13856 Assessment and Evaluation Resilience of Urban Neighborhoods in Coping with Natural Disasters in in the Metropolis of Tabriz (Case Study: Region 6 of Tabriz)

Authors: Ali panahi-Kosar Khosravi

Abstract:

Earthquake resilience is one of the most important theoretical and practical concepts in crisis management. Over the past few decades, the rapid growth of urban areas and developing lower urban areas (especially in developing countries) have made them more vulnerable to human and natural crises. Therefore, the resilience of urban communities, especially low-income and unhealthy neighborhoods, is of particular importance. The present study seeks to assess and evaluate the resilience of neighborhoods in the center of district 6 of Tabriz in terms of awareness, knowledge and personal skills, social and psychological capital, managerial-institutional, and the ability to return to appropriate and sustainable conditions. The research method in this research is descriptive-analytical. The authors used library and survey methods to collect information and a questionnaire to assess resilience. The statistical population of this study is the total households living in the four neighborhoods of Shanb Ghazan, Khatib, Gharamalek, and Abuzar alley. Three hundred eighty-four families from four neighborhoods were selected based on the Cochran formula using a simple random sampling method. A one-sample t-test, simple linear regression, and structural equations were used to test the research hypotheses. Findings showed that only two social and psychological awareness and capital indicators in district 6 of Tabriz had a favorable and approved status. Therefore, considering the multidimensional concept of resilience, district 6 of Tabriz is in an unfavorable resilience situation. Also, the findings based on the analysis of variance indicated no significant difference between the neighborhoods of district 6 in terms of resilience, and most neighborhoods are in an unfavorable situation.

Keywords: resilience, statistical analysis, earthquake, district 6 of tabriz

Procedia PDF Downloads 78
13855 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 295
13854 Evaluating Global ‘Thing’ Security of Consumer Products

Authors: Achutha Raman

Abstract:

Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable.

Keywords: cybersecurity, FOTA, Internet of Things, transnational privacy

Procedia PDF Downloads 218
13853 Threat of Islamic State of Khorasan in Pakistan and Afghanistan Region: Impact on Regional Security

Authors: Irfan U. Din

Abstract:

The growing presence and operational capacity of Islamic State aka Daesh, which emerged in Pak-Afghan region in 2015, poses a serious threat to the already fragile state of the security situation in the region. This paper will shed light on the current state of IS-K network in the Pak-Afghan region and will explain how its presence and operational capacity in the northern and central Afghanistan has increased despite intensive military operations against the group in Nangarhar province – the stronghold of IS-K. It will also explore the role of Pakistani Taliban in the emergence and expansion of IS-K in the region and will unveil the security implication of growing nexus of IS-K and transnational organized groups for the region in Post NATO withdrawal scenario. The study will be qualitative and will rely on secondary and primary data to explore the topic. For secondary data existing literature on the topic will be extensively reviewed while for primary data in-depth interviews will be conducted with subject experts, Taliban commanders, and field researchers.

Keywords: Islamic State of Khorasan (IS-K), North Atlantic Treaty Organization (NATO), Pak-Afghan Region, Transnational Organized Crime (TNOC)

Procedia PDF Downloads 290
13852 Wildfire Risk and Biodiversity Management: Understanding Perceptions and Preparedness

Authors: Emily Moskwa, Delene Weber, Jacob Arnold, Guy M. Robinson, Douglas K. Bardsley

Abstract:

Management strategies to reduce the risks to human life and property from wildfire are key contemporary concerns, with a growing literature exploring these issues from a social research perspective. Efforts range from narrowly focused examinations, such as comparing the level of community support for vegetation clearance with that of controlled burning, to broader considerations of what constitutes effective fire management policy and education campaigns. However, little analysis is available that integrates the social component of risk mitigation and the influence of educational materials with the biodiversity conservation strategies so often needed in fire-prone ecosystems found on the periphery of urban areas. Indeed many communities living on the fringe of Australian cities face major issues relating to an increased risk of wildfire events and a decline in local biodiversity. Inadequate policy and planning, and a lack of awareness or information, exacerbate this risk. This has brought forward an emerging governance challenge that requires the mitigation of wildfire risk while simultaneously supporting improved conservation practices in these urban-fringe areas. Focusing on the perceptions and experiences of residents of the Lower Eyre Peninsula in South Australia, this study analyses data collected from a series of semi-structured interviews with landholders (n=20) living in rural and urban-fringe areas surrounding the city of Port Lincoln, a city with a growing population and one that has faced a number of very large fires in recent years. In South Australia, new policies have assigned increased responsibility on individual landholders to manage their land and prepare themselves for a wildfire event, potentially to the detriment of the surrounding native vegetation. Our findings indicate the value of gaining a more nuanced understanding of the perceptions and behaviours of landholders living in areas of high fire risk, who often choose to live there in order to be close to the natural environment. Many interviewees demonstrated a high awareness of wildfire risk as a result of their past experience with fire, and the majority considered themselves to be well-prepared in the event of a future fire. Community interactions and educational programs were found to be effective in raising awareness of risk; however, negative trust relationships with government authorities and low exposure to information concerning biodiversity resulted in an overall misunderstanding of the relationship between risk mitigation and biodiversity protection. The study offers insights into how catastrophic fires are reframing perceptions of what constitutes effective vegetation management. It provides recommendations to assist with the development of education strategies that concurrently address wildfire management and biodiversity conservation, and contribute towards environmentally-informed and risk conscious governance.

Keywords: biodiversity conservation, risk, peri-urban planning, wildfire management

Procedia PDF Downloads 250
13851 The Role of Online Videos in Undergraduate Casual-Leisure Information Behaviors

Authors: Nei-Ching Yeh

Abstract:

This study describes undergraduate casual-leisure information behaviors relevant to online videos. Diaries and in-depth interviews were used to collect data. Twenty-four undergraduates participated in this study (9 men, 15 women; all were aged 18–22 years). This study presents a model of casual-leisure information behaviors and contributes new insights into user experience in casual-leisure settings, such as online video programs, with implications for other information domains.

Keywords: casual-leisure information behaviors, information behavior, online videos, role

Procedia PDF Downloads 309
13850 Counter-Terrorism and Civil Society in Nigeria

Authors: Emeka Thaddues Njoku

Abstract:

Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.

Keywords: counter-terrorism, civil society organizations, freedom, terrorism

Procedia PDF Downloads 391
13849 The Metacognition Levels of Students: A Research School of Physical Education and Sports at Anadolu University

Authors: Dilek Yalız Solmaz

Abstract:

Meta-cognition is an important factor for educating conscious individuals who are aware of their cognitive processes. With this respect, the purposes of this article is to find out the perceived metacognition level of Physical Education and Sports School students at Anadolu University and to identify whether metacognition levels display significant differences in terms of various variables. 416 Anadolu University Physical Education and Sports School students were formed the research universe. "The Meta-Cognitions Questionnaire (MCQ-30)" developed by Cartwright-Hatton and Wells and later developed the 30-item short form (MCQ-30) was used. The MCQ-30 which was adapted into Turkish by Tosun and Irak is a four-point agreement scale. In the data analysis, arithmethic mean, standard deviation, t-test and ANOVA were used. There is no statistical difference between mean scores of uncontrollableness and danger, cognitive awareness, cognitive confidence and the positive beliefs of girls and boys students. There is a statistical difference between mean scores of the need to control thinking. There is no statistical difference according to departments of students between mean scores of uncontrollableness and danger, cognitive awareness, cognitive confidence, need to control thinking and the positive beliefs. There is no statistical difference according to grade level of students between mean scores of the positive beliefs, cognitive confidence and need to control thinking. There is a statistical difference between mean scores of uncontrollableness and danger and cognitive awareness.

Keywords: meta cognition, physical education, sports school students, thinking

Procedia PDF Downloads 383
13848 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 89
13847 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 280
13846 Interoperable Design Coordination Method for Sharing Communication Information Using Building Information Model Collaboration Format

Authors: Jin Gang Lee, Hyun-Soo Lee, Moonseo Park

Abstract:

The utilization of BIM and IFC allows project participants to collaborate across different areas by consistently sharing interoperable product information represented in a model. Comments or markups generated during the coordination process can be categorized as communication information, which can be shared in less standardized manner. It can be difficult to manage and reuse such information compared to the product information in a model. The present study proposes an interoperable coordination method using BCF (the BIM Collaboration Format) for managing and sharing the communication information during BIM based coordination process. A management function for coordination in the BIM collaboration system is developed to assess its ability to share the communication information in BIM collaboration projects. This approach systematically links communication information during the coordination process to the building model and serves as a type of storage system for retrieving knowledge created during BIM collaboration projects.

Keywords: design coordination, building information model, BIM collaboration format, industry foundation classes

Procedia PDF Downloads 434
13845 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 299
13844 Climate Change and Food Security: The Legal Aspects with Special Focus on the European Union

Authors: M. Adamczak-Retecka, O. Hołub-Śniadach

Abstract:

Dangerous of climate change is now global problem and as such has a strategic priority also for the European Union. Europe and European citizens try to do their best to cut greenhouse gas emissions, moreover they substantially encourage other nations and regions to follow the same way. The European Commission and a number of Member States have developed adaptation strategies in order to help strengthen EU's resilience to the inevitable impacts of climate change. The EU has long been a driving force in international negotiations on climate change and was instrumental in the development of the UN Framework Convention on Climate Change. As the world's leading donor of development aid, the EU also provides substantial funding to help developing countries tackle climate change problem. Global warming influences human health, biodiversity, ecosystems but also many social and economic sectors. The aim of this paper is to focus on impact of claimant change on for food security. Food security challenges are directly related to globalization, climate change. It means that current and future food policy is exposed to all cross-cutting and that must be linked with environmental and climate targets, which supposed to be achieved. In the 7th EAP —The new general Union Environment Action Program to 2020, called “Living well, within the limits of our planet” EU has agreed to step up its efforts to protect natural capital, stimulate resource efficient, low carbon growth and innovation, and safeguard people’s health and wellbeing– while respecting the Earth’s natural limits.

Keywords: climate change, food security, sustainable food consumption, climate governance

Procedia PDF Downloads 180
13843 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law

Procedia PDF Downloads 125
13842 Understanding the Selectional Preferences of the Twitter Mentions Network

Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das

Abstract:

Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.

Keywords: information diffusion, personality and values, social network analysis, twitter mentions network

Procedia PDF Downloads 375
13841 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 485