Search results for: case studies of cyberattacks in armed conflicts
21048 Deployment of Armed Soldiers in European Cities as a Source of Insecurity among Czech Population
Authors: Blanka Havlickova
Abstract:
In the last ten years, there are growing numbers of troops with machine guns serving on streets of European cities. We can see them around government buildings, major transport hubs, synagogues, galleries and main tourist landmarks. As the main purpose of armed soldier’s presence in European cities authorities declare the prevention of terrorist attacks and psychological support for tourists and domestic population. The main objective of the following study is to find out whether the deployment of armed soldiers in European cities has a calming and reassuring effect on Czech citizens (if the presence at armed soldiers make the Czech population feel more secure) or rather becomes a stress factor (the presence of soldiers standing guard in full military fatigues recalls serious criminality and terrorist attacks which are reflected in the fears and insecurity of Czech population). The initial hypothesis of this study is connected with the priming theory, the idea that when we are exposed to an image (armed soldier), it makes us unconsciously focus on a topic connected with this image (terrorism). This paper is based on a quantitative public survey, which was carried out in the form of electronic questioning among the citizens of the Czech Republic. Respondents answered 14 questions about two European cities – London and Paris. Besides general questions investigating the respondents' awareness of these cities, some of the questions focused on the fear that the respondents had when picturing themselves leaving next Monday for the given city (London or Paris). The questions asking about respondent´s travel fears and concerns were accompanied by different photos. When answering the question about fear some respondents have been presented with a photo of Westminster Palace and the Eiffel with ordinary citizens while other respondents have been presented with a picture of the Westminster Palace, the and Eiffel's tower not only with ordinary citizens, but also with one soldier holding a machine gun. The main goal of this paper is to analyse and compare data about concerns for these two groups of respondents (presented with different pictures) and find out if and how an armed soldier with a machine gun in front of the Westminster Palace or the Eiffel Tower affects the public's concerns about visiting the site. In other words, the aim of this paper is to confirm or rebut the hypothesis that the look at a soldier with a machine gun in front of the Eiffel Tower or the Westminster Palace automatically triggers the association with a terrorist attack leading to an increase in fear and insecurity among Czech population.Keywords: terrorism, security measures, priming, risk perception
Procedia PDF Downloads 25021047 Qualitative Case Study Research in Accounting: Challenges and Prospects the Libyan Case Study
Authors: Bubaker F. Shareia
Abstract:
Much of the literature on research design has focussed on research conducted in developed, uni-cultural or primarily English speaking countries. Studies of qualitative case study research, the challenges and prospects have been embedded in Western/Euro-centric society and social theories. Although there have been some theoretical studies, few empirical studies have been conducted to explore the nature of the challenges of qualitative case study in developing countries. These challenges include accessibility to organizations, conducting interviews in developing countries, accessing documents and observing official meetings, language and cultural challenges, the use of consent forms, issues affecting access to companies, respondent issues and data analysis. The author, while conducting qualitative case study research in Libya, faced all these issues. The discussion in this paper examines these issues in order to make a contribution toward the literature in this area.Keywords: accounting, challenges, prospects, developing countries, Libya, qualitative case study
Procedia PDF Downloads 30421046 Access to Natural Resources in the Cameroonian Part of the Logone Basin: A Driver and Mitigation Tool to Ethnical Conflicts
Authors: Bonguen Onouck Rolande Carole, Ndongo Barthelemy
Abstract:
The climate change effects on the Lake Chad, coupled with population growth, have pushed large masses of people of various origins towards the lower part of the lower Logonewatershed in search of the benefits of environmental services, causing pressure on the environment and its resources. Economic services are therefore threatened, and the decrease in resources contributes to the deterioration of the social wellbeing resulting to conflicts among/between local communities, immigrants, displaced people, and foreigners. This paper is an information contribution on ethnical conflicts drivers in the area and the provided local management mechanisms such can help mitigate present or future conflicts in similar areas. It also prints out the necessity to alleviate water access deficit and encourage good practices for the population wellbeing. In order to meet the objective, in 2018, through the interface of the World Bank-Cameroon project-PULCI, data were collected on the field directly by discussing with the population and visiting infrastructures, indirectly by a questionnaire survey. Two administrative divisions were chosen (Logoneet Chari, Mayo-Danay) in which targeted localities were Zina, Mazera, Lahai, Andirni near the Waza Park and Yagoua, Tekele, Pouss, respectively. Due to some sociocultural and religious reasons, some information were acquired through the traditional chiefs. A desk study analysis based on resources access and availability conflicts history, and management mechanism was done. As results, roots drivers of ethnical conflicts are struggles over natural resources access, and the possibility of conflicts increases as the scarcity and vulnerabilities persist, creating more sociocultural gaps and tensions. The mitigation mechanisms though fruitful, are limited. There is poor documentation on the topic, the resources management policies of this basin are unsuitable and ineffective for some. Therefore, the restoration of environmental and ecosystems, the mitigation of climate change effects, and food insecurity are the challenges that must be met to alleviate conflicts in these localities.Keywords: ethnic, communities, conflicts, mitigation mechanisms, natural resources, logone basin
Procedia PDF Downloads 10921045 A Study of Lean Principles Implementation in the Libyan Healthcare and Industry Sectors
Authors: Nasser M. Amaitik, Ngwan F. Elsagzli
Abstract:
The Lean technique is very important in the service and industrial fields. It is defined as an effective tool to eliminate the wastes. In lean the wastes are defined as anything which does not add value to the end product. There are wastes that can be avoided, but some are unavoidable to many reasons. The present study aims to apply the principles of lean in two different sectors, healthcare, and industry. Two case studies have been selected to apply the experimental work. The first case was Al-Jalaa Hospital while the second case study was the Technical Company of Aluminum Sections in Benghazi, Libya. In both case studies the Value Stream Map (VSM) of the current state has been constructed. The proposed plans have been implemented by merging or eliminating procedures or processes. The results obtained from both case studies showed improvement in capacity, idle time and utilized time.Keywords: healthcare service delivery, idle time, lean principles, utilized time, value stream mapping, wastes
Procedia PDF Downloads 28421044 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model
Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek
Abstract:
Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.Keywords: optimum balance model, knowledge management, security environment, supporting peace
Procedia PDF Downloads 39321043 The Effect of Arms Embargoes on Ongoing Armed Conflict: Are They Really Reducing Conflict Duration?
Authors: Mustafa Kirisci
Abstract:
Arms embargoes have not been adequately examined in terms of their effects on conflict duration. Prior research on arms embargoes has generally investigated the effect of arms embargoes on arms import/export practices and violations in arms embargoes, but it says little about the effect on conflict duration. This paper attempts to fill this gap and aims to investigate the effect of arms embargoes on conflict duration throughout the world. More precisely, the purpose of the paper is to understand how arms embargoes affect the duration of both internal and interstate conflicts. Given the theoretical framework, the main hypothesis of the paper is arms embargoes will have no reduction effect on conflict duration when arms transfer and region are controlled. This hypothesis is tested by using OLS regression. Results indicate that arms embargoes have no effect on both internal and interstate conflict duration. Another crucial result is that both small and major arms transfers made by the embargoed countries during the internal conflict increase the duration of the conflict, but no effect on interstate conflict duration. The final part concludes and provide explanations on what these results imply for finishing the conflict and bringing the peace.Keywords: arms embargo, arms transfer, internal conflict, international conflict
Procedia PDF Downloads 44121042 Caught in the Crossfire : Natural Resources, Energy Transition, and Conflict in the Democratic Republic of Congo
Authors: Koami West Togbetse
Abstract:
The global shift towards clean and sustainable energy sources, known as the energy transition, is compelling numerous countries to transition from polluting energy systems to cleaner alternatives, commonly referred to as green energies. In this context, cobalt holds significant importance as a crucial mineral in facilitating this energy transition due to its pivotal role in electric batteries. Considering the Democratic Republic of Congo’s reputation for political instability and its position as the largest producer of cobalt, possessing over 50% of the world’s reserves, we have assessed the potential conflicts that may arise as a result of the rapid increase in cobalt demand. The results show that cobalt does not appear to be a determinant contributing to all past conflicts over the study period in the Democratic Republic of Congo (DRC). Gold, on the other hand, stands out as one of the coveted metals for rebel groups engaged in rampant exploitation, increasing the likelihood of conflicts occurring. However, a more in-depth analysis reveals a shift in the relationship between cobalt production and conflict events around 2006. Prior to 2006, increased cobalt production was significantly associated with a reduction in conflict events. However, after 2006, this relationship became positive, indicating that higher cobalt production is now linked to a slight increase in conflict events. This suggests a change in the dynamics affecting conflicts related to cobalt production before and after 2006. According to our predictive model, cobalt has the potential to emerge increasingly as a contributing factor, just like gold.Keywords: conflicts, natural resources, energy transition, geopolitics
Procedia PDF Downloads 3021041 Power-Sharing Politics: A Panacea to Conflict Resolution and Stability in Africa
Authors: Emmanuel Dangana Monday
Abstract:
Africa as a continent has been ravaged and bedeviled by series of political conflicts associated with politics and power-sharing maneuvering. As a result it has become the most unstable continent in the world in terms of power distribution and stable political culture. This paper examines the efficacy of conscious and deliberate power-sharing strategies to settle or resolve political conflicts in Africa in the arrangements of creation of states, revenue and resources allocation, and office distribution systems. The study is concerned with the spatial impact of conflicts generated in some renowned African countries in which power-sharing would have been a solution. Ethno-regional elite groups are identified as the major actors in the struggles for the distribution of territorial, economic and political powers in Africa. The struggle for power has become so intense that it has degenerated to conflicts and wars of inter and intra-political classes and parties respectively. Secondary data and deductive techniques were used in data collection and analysis. It is discovered that power-sharing has become an indispensable tool to curb the incessant political and power crisis in Africa. It is one of the finest tolerable modality of mediating elite’ competition, since it reflects the interests of both the dominant and the perceived marginalized groups. The study recommends that countries and regions of political, ethnic and religious differences in Africa should employed power-sharing strategy in order to avoid unnecessary political tension and resultant crisis. Interest groups should always come to the negotiation table to reach a realistic, durable and expected compromise to secure a peacefully resolute Africa.Keywords: Africa, power-sharing, conflicts, politics and political stability
Procedia PDF Downloads 32421040 Music Educators for Peace: Synchronizing Music and Pedagogical Experiences to Re-Build Social Fabric in Colombia's Post-Conflict
Authors: Julian Dario Castro Cifuentes
Abstract:
In Colombia, the armed conflict has lasted for more than sixty years bringing poverty, internal displacement of people, deaths from both government and insurgent forces and other violence-related problems that has damaged its social fabric. In 2016, the peace process between the Colombian government and the FARC rebels brought the possibility of ending this war and a new set of challenges to Colombian society in order to achieve pacific coexistence and reconciliation. In this scenario, there have been different efforts from diverse social actors in order to build peace and reconciliation mainly within the victims of the armed conflict. In the case of music, there have been multiple programs for social transformation through music and pedagogical experiences. Nevertheless, the need to strengthen this initiative by giving ‘peace building oriented’ pedagogical tools to the musicians that lead this experiences and understanding which aspects make this practices ‘musically meaningful’, has been recognized. For this reason, the purpose of this study is to discuss the convergences and divergences of music, and educational experiences applied to peacebuilding in the context of Colombia’s post-conflict. In this research, the hermeneutic phenomenology paradigm is applied in a case study of a peace building music education experience in the department of Nariño, Colombia articulated with the program ‘Manos a la Paz’. Two particular experiences, one on musical practice and another on music education are taken as a unit of analysis to understand its essence and structure in order to find ways to articulate efforts in peace building actions from music. This study shows how the existent gap between music experience and its subjacent pedagogical knowledge, can be reduced through deconstruction of the music and pedagogical experience. The ‘Manos a la Paz’ program showed how a peace building approach to music education can make major contributions to Pacific Coexistence and Reconciliation in Colombia’s Post-Conflict.Keywords: music education, music for peace, music pedagogy, peace building, social fabric
Procedia PDF Downloads 22721039 The Analysis of Secondary Case Studies as a Starting Point for Grounded Theory Studies: An Example from the Enterprise Software Industry
Authors: Abilio Avila, Orestis Terzidis
Abstract:
A fundamental principle of Grounded Theory (GT) is to prevent the formation of preconceived theories. This implies the need to start a research study with an open mind and to avoid being absorbed by the existing literature. However, to start a new study without an understanding of the research domain and its context can be extremely challenging. This paper presents a research approach that simultaneously supports a researcher to identify and to focus on critical areas of a research project and prevent the formation of prejudiced concepts by the current body of literature. This approach comprises of four stages: Selection of secondary case studies, analysis of secondary case studies, development of an initial conceptual framework, development of an initial interview guide. The analysis of secondary case studies as a starting point for a research project allows a researcher to create a first understanding of a research area based on real-world cases without being influenced by the existing body of theory. It enables a researcher to develop through a structured course of actions a firm guide that establishes a solid starting point for further investigations. Thus, the described approach may have significant implications for GT researchers who aim to start a study within a given research area.Keywords: grounded theory, interview guide, qualitative research, secondary case studies, secondary data analysis
Procedia PDF Downloads 26521038 Religion: A Tool for Conflict Resolution and Peace in Nigerian Society
Authors: V. U. Onyemauwa
Abstract:
Conflicts have always been part of human societies. So long as there is interaction amongst individuals or societies, there are bound to be conflicts as a result of the fact that interests among individuals and societies vary. The issue of conflict has become one of the regular headlines in the daily news of the Nigerian and global media today. Nigerian polity has suffered from one conflict or another, ranging from religious, civil, political, cultural, regional and ethnic violence. It has been found out that, the most disturbing part of these acts of conflicts in Nigeria and around the globe is that most of them have traced their roots to religion. Even some perpetrators of these acts of conflicts most of the time justify their actions with religion, thereby wrongly making religion an object of conflict and violence. In this regard, the study seeks to project religion as a potent tool for conflict resolution because it has a way of permeating through the hearts of men. It has a special responsibility of identifying conflicts and proffer solutions. It also has to provide theological reasoning as to why and how these conflicts come about and how they can possibly be solved. Religious actors are known to contribute to the processes of structural reform necessary for the restoration of productive social relations and political stability after a period of conflict and human rights abuses. The study examines the modalities for projecting religious conflict management strategies in Nigeria using an analysis of relevant documents as well as Black’s Social Control Theory and Thomas-Kilmann’s Model of Conflict Management as its theoretical frameworks. It recommends for a religiously-based means of conflict resolution in Nigeria. Religious individuals and faith-based organisations, as carriers of religious ideas are implore to play active roles in conflict resolution and peace-building in Nigeria by creating conducive environment for peaceful talks, mediation and reconciliation. This will enhance social cohesion, provides solid foundation for peace, progress and development in the society.Keywords: conflict, peace, religion, resolution
Procedia PDF Downloads 39721037 Understanding Cyber Kill Chains: Optimal Allocation of Monitoring Resources Using Cooperative Game Theory
Authors: Roy. H. A. Lindelauf
Abstract:
Cyberattacks are complex processes consisting of multiple interwoven tasks conducted by a set of agents. Interdictions and defenses against such attacks often rely on cyber kill chain (CKC) models. A CKC is a framework that tries to capture the actions taken by a cyber attacker. There exists a growing body of literature on CKCs. Most of this work either a) describes the CKC with respect to one or more specific cyberattacks or b) discusses the tools and technologies used by the attacker at each stage of the CKC. Defenders, facing scarce resources, have to decide where to allocate their resources given the CKC and partial knowledge on the tools and techniques attackers use. In this presentation CKCs are analyzed through the lens of covert projects, i.e., interrelated tasks that have to be conducted by agents (human and/or computer) with the aim of going undetected. Various aspects of covert project models have been studied abundantly in the operations research and game theory domain, think of resource-limited interdiction actions that maximally delay completion times of a weapons project for instance. This presentation has investigated both cooperative and non-cooperative game theoretic covert project models and elucidated their relation to CKC modelling. To view a CKC as a covert project each step in the CKC is broken down into tasks and there are players of which each one is capable of executing a subset of the tasks. Additionally, task inter-dependencies are represented by a schedule. Using multi-glove cooperative games it is shown how a defender can optimize the allocation of his scarce resources (what, where and how to monitor) against an attacker scheduling a CKC. This study presents and compares several cooperative game theoretic solution concepts as metrics for assigning resources to the monitoring of agents.Keywords: cyber defense, cyber kill chain, game theory, information warfare techniques
Procedia PDF Downloads 13921036 Trafficking in Children as a Qualified Form of the Crime of Trafficking in Human Beings
Authors: Vanda Božić, Željko Nikač
Abstract:
Trafficking in children, especially vulnerable victims, is a qualified form of committing the crime of human trafficking, and a special form of abuse and violation of children's rights. Given that trafficking in children is dangerous, but also a specific form of crime in relation to trafficking in human beings, this paper will in the first part indicate the forms of trafficking in children (trafficking in children for sexual exploitation, child pornography, and pedophilia, exploitation of labor, begging, performance of criminal acts, adoption, marriage and participation in armed conflicts). The second part references the international documents which regulate this matter as well as the solutions in national criminal legislations of Republic of Croatia and Republic of Serbia. It points to the essential features and characteristics of the victims, according to sex, age, and citizenship, as well as the age of children at the stage of solicitation and recruitment and the status of the family from which the child comes from. The work includes a special emphasis on international police cooperation in the fight against trafficking in children. Concluding remarks set out proposals de lege ferenda that can be of significant impact, particularly on prevention, and then also on repression in combating this serious crime.Keywords: trafficking in children, trafficking in human beings, child as a victim of human trafficking, children’s rights
Procedia PDF Downloads 35721035 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 13821034 Intelligence Failures and Infiltration: The Case of the Ethiopian Army 1977-1991
Authors: Fantahun Ibrahim
Abstract:
The Ethiopian army was one of the largest and most heavily armed ground forces in Africa between 1974 and 1991. It scored a decisive victory over Somalia’s armed forces in March 1978. It, however, failed to withstand the combined onslaught of the northern insurgents from Tigray and Eritrea and finally collapsed in 1991. At the heart of the problem was the army’s huge intelligence failure. The northern insurgents, on the other hand, had a cutting edge in intelligence gathering. Among other things they infiltrated the army high command and managed to get top secrets about the army. Commanders who had fallen into the hands of the insurgents in several battles were told to send letters to their colleagues in the command structure and persuade them to work secretly for the insurgents. Some commanders did work for the insurgents and played a great role in the undoing of military operations. Insurgent commanders were able to warn their fighters about air strikes before jet fighters took off from airfields in the northern theatre. It was not uncommon for leaders of insurgents to get the full details of military operations days before their implementation. Such intelligence failures led to major military disasters like the fall of Afabet (March, 1988), Enda Sellase (February, 1989), Massawa and Debre Tabor (February, 1990), Karra Mishig, Meragna and Alem Ketema (June, 1990). This paper, therefore, seeks to investigate the army’s intelligence failures using untapped archival documents kept at the Ministry of National Defence in Addis Ababa and interviewing key former commanders of the army and ex-leaders of the insurgents.Keywords: Ethiopian army, intelligence, infiltration, insurgents
Procedia PDF Downloads 30621033 De-Securitizing Identity: Narrative (In)Consistency in Periods of Transition
Authors: Katerina Antoniou
Abstract:
When examining conflicts around the world, it is evident that the majority of intractable conflicts are steeped in identity. Identity seems to be not only a causal variable for conflict, but also a catalytic parameter for the process of reconciliation that follows ceasefire. This paper focuses on the process of identity securitization that occurs between rival groups of heterogeneous collective identities – ethnic, national or religious – as well as on the relationship between identity securitization and the ability of the groups involved to reconcile. Are securitized identities obstacles to the process of reconciliation, able to hinder any prospects of peace? If the level to which an identity is securitized is catalytic to a conflict’s discourse and settlement, then which factors act as indicators of identity de-securitization? The level of an in-group’s identity securitization can be estimated through a number of indicators, one of which is narrative. The stories, views and stances each in-group adopts in relation to its history of conflict and relation with their rival out-group can clarify whether that specific in-group feels victimized and threatened or safe and ready to reconcile. Accordingly, this study discusses identity securitization through narrative in relation to intractable conflicts. Are there conflicts around the world that, despite having been identified as intractable, stagnated or insoluble, show signs of identity de-securitization through narrative? This inquiry uses the case of the Cyprus conflict and its partitioned societies to present official narratives from the two communities and assess whether these narratives have transformed, indicating a less securitized in-group identity for the Greek and Turkish Cypriots. Specifically, the study compares the official historical overviews presented by each community’s Ministry of Foreign Affairs website and discusses the extent to which the two official narratives present a securitized collective identity. In addition, the study will observe whether official stances by the two communities – as adopted by community leaders – have transformed to depict less securitization over time. Additionally, the leaders’ reflection of popular opinion is evaluated through recent opinion polls from each community. Cyprus is currently experiencing renewed optimism for reunification, with the leaders of its two communities engaging in rigorous negotiations, and with rumors calling for a potential referendum for reunification to be taking place even as early as within 2016. Although leaders’ have shown a shift in their rhetoric and have moved away from narratives of victimization, this is not the case for the official narratives used by their respective ministries of foreign affairs. The study’s findings explore whether this narrative inconsistency proves that Cyprus is transitioning towards reunification, or whether the leaders are risking sending a securitized population to the polls to reject a potential reunification. More broadly, this study suggests that in the event that intractable conflicts might be moving towards viable peace, in-group narratives--official narratives in particular--can act as indicators of the extent to which rival entities have managed to reconcile.Keywords: conflict, identity, narrative, reconciliation
Procedia PDF Downloads 32221032 National Defense and Armed Forces Development in the Member States of the Visegrad Group
Authors: E. Hronyecz
Abstract:
Guaranteeing the independence of the V4 Member States, the protection of their national values and their citizens, and the security of the Central and Eastern European region requires the development of military capabilities in terms of the capabilities of nations. As a result, European countries have begun developing capabilities and forces, within which nations are seeking to strengthen the capabilities of their armies and make their interoperability more effective. One aspect of this is the upgrading of military equipment, personnel equipment, and other human resources. Based on the author's preliminary researches - analyzing the scientific literature, the relevant statistical data and conducting of professional consultations with the experts of the research field – it can clearly claimed for all four states of Visegrad Group that a change of direction in the field of defense has been noticeable since the second half of the last decade. Collective defense came to the forefront again; the military training, professionalism, and radical modernization of technical equipment becoming crucial.Keywords: armed forces, cooperation, development, Visegrad Group
Procedia PDF Downloads 13221031 Women in Violent Conflicts and the Challenges of Food Security in Northeast Nigeria: The Case of Boko Haram Insurgency
Authors: Grace Modupe Adebo, Ayodeji Oluwamuyiwa Adedapo
Abstract:
Women are key actors in ensuring food security in terms of food availability, food access, and food utilization in the developing economy, however, they suffer mostly during violent conflicts due to their feminist nature of rearing and caring for their children and relatives. The study was embarked upon to access the effects of violent conflicts posed by Boko Haram insurgency on women and food security in the Northeast of Nigeria. The study made use of secondary data. A time series data collected over a 22 years period were used. The data collected were subjected to descriptive statistics and t-test analysis. The findings of the study established a significant difference in food production (availability) before and after the Boko Haram insurgency at the 1% level of significance. The high level of Internally Displaced Person (IDP) with a high proportion of women depicts a very low level of food accessibility as the men and women has fled and uninhabited their place of abode for over a period of four to five years, thus diminishing their economic power, and the means of acquiring food which invariably endanger food stability and utilization. The study confirmed the abduction and changing roles of women as cooks, porters, spies, partners, and sex slaves to Boko Haram troop members, thus affecting their livelihoods and food security. The study recommends hands-on interventions by the governmental, non-governmental and international agencies to terminate the activities of Boko Haram in the area and restore the food production for enhanced food security.Keywords: Boko Haram insurgency, food accessibility, food production, food utilization, women’s livelihoods
Procedia PDF Downloads 14721030 Adopting a Stakeholder Perspective to Profile Successful Sustainable Circular Business Approaches: A Single Case Study
Authors: Charleen von Kolpinski, Karina Cagarman, Alina Blaute
Abstract:
The circular economy concept is often framed by politicians, scientists and practitioners as being the solution to sustainability problems of our times. However, the focus of these discussions and publications is very often set on environmental and economic aspects. In contrast, the social dimension of sustainability has been neglected and only a few recent and mostly conceptual studies targeted the inclusion of social aspects and the SDGs into circular economy research. All stakeholders of this new circular system have to be included to represent a truly sustainable solution to all the environmental, economic and social challenges caused by the linear economic system. Hence, this empirical research aims to analyse, next to the environmental and economic dimension, also explicitly the social dimension of a sustainable circular business model. This inductive and explorative approach applies the single case study method. A multi-stakeholder view is adopted to shed light on social aspects of the circular business model. Different stakeholder views, tensions between stakeholders and conflicts of interest are detected. In semi-structured interviews with different stakeholders of the company, this study compares the different stakeholder views to profile the success factors of its business model in terms of sustainability implementation and to detect its shortcomings. These findings result in the development of propositions which cover different social aspects of sustainable circular business model implementation. This study is an answer to calls for future empirical research about the social dimension of the circular economy and contributes to sustainable business model thinking in entrepreneurial contexts of the circular economy. It helps identifying all relevant stakeholders and their needs to successfully and inclusively implement a sustainable circular business model. The method of a single case study has some limitations by nature as it only covers one enterprise with its special business model. Therefore, more empirical studies are needed to research sustainable circular business models from multiple stakeholder perspectives, in different countries and industries. Future research can build upon the developed propositions of this study and develop hypotheses to be tested.Keywords: circular economy, single case study, social dimension, sustainable circular business model
Procedia PDF Downloads 17421029 Judicial Trendsetting: European Courts as Pacemakers for Defining, Redefining, and Potentially Expanding Protection for People Fleeing Armed Conflict and Natural Disasters
Authors: Charlotte Lülf
Abstract:
Migration flows cannot be tackled by single states but need to be addressed as a transnational and international responsibility. However, the current international framework staggers. Widely excluded from legal protection are people that flee from the indiscriminate effects of an armed conflict as well as people fleeing natural disasters. This paper as part of an on-going PhD Project deals with the current and partly contradicting approaches to the protection of so-called war- and climate refugees in the European Union. The analysis will emphasize and evaluate the role of the European judiciary to define, redefine and potentially expand legal protection. Changing jurisprudential practice of national and regional courts will be assessed, as will be their dialogue to interpret the international obligations of human rights law, migration laws and asylum laws in an interacting world.Keywords: human rights law, asylum law, migration, refugee protection
Procedia PDF Downloads 26221028 Planning Method Study on the Ecological Restrained Construction Area from the Perspective of Governance: A Case from Yangzijin, Yangzhou, China
Authors: Rushi Tan, Yilun Xu, Xiaohui Wang
Abstract:
The restrained construction zoning, an important part in the urban master plan, is a necessary planning tool to control the city sprawl, to guarantee the reservation implementation of the various types of protective elements, and to realize the storage of the essential urban spatial resources. Simultaneously, owing to the diverse constitutes of restrained construction area and the various stakeholders involved in, its planning requires an overall consideration of all elements from the perspective of coordination, balance and practicability to deal with the problems and conflicts in this process. Taking Yangzijin Ecological Restrained Construction Area in Yangzhou as an example, this study analyzes all the potential actors, agencies and stakeholders in this restrained construction area, as well as the relevant conflicts between each other. Besides, this study tries to build up a planning procedure based on the framework of governance theory, and proposes a possible planning method that combines "rigidity" and "flexibility" to protect the ecological limitation boundary, to take every interest into account, and to promote economic development in a harmonious society.Keywords: restrained construction area, governance, stakeholder, flexible stratagem, China
Procedia PDF Downloads 41321027 The Use of Phototherapy with Unusual Case Studies in Counselling
Authors: Briar Schulz
Abstract:
The use of phototherapy within the counselling room offers significant advantages in extending far beyond typical "talk therapy" avenues. The benefits of using this approach are numerous and include: efficiency in recalling pertinent information in addition to utilizing a visual lens that often captures opulent detail that can be eluded in traditional dialogue. The goal of this presentation is to provide conference attendees with an opportunity to understand the therapeutic benefits and creative possibilities of incorporating photography into the clinical counselling process. This includes practical strategies for using in specific case studies, where studies of phototherapy have previously been limited. Ethical considerations and limitations to the process will also be addressed. Attendees will observe the benefits of using phototherapy with six longitudinal case studies including: a 30 year old female, with anorexia nervosa; a 22 year old self-harming individual with obsessive compulsive disorder; a 24 year old client with developmental delays, and bipolar disorder; a 14 year old client with Autism; and two clients with rare medical conditions struggling with depression and anxiety, one 21 years old and the other 16 years old. Aspects of each case will be linked to various theoretical modalities to highlight the efficiency and benefits of phototherapy in drawing important clinical conclusions. Furthermore, the use of phototherapy within these clinical areas remains a relatively unexplored area of the literature, and possibilities for future research will be highlighted. Finally, conference attendees will have the opportunity to try various phototherapy strategies within the interactive portion of this presentation. .Keywords: Atypical, Case studies, Phototherapy, Photovoice
Procedia PDF Downloads 14721026 Timetabling for Interconnected LRT Lines: A Package Solution Based on a Real-world Case
Authors: Huazhen Lin, Ruihua Xu, Zhibin Jiang
Abstract:
In this real-world case, timetabling the LRT network as a whole is rather challenging for the operator: they are supposed to create a timetable to avoid various route conflicts manually while satisfying a given interval and the number of rolling stocks, but the outcome is not satisfying. Therefore, the operator adopts a computerised timetabling tool, the Train Plan Maker (TPM), to cope with this problem. However, with various constraints in the dual-line network, it is still difficult to find an adequate pairing of turnback time, interval and rolling stocks’ number, which requires extra manual intervention. Aiming at current problems, a one-off model for timetabling is presented in this paper to simplify the procedure of timetabling. Before the timetabling procedure starts, this paper presents how the dual-line system with a ring and several branches is turned into a simpler structure. Then, a non-linear programming model is presented in two stages. In the first stage, the model sets a series of constraints aiming to calculate a proper timing for coordinating two lines by adjusting the turnback time at termini. Then, based on the result of the first stage, the model introduces a series of inequality constraints to avoid various route conflicts. With this model, an analysis is conducted to reveal the relation between the ratio of trains in different directions and the possible minimum interval, observing that the more imbalance the ratio is, the less possible to provide frequent service under such strict constraints.Keywords: light rail transit (LRT), non-linear programming, railway timetabling, timetable coordination
Procedia PDF Downloads 8521025 Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population
Authors: Colette Faucher
Abstract:
In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population.Keywords: military psychological operations, social identity, social network, emotion propagation
Procedia PDF Downloads 40921024 The Social Area Disclosure to Reduce Conflicts between Community and the State: A Case of Mahakan Fortress, Bangkok
Authors: Saowapa Phaithayawat
Abstract:
The purposes of this study are 1) to study the over 20-year attempt of Mahakan fort community to negotiate with Bangkok Metropolitan Administration (BMA) to remain in their residential area belonging to the state, and 2) to apply the new social and cultural dimension between the state and the community as an alternative for local participation in keeping their residential area. This is a qualitative research, and the findings reveal that the community claimed their ancestors’ right as owners of this piece of land for over 200 years. The community, therefore, requested to take part in the preservation of land, culture and local intellect and the area management in terms of being a learning resource on the cultural road in Rattanakosin Island. However, BMA imposed the law concerning the community area relocation in Rattanakosin Island. The result of law enforcement led to the failure of the area relocation, and the hard hit on physical structure of the area including the overall deterioration of the cultural road renovated in the year 1982, the 200 years’ celebration of Bangkok. The enforcement of law by the state required the move of the community, and the landscape improvement based on the capital city plan. However, this enforcement resulted in the unending conflicts between the community and the state, and the solution of this problem was unclear. At the same time the community has spent a long time opposing the state’s action, and preparing themselves by administrating the community behind Mahakan fortress with community administrative committee under the suggestion of external organization by registering all community members, providing funds for community administration. At the meantime the state lacked the continuation of the enforcement due to political problem and BMA’s administration problem. It is, therefore, suggested that an alternative solution to this problem lie at the negotiation between the state and the community with the purpose of the collaboration between the two to develop the area under the protective law of each side.Keywords: Pom-Mahakan community, reduction of conflicts, social area disclosure, residential area
Procedia PDF Downloads 31321023 The Lasting Legacy of Six-Day War: How Six Days Changed the Life of Palestinians, Israelis and Their Relationship
Authors: Ziling Chen
Abstract:
Within six days in June 1967, Israeli armies defeated the combined forces of Egypt, Syria, and Jordan. This war was later named the Six-Day War, or Third Arab-Israeli War. This paper examines the lasting legacy of the Six-Day War in the life of Palestinians and Israelis economically, politically, and religiously. The long-term Israeli occupation resulted in Palestinian displacement, impeded the development of the Palestinian economy, as well as a created division within Israeli society. Although the war ended, the conflicts persist, most notably in the Old City of Jerusalem. Due to its sacred nature, the Old City became the center of religious conflicts after the Six-Day War.Keywords: Israelis, Jerusalem, Palestinians, Six-Day War
Procedia PDF Downloads 12221022 An Information Matrix Goodness-of-Fit Test of the Conditional Logistic Model for Matched Case-Control Studies
Authors: Li-Ching Chen
Abstract:
The case-control design has been widely applied in clinical and epidemiological studies to investigate the association between risk factors and a given disease. The retrospective design can be easily implemented and is more economical over prospective studies. To adjust effects for confounding factors, methods such as stratification at the design stage and may be adopted. When some major confounding factors are difficult to be quantified, a matching design provides an opportunity for researchers to control the confounding effects. The matching effects can be parameterized by the intercepts of logistic models and the conditional logistic regression analysis is then adopted. This study demonstrates an information-matrix-based goodness-of-fit statistic to test the validity of the logistic regression model for matched case-control data. The asymptotic null distribution of this proposed test statistic is inferred. It needs neither to employ a simulation to evaluate its critical values nor to partition covariate space. The asymptotic power of this test statistic is also derived. The performance of the proposed method is assessed through simulation studies. An example of the real data set is applied to illustrate the implementation of the proposed method as well.Keywords: conditional logistic model, goodness-of-fit, information matrix, matched case-control studies
Procedia PDF Downloads 29021021 Towards Resilient Cloud Computing through Cyber Risk Assessment
Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar
Abstract:
Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment
Procedia PDF Downloads 13921020 Mining and Ecological Events and its Impact on the Genesis and Geo-Distribution of Ebola Outbreaks in Africa
Authors: E Tambo, O. O. Olalubi, E. C. Ugwu, J. Y. Ngogang
Abstract:
Despite the World Health Organization (WHO) declaration of international health emergency concern, the status quo of responses and efforts to stem the worst-recorded Ebola epidemic Ebola outbreak is still precariously inadequate in most of the affected in West. Mining natural resources have been shown to play a key role in both motivating and fuelling ethnic, civil and armed conflicts that have plagued a number of African countries over the last decade. Revenues from the exploitation of natural resources are not only used in sustaining the national economy but also armies, personal enrichment and building political support. Little is documented on the mining and ecological impact on the emergence and geographical distribution of Ebola in Africa over time and space. We aimed to provide a better understanding of the interconnectedness among issues of mining natural, resource management, mining conflict and post-conflict on Ebola outbreak and how wealth generated from abundant natural resources could be better managed in promoting research and development towards strengthening environmental, socioeconomic and health systems sustainability on Ebola outbreak and other emerging diseases surveillance and responses systems prevention and control, early warning alert, durable peace and sustainable development rather than to fuel conflicts, resurgence and emerging diseases epidemics in the perspective of community and national/regional approach. Our results showed the first assessment of systematic impact of all major minerals conflict events diffusion over space and time and mining activities on nine Ebola genesis and geo-distribution in affected countries across Africa. We demonstrate how, where and when mining activities in Africa increase ecological degradation, conflicts at the local level and then spreads violence across territory and time by enhancing the financial capacities of fighting groups/ethnics and diseases onset. In addition, led process of developing minimum standards for natural resource governance; improving governmental and civil society capacity for natural resource management, including the strengthening of monitoring and enforcement mechanisms; understanding the post-mining and conflicts community or national reconstruction and rehabilitation programmes in strengthening or developing community health systems and regulatory mechanisms. In addition the quest for the control over these resources and illegal mining across the landscape forest incursion provided increase environmental and ecological instability and displacement and disequilibrium, therefore affecting the intensity and duration of mining and conflict/wars and episode of Ebola outbreaks over time and space. We highlight the key findings and lessons learnt in promoting country or community-led process in transforming natural resource wealth from a peace liability to a peace asset. The imperative necessity for advocacy and through facilitating intergovernmental deliberations on critical issues and challenges affecting Africa community transforming exploitation of natural resources from a peace liability to outbreak prevention and control. The vital role of mining in increasing government revenues and expenditures, equitable distribution of wealth and health to all stakeholders, in particular local communities requires coordination, cooperative leadership and partnership in fostering sustainable developmental initiatives from mining context to outbreak and other infectious diseases surveillance responses systems in prevention and control, and judicious resource management.Keywords: mining, mining conflicts, mines, ecological, Ebola, outbreak, mining companies, miners, impact
Procedia PDF Downloads 30021019 Intrusion Detection in SCADA Systems
Authors: Leandros A. Maglaras, Jianmin Jiang
Abstract:
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection
Procedia PDF Downloads 552