Search results for: intellectual security immunization
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3345

Search results for: intellectual security immunization

3255 Security Architecture for Cloud Networking: A Survey

Authors: Vishnu Pratap Singh Kirar

Abstract:

In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.

Keywords: cloud computing, cloud networking, IaaS, PaaS, SaaS, cloud security

Procedia PDF Downloads 504
3254 Islamic Social Security: A Discourse

Authors: Safiyya A. Abba, Shehu U. R. Aliyu

Abstract:

This paper deals with Islamic social security: a discourse explores the meaning and nature of Islamic social security system. The paper reviews the social security framework and operations during the early period. The paper further identifies the instruments of Islamic social security discusses its principles and objectives. The paper discovers that Islamic social security is a personification of a comprehensive welfare approach in view of its varied instruments that are deeply rooted in the Islamic law, unique principles and realistic and achievable objectives. Furthermore, the Islamic social security system has far reaching socioeconomic implications; social justice, cohesion, equity, a catalyst for poverty eradication, income redistribution, economic growth and development.

Keywords: Islamic social security, basic needs, zakat, socioeconomic justice, equity

Procedia PDF Downloads 411
3253 Benefits of Occupational Therapy for Children with Intellectual Disabilities in the Aspects of Vocational Activities and Instrumental Activities of Daily Life

Authors: Shakhawath Hossain, Tazkia Tahsin

Abstract:

Introduction/Background: Intellectual disability is a disability characterized by significant limitations both in intellectual functioning and in adaptive behavior, which covers many everyday social and practical skills. Vocational education is a multi-professional approach that is provided to individuals of working age with health-related impairments, limitations, or restrictions with work functioning and whose primary aim is to optimize work participation. Instrumental Activities of Daily Living activities to support daily life within the home and community. Like as community mobility, financial management, meal preparation, and clean-up, shopping. Material and Method: Electronic searches of Medline, PubMed, Google scholar, OT Seeker literature using the key terms of intellectual disability, vocational rehabilitation, instrumental activities of daily living and Occupational Therapy, as well as a thorough manual search for relevant literature. Results: There were 13 articles, all qualitative and quantitative, which are included in this review. All studies were mixed methods in design. To take the Occupational Therapy services, there is a significant improvement in their children's various areas like as sensory issues, cognitive abilities, perceptual skills, visual, motor planning, and group therapy. After taking the vocational and instrumental activities of daily living training children with intellectual disabilities to participate in their daily activities and work as an employee different company or organizations. Conclusion: The persons with intellectual disability are an integral part of our society who deserves social support and opportunities like other human beings. From the result section of the project papers, it is found that the significant benefits of Occupational Therapy services in the aspects of vocational and instrumental activities of daily living.

Keywords: occupational therapy, daily living activities, intellectual disabilities, instrumental ADL

Procedia PDF Downloads 113
3252 How Does the Interaction between Environmental and Intellectual Property Rights Affect Environmental Innovation? A Study of Seven OECD Countries

Authors: Aneeq Sarwar

Abstract:

This study assesses the interaction between environmental and intellectual property policy on the rate of invention of environmental inventions and specifically tests for whether there is a synergy between stricter IP regimes and stronger environmental policies. The empirical analysis uses firm and industry-level data from seven OECD countries from 2009 to 2015. We also introduce a new measure of environmental inventions using a Natural Language Processing Topic Modelling technique. We find that intellectual property policy strictness demonstrates greater effectiveness in encouraging inventiveness in environmental inventions when used in combination with stronger environmental policies. This study contributes to existing literature in two ways. First, it devises a method for better identification of environmental technologies, we demonstrate how our method is more comprehensive than existing methods as we are better able to identify not only environmental inventions, but also major components of said inventions. Second, we test how various policy regimes affect the development of environmental technologies, we are the first study to examine the interaction of the environmental and intellectual property policy on firm level innovation.

Keywords: environmental economics, economics of innovation, environmental policy, firm level

Procedia PDF Downloads 133
3251 Tenure Security, Agricultural Diversity and Food Security

Authors: Amanuel Hadera Gebreyesus

Abstract:

In the literature, the study of tenure and food security has largely involved separate lines of inquiry. In effect, the nexus among these has received little attention; and the underinvestment in research related to the relationship between tenure and food security deters generation of tenure-related knowledge and policy guidance for improving food and nutrition security. Drawing from this motivation, we study the relationship among tenure security, agricultural diversity and food security and dietary diversity. We employ IV approaches to examine the effect of tenure security and agricultural diversity on food security and dietary diversity. We find tenure security is inversely related with food insecurity as shown by its negative association with hunger scale, hunger index and hunger category. On the other hand, results suggest that tenure security improves minimum dietary diversity of women while we find no association with child dietary diversity. Moreover, agricultural diversity is positively related with minimum dietary diversity of women, which may point to higher accessibility and consumption of dietary food groups by women. Also, findings suggest that farmers use their human (knowledge and skills) and resource (land) endowments to improve food security and dietary diversity. An implication from this is the importance of not only improving access to land but also long-term tenure security to promote agricultural diversity, food security and dietary diversity.

Keywords: tenure security, food security, agricultural diversity, dietary diversity, women

Procedia PDF Downloads 175
3250 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 469
3249 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 553
3248 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 402
3247 Is Swaziland on Track with the 2015 Millennium Development Goals?

Authors: A. Sathiya Susuman

Abstract:

Background: The importance of maternal and child healthcare services cannot be stressed enough. These services are very important for the health and health outcomes of the mother and that of the child and in ensuring that both maternal and child deaths are prevented. The objective of the study is to inspire good quality maternal and child health care services in Swaziland. Specifically, is Swaziland on track with the 2015 Millennium Development Goals? Methods: The study used secondary data from the Swaziland Demographic and Health Survey 2006-07. This is an explorative and descriptive study which used pre-selected variables to study factors influencing the use of maternal and child healthcare services in Swaziland. Different types of examinations, such as univariate, bivariate, and multivariate statistical analysis were adopted. Results: The study findings showed a high use rate of antenatal care (97.3%) and delivery care (74.0%), and a low rate of postnatal care use (20.5%). The uptake childhood immunization is also high in the country, averaging more than 80.0%. Moreover, certain factors which were found to be influencing the use of maternal healthcare and childhood immunization include: woman’s age, parity, media exposure, maternal education, wealth status, and residence. The findings also revealed that these factors affect the use of maternal and child health differently. Conclusion: It is important to study factors related to maternal and child health uptake to inform relevant stakeholders about possible areas of improvement. Programs to educate families about the importance of maternal and child healthcare services should be implemented. Swaziland needs to work hard on child survival and maternal health care services, no doubt it is on track with the MDG 4 & 5.

Keywords: maternal healthcare, antenatal care, delivery care, postnatal care, child health, immunization, socio-economic and demographic factors

Procedia PDF Downloads 471
3246 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 674
3245 Studying the Influence of the Intellectual Assets on Strategy Implementation: Case Study, Modiran Ideh Pardaz Company

Authors: Farzam Chakherlouy, Amirmehdi Dokhanchi

Abstract:

Nowadays organizations have to identify, evaluate and manage intangible assets which enable them to provide maximum requirements to achieve their goals and strategies. Organizations also have to try to promote and improve these kinds of assets continuously. It seems necessary to implement developed strategies in today’s competitive world where all the organizations and companies spend great amounts of expenses for developing their own strategies. In fact, after determining strategies to be implemented, the management process is not completed and it will not have any effect on the success and existence of the organization until these strategies are implemented. The objective of this article is to define the intellectual capital and it components and studying the impact of intellectual capital on the implementation of strategy based upon the Bozbura model. Three dimensions of human capital, relational capital, and the structural capital. According to the test’s results, the correlation between the intellectual capital and three components of strategic implementation (leadership, human resource management, and culture) has not been approved yet. According to results of Friedman’s test in relation with the intellectual capital, the maximum inadequacy of this company is in the field of human capital (with an average of 3.59) and the minimum inadequacy is in the field of the relational capital (customer) with an average of 2.83. Besides, according to Friedman test in relation with implementation of the strategy, the maximum inadequacy relates to the culture of the organization and the corporate control with averages of 2.60 and 3.45 respectively. In addition, they demonstrate a good performance in scopes of human resources management and financial resources management strategies.

Keywords: Bozbura model, intellectual capital, strategic management, implementation of strategy, Modiran Ideh Pardaz company

Procedia PDF Downloads 398
3244 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations

Authors: Pratyush Vatsala, Sanjay Ahuja

Abstract:

The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.

Keywords: Kashmir, Mizoram, security, value, human right

Procedia PDF Downloads 252
3243 Comparative Analysis between Thailand and the United States of a Wholesale Exemption for Vertical Restraint Regarding Intellectual Property Licensing

Authors: Sanpetchuda Krutkrua, Suphawatchara Malanond

Abstract:

Competition law is not a new thing in Thailand. Thailand first passed the first competition law during the Second World War in order to stop business operator monopolizing food and basic living supplies. The competition law in Thailand has been amended several times during the past eighty years in order to make it suitable for the current economic and social condition. In 2017, Thailand enacted the current Trade Competition Act of B.E. 2560, which contain several changes to the regime in order to enhance a prevention of collusive practices and monopolization through both vertical restraints and horizontal restraints. Section 56 of the Act provides exemptions for the vertical relationship; i.e., the arrangement in form of complementary relationship, between business operators, franchising agreements between franchisor and franchisee, and licensing agreement between licensor and licensee. The key is that such agreements must not be excessive, create monopolization or attempt to monopolize, or cause any impacts the consumers regarding price, quality, quantity of the goods. The goal of the paper is to explore the extent of the exemption under Section 56 and its sequential regulations regarding vertical trade restraints in the case intellectual property licensing. The research will be conducted in form of a comparative analysis on exemptions for collusive practices under the United States Antitrust law and the Thai Competition Act of B.E. 2560. The United Antitrust law, fairly similar to the Thai Competition Act of B.E. 2561, views the intellectual property licensing to have pro-competitive benefits to the market as long as the intellectual property licensing agreement does not harm the competition amongst the business operators that could have or would have been competitors. The United States Antitrust law identifies the relationship between the parties of the agreement whether such agreement is horizontal or vertical or both. Even though the nature of licensing agreements is primarily vertical, the relationship between licensor and licensees can also be horizontal if they could have been potential competitors in the market as well. The United States Antitrust law frowns upon, if not prohibits, the horizontal restraints regarding the intellectual property licensing but does not impose the same restrictions on the vertical trade restraints regarding intellectual property licensing.

Keywords: antitrust, competition law, vertical restraint, intellectual property, intellectual property licensing, comparative law

Procedia PDF Downloads 146
3242 The Research of Weights Identify of Harbin Ecological Security Evaluation Index Based on AHP

Authors: Rong Guo, Mengshi Huang, Yujing Bai

Abstract:

With the rapid development of urbanization, the urban population increases and urban sprawl appeared. And these issues led to a sharp deterioration of the ecological environment. So, the urban ecological security evaluation was imminent. The weights identify of index was a key step of the research of ecological security evaluation. The AHP was widely used in the extensive research of weights identify of ecological security index. The characteristics of authority and quantitative can fully reflect the views of relevant experts. On the basis of building the ecological security evaluation index of Harbin, the paper combed and used the basic principle of the AHP, and calculated the weights of Harbin ecological security evaluation index through the process of the expert opinions “summary-feedback-summary”. And lay a foundation of future study of Harbin ecological security index, and guide the quantitative evaluation of Harbin ecological security.

Keywords: AHP, ecological security, evaluation Index, weights identify, harbin

Procedia PDF Downloads 472
3241 Maximisation of Consumer Welfare in the Enforcement of Intellectual Property Rights in Competition Guidelines: The Malaysian Experience

Authors: Ida Madieha Abdul Ghani Azmi, Heng Gee Lim, Adlan Abdul Razak, Nasaruddin Abdul Rahman

Abstract:

The objective of competition law is to maximise consumer welfare through the regulation of anti-competitive behaviour that results in the distortion of the market. Intellectual property law also seeks to enhance consumer welfare in the long run by encouraging the development of useful devices and processes. Nevertheless, in some circumstances, the IP owners behave in such a way that makes it difficult for rival companies to sell substitute products and technology in the market. Intellectual property owners may also reach a dominant position in the market such that they are able to dictate unfair terms and conditions on other market players. Among the two major categories of anti-competitive behavior is the use of horizontal and vertical agreement to constrain effective competition and abuse of dominant position. As a result, many countries have regulated the conduct of the IP owners that are considered as anti-competitive including the US, Canada, and Singapore. This paper visits the proposed IP Guidelines recently drafted by the Malaysian Competition Commission and investigates to what extent it resolves most of the anti-competitive behavior of the IP owners. The paper concludes by suggesting some of the rules that could be prescribed by the Competition Commission in order to maintain the relevancy of competition law as the main check against the abuse of rights by the intellectual property owners.

Keywords: abuse of dominant position, consumer welfare, intellectual property rights, vertical and horizontal agreements

Procedia PDF Downloads 198
3240 Analysis of Anti-Tuberculosis Immune Response Induced in Lungs by Intranasal Immunization with Mycobacterium indicus pranii

Authors: Ananya Gupta, Sangeeta Bhaskar

Abstract:

Mycobacterium indicus pranii (MIP) is a saprophytic mycobacterium. It is a predecessor of M. avium complex (MAC). Whole genome analysis and growth kinetics studies have placed MIP in between pathogenic and non-pathogenic species. It shares significant antigenic repertoire with M. tuberculosis and have unique immunomodulatory properties. MIP provides better protection than BCG against pulmonary tuberculosis in animal models. Immunization with MIP by aerosol route provides significantly higher protection as compared to immunization by subcutaneous (s.c.) route. However, mechanism behind differential protection has not been studied. In this study, using mice model we have evaluated and compared the M.tb specific immune response in lung compartments (airway lumen / lung interstitium) as well as spleen following MIP immunization via nasal (i.n.) and s.c. route. MIP i.n. vaccination resulted in increased seeding of memory T cells (CD4+ and CD8+ T-cells) in the airway lumen. Frequency of CD4+ T cells expressing Th1 migratory marker (CXCR3) and activation marker (CD69) were also high in airway lumen of MIP i.n. group. Significantly high ex vivo secretion of cytokines- IFN-, IL-12, IL-17 and TNF- from cells of airway luminal spaces provides evidence of antigen-specific lung immune response, besides generating systemic immunity comparable to MIP s.c. group. Analysis of T cell response on per cell basis revealed that antigen specific T-cells of MIP i.n. group were functionally superior as higher percentage of these cells simultaneously secreted IFN-gamma, IL-2 and TNF-alpha cytokines as compared to MIP s.c. group. T-cells secreting more than one of the cytokines simultaneously are believed to have robust effector response and crucial for protection, compared with single cytokine secreting T-cells. Adoptive transfer of airway luminal T-cells from MIP i.n. group into trachea of naive B6 mice revealed that MIP induced CD8 T-cells play crucial role in providing long term protection. Thus the study demonstrates that MIP intranasal vaccination induces M.tb specific memory T-cells in the airway lumen that results in an early and robust recall response against M.tb infection.

Keywords: airway lumen, Mycobacterium indicus pranii, Th1 migratory markers, vaccination

Procedia PDF Downloads 167
3239 A Study of Intellectual Property Issues in the Indian Sports Industry

Authors: Ashaawari Datta Chaudhuri

Abstract:

India is a country that worships sports, especially cricket and football. This paper investigates the different intellectual property law issues that arise for sports. The paper will be a study of the legal precedents and landmark judgements in India for sports law. Some of the issues, such as brand abuse, misbranding, and infringement of IP, are very common and will be studied through case-based analysis. As a developing country, India is coping with new issues for theft of IP in different sectors. It has sportspersons of various kinds representing the country in many international events. This invites various problems in terms of recognition, credit, brand promotions, sponsorships, endorsements, and merchandising. Intellectual property is vital in many such endeavors for both brands and sportspersons. One of the major values associated with sport is ethics. Fairness, equality, and basic concern for credit are crucial in this industry. This paper will focus mostly on issues pertaining to design, trademarks, and copyrights. The contribution of this paper would be to study different problems and identify the gaps that require legislative intervention and policymaking. This is important to help boost businesses and brands associated with this industry to help occupy spaces in the market.

Keywords: copyright, design, intellectual property, Indian landscape for sports law, patents, trademark, licensing, infringement

Procedia PDF Downloads 33
3238 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 492
3237 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 396
3236 Tussle of Intellectual Property Rights and Privacy Laws with Reference to Artificial Intelligence

Authors: Lipsa Dash, Gyanendra Sahu

Abstract:

Intelligence is the cornerstone of humans, and now they have created a counterpart of themselves artificially. Our understanding of the word intelligence is a very perspective based and mostly superior understanding of what we read, write, perceive and understand the adversities around better. A wide range of industrial sectors have also started involving the technology to perceive, reason and act. Similarly, intellectual property is the product of human intelligence and creativity. The World Intellectual Property Organisation is currently working on technology trends across the globe, and AI tops the list in the digital frontier that will have a profound impact on the world, transforming the way we live and work. Coming to Intellectual Property, patents and creations of the AI’s itself have constantly been in question. This paper explores whether AI’s can fit in the flexibilities of Trade Related Intellectual Property Studies and gaps in the existing IP laws or rthere is a need of amendment to include them in the ambit. The researcher also explores the right of AI’s who create things out of their intelligence and whether they could qualify to be legal persons making the other laws applicable on them. Differentiation between AI creations and human creations are explored in the paper, and the need of amendments to determine authorship, ownership, inventorship, protection, and identification of beneficiary for remuneration or even for determining liability. The humans and humanoids are all indulged in matters related to Privacy, and that attracts another constitutional legal issue to be addressed. The authors will be focusing on the legal conundrums of AI, transhumanism, and the Internet of things.

Keywords: artificial intelligence, humanoids, healthcare, privacy, legal conundrums, transhumanism

Procedia PDF Downloads 97
3235 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 98
3234 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 509
3233 A Forward-Looking View of the Intellectual Capital Accounting Information System

Authors: Rbiha Salsabil Ketitni

Abstract:

The entire company is a series of information among themselves so that each information serves several events and activities, and the latter is nothing but a large set of data or huge data. The enormity of information leads to the possibility of losing it sometimes, and this possibility must be avoided in the institution, especially the information that has a significant impact on it. In most cases, to avoid the loss of this information and to be relatively correct, information systems are used. At present, it is impossible to have a company that does not have information systems, as the latter works to organize the information as well as to preserve it and even saves time for its owner and this is the result of the speed of its mission. This study aims to provide an idea of an accounting information system that opens a forward-looking study for its manufacture and development by researchers, scientists, and professionals. This is the result of most individuals seeing a great contradiction between the work of an information system for moral capital and does not provide real values when measured, and its disclosure in financial reports is not distinguished by transparency.

Keywords: accounting, intellectual capital, intellectual capital accounting, information system

Procedia PDF Downloads 49
3232 Factors of Successful Transition of Individuals with Intellectual Disabilities from School to Employment

Authors: Mubarak S. Aldosari

Abstract:

Transition of adolescents with mild intellectual disabilities (ID) from secondary level to post-school employment level is a critical step for them and their families. Transition of adolescents with mild ID to post secondary levels faces serious difficulties and challenges. The current research highlighted the important factors related to the success of transition of students with mild ID to post-school employment such as vocational training, Self-determination skills, Social skills, and family involvement.

Keywords: adolescents with mild intellectual disabilities, post-school employment, vocational training, self-determination skills, social skills, family involvement

Procedia PDF Downloads 275
3231 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 521
3230 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 408
3229 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 478
3228 Human Security as a Tool of Protecting International Human Rights Law

Authors: Arenca Trashani

Abstract:

20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.

Keywords: human security, international human rights law, development, Albania, international law

Procedia PDF Downloads 728
3227 Nanocomplexes on the Base of Triterpene Saponins Isolated from Glycyrrhiza glabra and Saponaria officinalis Plants as an Efficient Adjuvants for Influenza Vaccine Use

Authors: Vladimir Berezin, Andrey Bogoyavlenskiy, Pavel Alexyuk, Madina Alexyuk, Aizhan Turmagambetova, Irina Zaitseva, Nadezhda Sokolova, Elmira Omirtaeva

Abstract:

Introduction: Triterpene saponins of plant origin are one of the most promising candidates for elaboration of novel adjuvants. Due to the combination of immunostimulating activity and the capacity interact with amphipathic molecules with formation of highly immunogenic nanocomplexes, triterpene saponins could serve as a good adjuvant/delivery system for vaccine use. In the research presented adjuvants on the base of nanocomplexes contained triterpene saponins isolated from Glycyrrhiza glabra and Saponaria officinalis plants indigenous to Kazakhstan were elaborated for influenza vaccine use. Methods: Purified triterpene saponins 'Glabilox' and 'SO1' with low toxicity and high immunostimulatory activity were isolated from plants Glycyrrhiza glabra L. and Saponaria officinalis L. by high-performance liquid chromatography (HPLC) and identified using electrospray ionization mass spectrometry (ESI-MS). Influenza virus A/St-Petersburg/5/09 (H1N1) propagated in 9-days old chicken embryos was concentrated and purified by centrifugation in sucrose gradient. Nanocomplexes contained lipids, and triterpene saponins Glabilox or SO1 were prepared by dialysis technique. Immunostimulating activity of experimental vaccine preparations was studied in vaccination/challenge experiments in mice. Results: Humoral and cellular immune responses and protection against influenza virus infection were examined after single subcutaneous and intranasal immunization. Mice were immunized subunit influenza vaccine (HA+NA) or whole virus inactivated influenza vaccine in doses 3.0/5.0/10.0 µg antigen/animal mixed with adjuvant in dose 15.0 µg/animal. Sera were taken 14-21 days following single immunization and mice challenged by A/St-Petersburg/5/09 influenza virus in dose 100 EID₅₀. Study of experimental influenza vaccine preparations in animal immunization experiments has shown that subcutaneous and intranasal immunization with subunit influenza vaccine mixed with nanocomplexes contained Glabilox or SO1 saponins stimulated high levels of humoral immune response (IgM, IgA, IgG1, IgG2a, and IgG2b antibody) and cellular immune response (IL-2, IL-4, IL-10, and IFN-γ cytokines) and resulted 80-90% protection against lethal influenza infection. Also, single intranasal and single subcutaneous immunization with whole virus inactivated influenza vaccine mixed with nanoparticulated adjuvants stimulated high levels of humoral and cellular immune responses and provided 100% protection against lethal influenza infection. Conclusion: The results of study have shown that nanocomplexes contained purified triterpene saponins Glabilox and SO1 isolated from plants indigenous to Kazakhstan can stimulate a broad spectrum of humoral and cellular immune responses and induce protection against lethal influenza infection. Both elaborated adjuvants are promising for incorporation to influenza vaccine intended for subcutaneous and intranasal routes of immunization.

Keywords: influenza vaccine, adjuvants, triterpene saponins, immunostimulating activity

Procedia PDF Downloads 110
3226 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: treaties, national security, Iran, Islamic Revolution

Procedia PDF Downloads 446