Search results for: social security
10629 Landmines and the Postcolonial Security Discourse in Zimbabwe
Authors: Fradreck Jockonia Mujuru
Abstract:
The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.Keywords: landmines, postcolonial, repression, security, violence
Procedia PDF Downloads 7610628 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks
Authors: Faisal Al Yahmadi, Muhammad R. Ahmed
Abstract:
Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.Keywords: smart grid network, security, threats, vulnerabilities
Procedia PDF Downloads 13910627 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism
Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe
Abstract:
National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.Keywords: counter-terrorism, discourse, Nigeria, security, terrorism
Procedia PDF Downloads 48610626 Changing Subjective Well-Being and Social Trust in China: 2010-2020
Authors: Mengdie Ruan
Abstract:
The authors investigate how subjective well-being (SWB) and social trust changed in China over the period 2010–2020 by relying on data from six rounds of the China Family Panel Studies (CFPS), then re-examine Easterlin’s hypothesis for China, with a more focus on the role of social trust and estimate income-compensating differentials for social trust. They find that the evolution of well-being is not sensitive to the measures of well-being one uses. Specifically, self-reported life satisfaction scores and hedonic happiness scores experienced a significant increase across all income groups from 2010 to 2020. Social trust seems to have increased based on CFPS in China for all socioeconomic classes in recent years, and male, urban resident individuals with higher income have a higher social trust at a given point in time and over time. However, when we use an alternative measure of social trust, out-group trust, which is a more valid measure of generalized trust and represents “most people”, social trust in China literally declines, and the level is extremely low. In addition, this paper also suggests that in the typical query on social trust, the term "most people" mostly denotes in-groups in China, which contrasts sharply with most Western countries where it predominantly connotes out-groups. Individual fixed effects analysis of well-being that controls for time-invariant variables reveals social trust and relative social status are important correlates of life satisfaction and happiness, whereas absolute income plays a limited role in boosting an individual’s well-being. The income-equivalent value for social capital is approximately tripling of income. It has been found that women, urban and coastal residents, and people with higher income, young people, those with high education care more about social trust in China, irrespective of measures on SWB. Policy aiming at preserving and enhancing SWB should focus on social capital besides economic growth.Keywords: subjective well-being, life satisfaction, happiness, social trust, China
Procedia PDF Downloads 7710625 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia
Authors: Clara Voyvodic
Abstract:
Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences
Procedia PDF Downloads 13210624 Signals Affecting Crowdfunding Success for Australian Social Enterprises
Authors: Mai Yen Nhi Doan, Viet Le, Chamindika Weerakoon
Abstract:
Social enterprises have emerged as sustainable organisations that deliver social achievement along with long-term financial advancement. However, recorded financial barriers have urged social enterprises to divert to other financing methods due to the misaligned ideology with traditional financing capitalists, in which crowdfunding can be a promising alternative. Previous studies in crowdfunding have inadequately addressed crowdfunding for social enterprises, with conflicting results due to the unsuitable analysis of signals in isolation rather than in combinations, using the data from platforms that do not support social enterprises. Extending the signalling theory, this study suggests that crowdfunding success results from the collaboration between costly and costless signals. The proposed conceptual framework enlightens the interaction between costly signals as “organisational information”, “social entrepreneur’s credibility,” and “third-party endorsement” and costless signals as various sub-signals under the “campaign preparedness” signal to achieve crowdfunding success. Using Qualitative Comparative Analysis, this study examined 45 crowdfunding campaigns run by Australian social enterprises on StartSomeGood and Chuffed. The analysis found that different combinations of costly and costless signals can lead to crowdfunding success, allowing social enterprises to adopt suitable combinations of signals to their context. Costless signal – campaign preparedness is fundamental for success, though different costless sub-signals under campaign preparedness can interact with different costly signals for the desired outcome. Third-party endorsement signal was found to be the necessary signal for crowdfunding success for Australian social enterprises.Keywords: crowdfunding, qualitative comparative analysis (QCA), signalling theory, social enterprises
Procedia PDF Downloads 10310623 Social Distancing as a Population Game in Networked Social Environments
Authors: Zhijun Wu
Abstract:
While social living is considered to be an indispensable part of human life in today's ever-connected world, social distancing has recently received much public attention on its importance since the outbreak of the coronavirus pandemic. In fact, social distancing has long been practiced in nature among solitary species and has been taken by humans as an effective way of stopping or slowing down the spread of infectious diseases. A social distancing problem is considered for how a population, when in the world with a network of social sites, decides to visit or stay at some sites while avoiding or closing down some others so that the social contacts across the network can be minimized. The problem is modeled as a population game, where every individual tries to find some network sites to visit or stay so that he/she can minimize all his/her social contacts. In the end, an optimal strategy can be found for everyone when the game reaches an equilibrium. The paper shows that a large class of equilibrium strategies can be obtained by selecting a set of social sites that forms a so-called maximal r-regular subnetwork. The latter includes many well-studied network types, which are easy to identify or construct and can be completely disconnected (with r = 0) for the most-strict isolation or allow certain degrees of connectivity (with r > 0) for more flexible distancing. The equilibrium conditions of these strategies are derived. Their rigidity and flexibility are analyzed on different types of r-regular subnetworks. It is proved that the strategies supported by maximal 0-regular subnetworks are strictly rigid, while those by general maximal r-regular subnetworks with r > 0 are flexible, though some can be weakly rigid. The proposed model can also be extended to weighted networks when different contact values are assigned to different network sites.Keywords: social distancing, mitigation of spread of epidemics, populations games, networked social environments
Procedia PDF Downloads 13310622 Dimensions of Public Spaces: Feelings through Human Senses
Authors: Piyush Hajela
Abstract:
The significance of public spaces is on a rise in Indian cities as a strong interaction space across cultures and community. It is a pertinent gathering space for people across age and gender, where the face keeps changing with time. A public space is directly related to the social dimension, people, comfort, safety, and security, that, it proposes to provide, as inherent qualities. The presence of these and other dimensions of space, together with related equitable environments, impart certain quality to a public space. The higher the optimum contents of these dimensions, the better the quality of public space. Public is represented by PEOPLE through society and community, and space is created by dimensions. Society contains children, women and the elderly, community is composed of social, and religious groups. These behave differently in a different setting and call for varied quality of spaces, created and generated. Public spaces are spread across a city and have more or less established their existence and prominence in a social set up. While few of them are created others are discovered by the people themselves in their constant search for desirable interactive public spaces. These are the most sought after gathering spaces that have the quality of promoting social interaction, providing free accessibility, provide desirable scale etc. The emergence of public space dates back to the times when people started forming communities, display cultures and traditions publicly, gathered for religious observations and celebrations, and address the society. Traditional cities and societies in India were feudal and orthodox in their nature and yet had public spaces. When the gathering of people at one point in a city became more frequent the point became more accessible and occupied. Baras (large courts, Chowks (public squares) and Maidans (large grounds) became well-known gathering spaces in the towns and cities. As the population grew such points grew in number, each becoming a public space in itself and with a different and definite social character. The author aims at studying the various dimensions of public spaces with which a public space has power to hold people for a significant period of time. The human senses here are note referred to as taste, sight, hearing, touch or smell, but how human senses collectively respond to when stationed in a given public space. The collectives may reflect in dimensions like comfort, safety, environment, freedom etc. Various levels of similar other responses would be studied through interviews, observations and other scientific methods for both qualitative and quantitative analysis.Keywords: society, interaction, people, accessibility, comfort, enclosure
Procedia PDF Downloads 45710621 Entrepreneur Competencies: An Exploratory Study Applied to Educational Social Enterprise in South East Asia
Authors: D. Songpol, K. Taweesak, T. Sookyuen
Abstract:
A social enterprise is an organization that operates commercial business as a source of income with the aim of addressing social and environmental issues. Though it is clear that this kind of organization will benefit society and environment but in practice, it is found that most of social enterprises’ goals cannot be achieved. The most success factors of social enterprises usually rely on individual characteristics of entrepreneurs, especially in educational business. This study aims to find out the magnitude of influence from the components of entrepreneur competencies to social enterprises in education. There are developmental models of research demonstrating that knowledge, skills and attributes affect the success of social enterprises in term of sustainability, social opportunities and innovation leadership. The 5-scale questionnaire was used to collect data from the social entrepreneurs in education who operates in the South East Asian region of 135 samples and then processed by the methods of structural equation models. The results show that the competency of entrepreneurs in attributes has the greatest impact on the success of social enterprises while the skills and knowledge have respectively impact on the social enterprises’ success as well. The reason why attributes of entrepreneurs have the greatest impact on social enterprise success is because, social enterprise is an organization that does not motivate or provide attractive financial incentives to the entrepreneur. Entrepreneurs, who succeed in developing their organizations, therefore need attribute factor higher than normal entrepreneurs, especially those in education sector that have somewhat few human resources to operate their businesses. More importantly, attribute’s traits such as entrepreneurial passion, self-efficacy, entrepreneurial identity and, innovativeness and perseverance will significantly affect the ideology and tolerance of the entrepreneurs once facing the problem in doing business. In conclusion, the education social enterprise would be successful depending on the performance of the entrepreneurs which derives from higher attributes competency.Keywords: education, entrepreneur competencies, social enterprise, South East Asia
Procedia PDF Downloads 15610620 A Type-2 Fuzzy Model for Link Prediction in Social Network
Authors: Mansoureh Naderipour, Susan Bastani, Mohammad Fazel Zarandi
Abstract:
Predicting links that may occur in the future and missing links in social networks is an attractive problem in social network analysis. Granular computing can help us to model the relationships between human-based system and social sciences in this field. In this paper, we present a model based on granular computing approach and Type-2 fuzzy logic to predict links regarding nodes’ activity and the relationship between two nodes. Our model is tested on collaboration networks. It is found that the accuracy of prediction is significantly higher than the Type-1 fuzzy and crisp approach.Keywords: social network, link prediction, granular computing, type-2 fuzzy sets
Procedia PDF Downloads 32610619 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos
Abstract:
Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system
Procedia PDF Downloads 18310618 The International Field Placement: Experience in Vietnam Social Work International Placement Programme
Authors: Ngo Thi Thanh Mai, Nguyen Thu Ha, Frances Crawford
Abstract:
The demand for developing international social work field education is on the rise. Global foreign universities have considered international collaboration and cross-cultural perspective as an essential part of their social work training curriculum. International placement program at Faculty of Social Work (FSW), Hanoi National University of Education (HNUE) has met the need of international social work students, as well as the institutions involved in achieving social work professional social work knowledge in the Vietnamese context. This program has also lead to a long-term collaboration between HNUE and several global institutions in developing social work education, research and practice skill. This paper focuses on the benefits and challenges of students who involved in the global placement programme at Faculty of Social Work (FSW), Hanoi National University of Education (HNUE) and content of international field education provided to the international students based on the experience of the authors. Study results indicated that the participants have opportunity them to explore a new culture and social work system abroad especially in the Vietnamese context. However, there are still difficulties that international students have to face during different phases of the exchange process such as language and communication barriers, cultural value differences, insufficient support and supervision during placement. Basing on these results, the authors intend to propose some recommendations to enhance the programme activities such as pre-departure orientation, support and supervision during placement, cultural exchange and follow-up activities.Keywords: social work education, social work, international placement, field placement, Vietnam
Procedia PDF Downloads 14510617 The Role of Community Participation in the Socialization of the Child within the Saudi Family in Riyadh City
Authors: Ohoud Abdullatif Alshaiji
Abstract:
Child-rearing is considered as the most important family role and with the modern lifestyle and busy families social institutions has taken this role from the family to encourage the individuals active's role in the social life, this study aimed to acknowledge the contributions of the social institutions in child-rearing the Saudi children and to acknowledge The Role of the community's partnership in activating the social child-rearing for the Saudi children. The research main question was how much the community's partnership is actually participating in activating the process of the social development of the Saudi children. The importance of this study comes from the massive care that has been given from all over the world, children international organizations, and this research is focusing on the participating of five social organization in child-rearing the Saudi children. The study was limited on the mothers of the children who are enrolled in the government's kindergarten the tool that has been used was the Questionnaire, using the descriptive and analytical approach. The important role of the family in encouraging the social development for the Saudi child, and the results has shown the importance of the mosque in encouraging the good social behaviors. And the kindergarten role has shown after the mosque because of the changes that made most of the families relying on the educational institutions to help the child to adapt in a different cultures. To spread the community's partnership in all the social actions, to support and encourage the role of community's partnership in activating the process of the social development of the Saudi children, to minimize the difficulties and the provide the need to fully support the community's partnership.Keywords: child-rearing, social development, acknowledge the contributions
Procedia PDF Downloads 34510616 Visible Expression of Social Identity: The Clothing and Fashion
Authors: Nihan Akdemir
Abstract:
Clothes are more than a piece of fabric, and the most visible material item of the fashion symbol is the garment, which carries multiple and various meanings. The dynamism of the clothing symbol can carry open or closed codes depending on culture, gender, and social location. And each one can be the expression of social identity over ethnicity, religious beliefs, age, education and social class. Through observation of clothing styles over these items, the assumptions could be made about a person’s identity. A distinctive and typical style, form or character of the clothing such as ‘zoot suits’, ‘ao dai’, removes the garment from functional and ordinary element to the symbolic area. Clothing is an 'identification' tool that functions in determining the symbolic boundaries between people in a sense. And this paper includes the investigation of the relation between social identity and clothing and also fashion. And this relationship has been taken into consideration over the visual expression because even during the ancient times, the clothes were the basic and simple way of representing the identity and social classes. The visible expression of identity over clothing from Ancient Egypt to today’s clothing and fashion has been researched in this article. And all these items have been explained with visual images and supported by the literature investigations. Then the results have shown that every piece of clothing from fabric to coloring have visual significations about social identity.Keywords: social identity, clothing, fashion, visual expression, visual signification
Procedia PDF Downloads 61810615 Economic Important of Manta Ray Watching Tourism in Dampier Strait, Raja Ampat, West Papua, Indonesia
Authors: Maulita Sari Hani, Abraham B. Sianipar, Jamaluddin Jompa, Natsir Nessa, Alan T. White
Abstract:
Manta ray is an icon for tourism in Raja Ampat. The tourist volume has been increased for the past ten years which up to approximately 23,000 tourists in 2017. Since 2013, Conservation International Indonesia deployed satellite and acoustic tags on manta ray in Dampier strait to track the species and identify the aggregation areas. These findings encourage the government and the local community to boost conservation through the management of marine protected areas for tourism purposes. Community in Dampier strait including the village of Arborek, Kurkapa, Kapisawar, and Sawingray involved in variety of small scale tourism business including homestay, dive shop, tour operator, and crafts. Working groups of related local businesses were established to support the local community and to ensure the sustainability of the economic viability and environmental sustainability. In order to analyze the economic benefits of manta ray tourism, this study was conducted to identify the number of local business in Dampier Strait and the economic impacts in terms of local finance security, social, humanity, individual, and physical assets. The results of this study identify 30 homestays, 2 dive shops, 10 tour operators, 30 women involved in crafts, and about 50 villagers worked for dive resorts. In addition to community assets, we confirmed the welfare of community has been improved in terms of food security, households, education for children, savings, and health insurance.Keywords: marine wildlife tourism, elasmobranch, conservation, ecotourism, co-management, economic viability, environmental sustainability
Procedia PDF Downloads 21710614 Investigating Problems and Social Support for Mothers of Poor Households
Authors: Niken Hartati
Abstract:
This study provides a description of the problem and sources of social support that given to 90 mothers from poor households. Data were collected using structured interviews with the three main questions: 1) what kind of problem in mothers daily life, 2) to whom mothers ask for help to overcome it and 3) the form of the assistances that provided. Furthermore, the data were analyzed using content analysis techniques were then coded and categorized. The results of the study illustrate the problems experienced by mothers of poor households in the form of: subsistence (37%), child care (27%), management of money and time (20%), housework (5%), bad place of living (5%), the main breadwinner (3%), and extra costs (3%). While the sources of social support that obtained by mothers were; neighbors (10%), extended family (8%), children (8%), husband (7%), parents (7%), and siblings (5%). Unfortunately, more mothers who admitted not getting any social support when having problems (55%). The form of social support that given to mother from poor household were: instrumental support (91%), emotional support (5%) and informational support (2%). Implications for further intervention also discussed in this study.Keywords: household problems, social support, mothers, poor households
Procedia PDF Downloads 36610613 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security
Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama
Abstract:
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach
Procedia PDF Downloads 29210612 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing
Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi
Abstract:
This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning
Procedia PDF Downloads 3310611 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking
Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye
Abstract:
The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.Keywords: algorithm, cryptography, cryptosystem, network
Procedia PDF Downloads 34910610 Rural Farmers-Herdsmen Conflicts, State Mediation Failure and Prospects of Traditional Institutions’ Intervention in Southwest Nigeria
Authors: Grace Adebo
Abstract:
Rural Farmers-herdsmen conflicts have resulted in a large number of causalities in many parts of Nigeria. Herds of cattle have died, while farmers recorded inestimable losses of their crops and harvests. The overall consequences have impacted negatively on food security across the country. There are divided opinions by scholars, agricultural experts and conflict analysts on the root causes of the conflicts and why traditional institutional interventions are ineffective in resolving the crisis. The study, therefore, aims to investigate the fundamentality of the conflicts’ causes in Southwest Nigeria and the correlates between traditional institutional authorities’ intervention and farmers-herdsmen conflicts in Southwest Nigeria. A structured interview schedule and focus group discussion were employed to elicit information from 180 farmers and 48 herdsmen selected through a multistage sampling procedure from the conflict zones in Southwest Nigeria. Collected data were analyzed using frequency counts, percentages, means and the Relative Importance Index (RII). The study found that climate change effects, farmland encroachment, crop damage, theft, and competition for land and water resources and pollution were the root causes of the violent herders-rural farmer’s clashes. The quest for wealth acquisition by some traditional rulers and some notable individuals in the conflict neighborhoods, occasioned tribal-mix herds possession and, thus undermining local institutional interventions and perverting justice through weak conflict resolution strategies, therefore, fueling further conflicts. Most farmers in the conflict zones have abandoned their farms for fear of death. This coupled with physical, social, economic and psychological consequences have deepened food insecurity and impaired the economic conditions of the herdsmen and the farmers. Currently, there are no mutually established mediation mechanisms as most states are opposed to the enactment of grazing laws to protect territorial encroachments of lands and subsequent multiplication of the herdsmen. It is suggested that government and Non-Governmental Organisation (NGOs) should encourage a functional stakeholder's forum for sustainable conflict resolution and establish a compensation scheme for losses incurred while extension agents are equipped with knowledge on conflict management strategies for peace attainment with the envisioned goal of achieving sustainable livelihoods and food security in Southwest Nigeria.Keywords: conflict resolution, food security, herdsmen-farmers conflict, sustainable livelihoods, traditional institutions
Procedia PDF Downloads 11310609 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management
Authors: Gaurav Kumar Sinha
Abstract:
The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.
Procedia PDF Downloads 3710608 Investigation of Various Variabilities of Social Anxiety Levels of Physical Education and Sports School Students
Authors: Turan Cetinkaya
Abstract:
The aim of this study is to determine the relation of the level of social anxiety to various variables of the students in physical education and sports departments. 229 students who are studying at the departments of physical education and sports teaching, sports management and coaching in Ahi Evran University, College of Physical Education and Sports participate in the research. Personal information tool and social anxiety scale consisting 30 items were used as data collection tool in the research. Distribution, frequency, t-test and ANOVA test were used in the comparison of the related data. As a result of statistical analysis, social anxiety levels do not differ according to gender, income level, sports type and national player status.Keywords: social anxiety, undergraduates, sport, unıversty
Procedia PDF Downloads 42910607 An Acerbate Psychotics Symptoms, Social Support, Stressful Life Events, Medication Use Self-Efficacy Impact on Social Dysfunction: A Cross Sectional Self-Rated Study of Persons with Schizophrenia Patient and Misusing Methamphetamines
Authors: Ek-Uma Imkome, Jintana Yunibhand, Waraporn Chaiyawat
Abstract:
Background: Persons with schizophrenia patient and misusing methamphetamines suffering from social dysfunction that impact on their quality of life. Knowledge of factors related to social dysfunction will guide the effective intervention. Objectives: To determine the direct effect, indirect effect and total effect of an acerbate Psychotics’ Symptoms, Social Support, Stressful life events, Medication use self-efficacy impact on social dysfunction in Thai schizophrenic patient and methamphetamine misuse. Methods: Data were collected from schizophrenic and methamphetamine misuse patient by self report. A linear structural relationship was used to test the hypothesized path model. Results: The hypothesized model was found to fit the empirical data and explained 54% of the variance of the psychotic symptoms (X2 = 114.35, df = 92, p-value = 0.05, X2 /df = 1.24, GFI = 0.96, AGFI = 0.92, CFI = 1.00, NFI = 0.99, NNFI = 0.99, RMSEA = 0.02). The highest total effect on social dysfunction was psychotic symptoms (0.67, p<0.05). Medication use self-efficacy had a direct effect on psychotic symptoms (-0.25, p<0.01), and social support had direct effect on medication use self efficacy (0.36, p <0.01). Conclusions: Psychotic symptoms and stressful life events were the significance factors that influenced direct on social dysfunctioning. Therefore, interventions that are designed to manage these factors are crucial in order to enhance social functioning in this population.Keywords: psychotic symptoms, methamphetamine, schizophrenia, stressful life events, social dysfunction, social support, medication use self efficacy
Procedia PDF Downloads 20810606 Mediating Role of Psychological Capital in Relations Between Social Support and Subjective Wellbeing among Students with Learning Disabilities and Attention Deficit Hyperactivity Disorder
Authors: Ofra Walter Btel Liran Hazan
Abstract:
This study’s goal was to clarify whether psychological capital (PsyCap) mediated the relations between social support and subjective well-being among post-secondary students during the Covid-19 pandemic and to assess whether students diagnosed with a learning disability (LD) and/or attention deficit hyperactivity disorder (ADHD) differed from others in their reliance on social support and their level of PsyCap and subjective wellbeing. Participants were257 students, 152 diagnosed with LD/ADHD and the rest neurotypical. The study used four questionnaires: demographic and academic information; Psychological Capital Questionnaire (PCQ); Subjective Well-Being Index; social support questionnaire. The results indicated PsyCapmediated relations between social support and subjective wellbeing. Students diagnosed with LD/ADHD differed from neurotypicals in their PsyCap and subjective wellbeing levels but not in their social support. In addition, the relations between PsyCap and social support were stronger among students diagnosed with LD/ADHD. PsyCap was an important resource for all participants and was related to social support and subjective wellbeing, making it especially valuable for LD/ADHD students facing new and threatening situations, such as the Covid-19 pandemic.Keywords: LD/ADHD post-secondary students, subjective wellbeing, social support, PsyCap, covid-19
Procedia PDF Downloads 9610605 Relationship between Codependency, Perceived Social Support, and Depression in Mothers of Children with Intellectual Disability
Authors: Sajed Yaghoubnezhad, Mina Karimi, Seyede Marjan Modirkhazeni
Abstract:
The goal of this research was to study the relationship between codependency, perceived social support and depression in mothers of children with intellectual disability (ID). The correlational method was used in this study. The research population is comprised of mothers of educable children with ID in the age range of 25 to 61 years. From among this, a sample of 251 individuals, in the multistage cluster sampling method, was selected from educational districts in Tehran, who responded to the Spann-Fischer Codependency Scale (SFCDS), the Social Support Questionnaire and the Beck Depression Inventory (BDI). The findings of this study indicate that among mothers of children with ID depression has a positive and significant correlation with codependency (P<0.01, r=0.4) and a negative and significant correlation with the total score of social support (P<0.01, r=-0.34). Moreover, the results of stepwise multiple regression analysis showed that codependency is allocated a higher variance than social support in explaining depression (R2=0.023).Keywords: codependency, social support, depression, mothers of children with ID
Procedia PDF Downloads 36810604 Effects of Artificial Intelligence and Machine Learning on Social Media for Health Organizations
Authors: Ricky Leung
Abstract:
Artificial intelligence (AI) and machine learning (ML) have revolutionized the way health organizations approach social media. The sheer volume of data generated through social media can be overwhelming, but AI and ML can help organizations effectively manage this information to improve the health and well-being of individuals and communities. One way AI can be used to enhance social media in health organizations is through sentiment analysis. This involves analyzing the emotions expressed in social media posts to better understand public opinion and respond accordingly. This can help organizations gauge the impact of their campaigns, track the spread of misinformation, and improve communication with the public. While social media is a useful tool, researchers and practitioners have expressed fear that it will be used for the spread of misinformation, which can have serious consequences for public health. Health organizations must work to ensure that AI systems are transparent, trustworthy, and unbiased so they can help minimize the spread of misinformation. In conclusion, AI and ML have the potential to greatly enhance the use of social media in health organizations. These technologies can help organizations effectively manage large amounts of data and understand stakeholders' sentiments. However, it is important to carefully consider the potential consequences and ensure that these systems are carefully designed to minimize the spread of misinformation.Keywords: AI, ML, social media, health organizations
Procedia PDF Downloads 8910603 Family Homicide: A Comparison of Rural and Urban Communities in California
Authors: Bohsiu Wu
Abstract:
This study compares the differences in social dynamics between rural and urban areas in California to explain homicides involving family members. It is hypothesized that rural homicides are better explained by social isolation and lack of intervention resources, whereas urban homicides are attributed to social disadvantage factors. Several critical social dynamics including social isolation, social disadvantages, acculturation, and intervention resources were entered in a hierarchical linear model (HLM) to examine whether county-level factors affect how each specific dynamic performs at the ZIP code level, a proxy measure for communities. Homicide data are from the Supplementary Homicide Report for all 58 counties in California from 1997 to 1999. Predictors at both the county and ZIP code levels are derived from the 2000 US census. Preliminary results from a HLM analysis show that social isolation is a significant but moderate predictor to explain rural family homicide and various social disadvantage factors are significant factors accounting for urban family homicide. Acculturation has little impact. Rurality and urbanity appear to interact with various social dynamics in explaining family homicide. The implications for prevention at both the county and community level as well as directions for future study on the differences between rural and urban locales are explored in the paper.Keywords: communities, family, HLM, homicide, rural, urban
Procedia PDF Downloads 32610602 Studying Growth as a Pursuit of Disseminating Social Impact: A Conceptual Study
Authors: Saila Tykkyläinen
Abstract:
The purpose of this study is to pave the way for more focused accumulation of knowledge on social enterprise growth. The body of research touching upon the phenomenon is somewhat fragmented. In order to make an effort to create a solid common ground, this study draws from the theoretical starting points and guidelines developed within small firm growth research. By analyzing their use in social enterprise growth literature, the study offers insights on whether the proven theories and concepts from small firm context could be more systematically applied when investigating growth of social enterprises. Towards this end, the main findings from social enterprise growth research are classified under the three research streams on growth. One of them focuses on factors of growth, another investigates growth as a process and the third is interested in outcomes of growth. During the analysis, special attention is paid on exploring how social mission of the company and the pursuit of augmenting its social impact are dealt within those lines of research. The next step is to scrutinize and discuss some of the central building blocks of growth research, namely the unit of analysis, conceptualization of a firm and operationalizing growth, in relation to social enterprise studies. It appears that the social enterprise growth literature stresses the significance of 'social' both as a main driver and principle outcome of growth. As for the growth process, this emphasis is manifested by special interest in strategies and models tailored to disseminate social impact beyond organizational limits. Consequently, this study promotes more frequent use of business activity as a unit of analysis in the social enterprise context. Most of the times, it is their products, services or programs with which social enterprises and entrepreneurs aim to create the impact. Thus the focus should be placed on activities rather than on organizations. The study also seeks to contribute back to the small firm growth research. Even though the recommendation to think of business activities as an option for unit of analysis stems from there, it is all too rarely used. Social entrepreneurship makes a good case for testing and developing the approach further.Keywords: conceptual study, growth, scaling, social enterprise
Procedia PDF Downloads 31610601 Incentive-Based Motivation to Network with Coworkers: Strengthening Professional Networks via Online Social Networks
Authors: Jung Lee
Abstract:
The last decade has witnessed more people than ever before using social media and broadening their social circles. Social media users connect not only with their friends but also with professional acquaintances, primarily coworkers, and clients; personal and professional social circles are mixed within the same social media platform. Considering the positive aspect of social media in facilitating communication and mutual understanding between individuals, we infer that social media interactions with co-workers could indeed benefit one’s professional life. However, given privacy issues, sharing all personal details with one’s co-workers is not necessarily the best practice. Should one connect with coworkers via social media? Will social media connections with coworkers eventually benefit one’s long-term career? Will the benefit differ across cultures? To answer, this study examines how social media can contribute to organizational communication by tracing the foundation of user motivation based on social capital theory, leader-member exchange (LMX) theory and expectancy theory of motivation. Although social media was originally designed for personal communication, users have shown intentions to extend social media use for professional communication, especially when the proper incentive is expected. To articulate the user motivation and the mechanism of the incentive expectation scheme, this study applies those three theories and identify six antecedents and three moderators of social media use motivation including social network flaunt, shared interest, perceived social inclusion. It also hypothesizes that the moderating effects of those constructs would significantly differ based on the relationship hierarchy among the workers. To validate, this study conducted a survey of 329 active social media users with acceptable levels of job experiences. The analysis result confirms the specific roles of the three moderators in social media adoption for organizational communication. The present study contributes to the literature by developing a theoretical modeling of ambivalent employee perceptions about establishing social media connections with co-workers. This framework shows not only how both positive and negative expectations of social media connections with co-workers are formed based on expectancy theory of motivation, but also how such expectations lead to behavioral intentions using career success model. It also enhances understanding of how various relationships among employees can be influenced through social media use and such usage can potentially affect both performance and careers. Finally, it shows how cultural factors induced by social media use can influence relations among the coworkers.Keywords: the social network, workplace, social capital, motivation
Procedia PDF Downloads 12310600 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use
Authors: Mayank Mundhra, Chester Rebeiro
Abstract:
Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.Keywords: Ripple, Kelips, unique node list, consensus, information propagation
Procedia PDF Downloads 146