Search results for: Islamic social security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12426

Search results for: Islamic social security

11226 Building Care Networks for Patients with Life-Limiting Illnesses: Perspectives from Health Care and Social Service Providers

Authors: Lindy Van Vliet, Saloni Phadke, Anthea Nelson, Ann Gallant

Abstract:

Comprehensive and compassionate palliative care and support requires an integrated system of care that draws on formal health and social service providers working together with community and informal networks to ensure that patients and families have access to the care they need. The objective of this study is to further explore and understand the community supports, services, and informal networks that health care professionals and social service providers rely on to allow their patients to die in their homes and communities. Drawing on an interpretivist, exploratory, qualitative design, our multidisciplinary research team (medicine, nursing and social work) conducted interviews with 15 health care and social service providers in the Ottawa region. Interview data was audio-recorded, transcribed and analyzed using a reflexive thematic analysis approach. The data deepens our understandings of the facilitators and barriers that arise as health care and social service providers attempt to build networks of care for patients with life limiting illnesses and families. Three main findings emerged: First, the variability that arises due to systemic barriers in accessing and providing care; second, the exceptionally challenging workload that providers are facing as they work to address complex social care needs (housing, disability, food security), along with escalating palliative care needs; and, finally, the lack of structural support that providers and informal care networks receive. Conclusion: These findings will facilitate and build stronger person-centred/relationship-centred principles and practices between providers, patients, community, and informal care networks by highlighting the systemic barriers to accessing and providing person-centred care. Further, they will have important implications for future partnerships in integrated care delivery programs and initiatives, community policies, education programs, and provincial and national palliative care strategies.

Keywords: public health palliative care, palliative care nursing, care networks, informal care, integrated health care

Procedia PDF Downloads 100
11225 Examination of the Main Behavioral Patterns of Male and Female Students in Islamic Azad University

Authors: Sobhan Sobhani

Abstract:

This study examined the behavioral patterns of student and their determinants according to the "symbolic interaction" sociological perspective in the form of 7 hypotheses. Behavioral patterns of students were classified in 8 categories: religious, scientific, political, artistic, sporting, national, parents and teachers. They were evaluated by student opinions by a five-point Likert rating scale. The statistical population included all male and female students of Islamic Azad University, Behabahan branch, among which 600 patients (268 females and 332 males) were selected randomly. The following statistical methods were used: frequency and percentage, mean, t-test, Pearson correlation coefficient and multi-way analysis of variance. The results obtained from statistical analysis showed that: 1-There is a significant difference between male and female students in terms of disposition to religious figures, artists, teachers and parents. 2-There is a significant difference between students of urban and rural areas in terms of assuming behavioral patterns of religious, political, scientific, artistic, national figures and teachers. 3-The most important criterion for selecting behavioral patterns of students is intellectual understanding with the pattern. 4-The most important factor influencing the behavioral patterns of male and female students is parents followed by friends. 5-Boys are affected by teachers, the Internet and satellite programs more than girls. Girls assume behavioral patterns from books more than boys. 6-There is a significant difference between students in human sciences, technical, medical and engineering disciplines in terms of selecting religious and political figures as behavioral patterns. 7-There is a significant difference between students belonging to different subcultures in terms of assuming behavioral patterns of religious, scientific and cultural figures. 8-Between the first and fourth year students in terms of selecting behavioral patterns, there is a significant difference only in selecting religious figures. 9-There is a significant negative correlation between the education level of parents and the selection of religious and political figures and teachers. 10-There is a significant negative correlation between family income and the selection of political and religious figures.

Keywords: behavioral patterns, behavioral patterns, male and female students, Islamic Azad University

Procedia PDF Downloads 367
11224 Study Regarding Effect of Isolation on Social Behaviour in Mice

Authors: Ritu Shitak

Abstract:

Humans are social mammals, of the primate order. Our biology, behaviour, and pathologies are unique to us. In our desire to understand, reduce solitary confinement one source of information is the many reports of social isolation of other social mammals, especially primates. A behavioural study was conducted in the department of pharmacology at Indira Gandhi Medical College, Shimla in Himachal Pradesh province in India using white albino mice. Different behavioural parameters were observed by using open field, tail suspension, tests for aggressive behaviour and social interactions and the effect of isolation was studied. The results were evaluated and the standard statistics were applied. The said study was done to establish facts that isolation itself impairs social behaviour and can lead to alcohol dependence as well as related drug dependence.

Keywords: social isolation, albino mice, drug dependence, isolation on social behaviour

Procedia PDF Downloads 476
11223 Focalization Used as a Narrative Strategy Mirroring Fadia Faqir’s Ideology in Pillars of Salt 1996

Authors: Malika Hammouche

Abstract:

The novel Pillars of Salt, written by Fadia Faqir in 1996, is a good example where storytelling is utilized as a traditional material to underline the author’s womanist ideology. A study of narrative could be fruitfully combined with that of ideology in this case. This combination could be demonstrated through the narrative technique used by Fadia Faqir in Pillars of Salt (1996), reflecting her anti-colonial ideology. The first step of this work will highlight the storyteller’s narrative in the novel representing, on the one hand, the imperial voice, and on the other exoticism and orientalism. The second step will demonstrate how Faqir’s narrative technique uses focalization as a narratological tool to negotiate her space. Faqir gives a voice to the female protagonist of the novel within the androcentric bias of Arab narrative theory to point to and amend the orientalist discourse typical to colonial literature. The orientalist discourse is represented through the voice of the storyteller in the novel. The juxtaposition of the storyteller’s and the female protagonist narratives is borrowed from the Arab literary background. It is a postcolonial counter-discursive strategy used by the author as a traditional material to underline her Arabo Islamic Womanist ideology in this novel.

Keywords: Arabo Islamic womanism, focalization, ideology, narrative technique, orientalist

Procedia PDF Downloads 242
11222 The Construction of Women’s Leadership in the Swedish Armed Forces in the Context of the Women, Peace and Security Agenda

Authors: Sofia Sutera

Abstract:

Despite the introduction of the Women, Peace, and Security (WPS) Agenda in 2000, thanks to the UNSCR 1325 and subsequent resolutions, and the clear stance of the UN towards the support of increased participation of women in peace and security processes, women’s leadership in this context remains very low. Considering specifically the framework of peacekeeping operations, the aim of this paper is to analyze the way women’s leadership is constructed in the Swedish Armed Forces (SAF). In the context of the WPS Agenda, Sweden has been chosen as a case study because of the relevance of its singular feminist policies (the statement in 2014 from Wallström, previous and current Minister for Foreign Affairs and Deputy Prime Minister, that Sweden is pursuing a feminist foreign policy is a clear example). Moreover, the SAF adopted in 2016 the Handbok Gender. This policy addresses explicitly the gender perspective embraced by the Swedish military institution, a sui-generis organization even in the Scandinavian reality. Indeed, the SAF has assumed a clear commitment to represent its institution as gender aware and gender equal. The theoretical perspective utilized in this research, which focuses specifically on women, is feminism and particularly a feminist constructivist approach, with an institutional focus on the military institution, has been chosen. Taking into account the specificity of the feminist research, the above-mentioned gender policy has been examined by means of a critical discourse analysis (CDA) whose main aim is to investigate the social structures of discourse and the power relationships inherent to it. Thus, CDA appears to be quite relevant in order to understand the construction of women’s leadership in the Handbok Gender. Nevertheless, even in a country which officially identifies as feminist and which is characterized by a peculiar military institution, the conclusions of this analysis revealed that women’s leadership in peacekeeping operations remains very low.

Keywords: feminism, peacekeeping operations, swedish armed forces, UNSCR 1325, women's leadership, WPS agenda

Procedia PDF Downloads 138
11221 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks

Authors: Mehmet Karaata

Abstract:

Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.

Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security

Procedia PDF Downloads 450
11220 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 144
11219 Social Media Utilisation and Addiction among Students in Nigerian Universities

Authors: Kolawole Akinjide Aramide, Razaq Oyewo

Abstract:

This study investigates social media utilisation and addiction among students in Nigerian universities. Three hundred and twenty seven (327) students were randomly selected across five selected universities in Nigeria but only 215 provided useful responses for the study. The study revealed regular use of social media for the purpose of communicating and connecting with friends only while Picassa, Twitter, Flickr, Youtube, MySpace, Blogger, Linkedln and LibraryThing were found to top the list of social media being used on regular basis by the students. The level of social media addiction among the students was found to be low. A significant difference was established between undergraduate and postgraduate students’ utilization of social media as the undergraduate students were found to utilise social media more than the postgraduate students. However, no significant difference was found in the level of addiction to social media between the undergraduate and postgraduate students.

Keywords: social media utilisation, social media addiction, Nigerian students, universities

Procedia PDF Downloads 513
11218 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 167
11217 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa

Authors: Kenneth Azaigba

Abstract:

The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.

Keywords: Africa, conflicts, pattern, war

Procedia PDF Downloads 394
11216 English Syllabus in the Iranian Education System

Authors: Shaghayegh Mirshekari, Atiyeh Ghorbani

Abstract:

EThe Iranian system of education has been politically influenced by the thoughts of the governing religious party. It has brought many religious books into the educational system from grade one up to graduation from high school, and therefore, teaching English as a non-Islamic language has been put aside the system, focusing on the Islamic language of Arabic. Teaching English has been widely talked about in international academia, but the Iranian educational system has not brought in any of its outcomes due to the general policy of keeping people away from international Western thoughts. Because of the increasing interest among Iranians in learning English, this language is being taught and studied in public and private schools, commercial and adult schools, language institutes, colleges, universities, and numerous homes throughout the country. Methods and techniques of teaching English, the attitude of the teachers and learners towards the language, and the availability of textbooks and other language materials are quite different in any one of the different institutions. This paper has evaluated the outcome of the Iranian educational system in teaching English in terms of their methods of teaching, as well as the policies regarding the educational system. The results show that not only has there been no progress in the system in terms of teaching English, rather there is backwardness in this regard due to the political policy of preventing people from learning English. Therefore, we see the majority of the youth not speaking English properly at the age where they need to enter the international arena.

Keywords: English, public school, language, Iran, teaching

Procedia PDF Downloads 71
11215 A Goal-Oriented Social Business Process Management Framework

Authors: Mohammad Ehson Rangiha, Bill Karakostas

Abstract:

Social Business Process Management (SBPM) promises to overcome limitations of traditional BPM by allowing flexible process design and enactment through the involvement of users from a social community. This paper proposes a meta-model and architecture for socially driven business process management systems. It discusses the main facets of the architecture such as goal-based role assignment that combines social recommendations with user profile, and process recommendation, through a real example of a charity organization.

Keywords: business process management, goal-based modelling, process recommendation social collaboration, social BPM

Procedia PDF Downloads 496
11214 To Live on the Margins: A Closer Look at the Social and Economic Situation of Illegal Afghan Migrants in Iran

Authors: Abdullah Mohammadi

Abstract:

Years of prolong war in Afghanistan has led to one of the largest refugee and migrant populations in the contemporary world. During this continuous unrest which began in 1970s (by military coup, Marxist revolution and the subsequent invasion of USSR), over one-third of the population migrated to neighboring countries, especially Pakistan and Iran. After the Soviet Army withdrawal in 1989, a new wave of conflicts emerged between rival Afghan groups and this led to new refugees. Taliban period, also, created its own refugees. During all these years, I.R. of Iran has been one of the main destinations of Afghan refugees and migrants. At first, due to the political situation after Islamic Revolution, Iran government didn’t restrict the entry of Afghan refugees. Those who came first in Iran received ID cards and had access to education and healthcare services. But in 1990s, due to economic and social concerns, Iran’s policy towards Afghan refugees and migrants changed. The government has tried to identify and register Afghans in Iran and limit their access to some services and jobs. Unfortunately, there are few studies on Afghan refugees and migrants’ situation in Iran and we have a dim and vague picture of them. Of the few studies done on this group, none of them focus on the illegal Afghan migrants’ situation in Iran. Here, we tried to study the social and economic aspects of illegal Afghan migrants’ living in Iran. In doing so, we interviewed 24 illegal Afghan migrants in Iran. The method applied for analyzing the data is thematic analysis. For the interviews, we chose family heads (17 men and 7 women). According to the findings, illegal Afghan migrants’ socio-economic situation in Iran is very undesirable. Its main cause is the marginalization of this group which is resulted from government policies towards Afghan migrants. Most of the illegal Afghan migrants work in unskilled and inferior jobs and live in rent houses on the margins of cities and villages. None of them could buy a house or vehicle due to law. Based on their income, they form one of the lowest, unprivileged groups in the society. Socially, they face many problems in their everyday life: social insecurity, harassment and violence, misuse of their situation by police and people, lack of education opportunity, etc. In general, we may conclude that illegal Afghan migrant have little adaptation with Iran’s society. They face severe limitations compared to legal migrants and refugees and have no opportunity for upward social mobility. However, they have managed some strategies to face these difficulties including: seeking financial and emotional helps from family and friendship networks, sending one of the family members to third country (mostly to European countries), establishing self-administered schools for children (schools which are illegal and run by Afghan educated youth).

Keywords: illegal Afghan migrants, marginalization, social insecurity, upward social mobility

Procedia PDF Downloads 320
11213 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 112
11212 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 340
11211 Profiling the Food Security Status of Farming Households in Chanchaga Area of Nigeria’s Guinea Savana

Authors: Olorunsanya E. O., Adedeji S. O., Anyanwu A. A.

Abstract:

Food insecurity is a challenge to many nations Nigeria inclusive. It is increasingly becoming a major problem among farm households due to many factors chief of which is low labour productivity. This study therefore profiles the food security status of a representative randomly selected 90 farming households in Chanchaga area of Nigeria’s Guinea Savana using structured interview schedule Descriptive and inferential statistics were used as analytical tools for the study. The results of the descriptive statistics show that majority (35.56%) of the surveyed household heads fall within the age range of 40 – 49 years and (88.89%) are male while (78.89) are married. More than half of the respondents have formal education. About 43.3% of the household heads have farm experience of 11- 20 years and a modal household size class range of 7 – 12. The results further reveal that majority (68.8%) earned more than N12, 500 (22.73 US Dollar) per month. The result of households’ food expenditure pattern reveals that an average household spends about N3, 644.44 (6.63 US Dollar) on food and food items on a weekly basis. The result of the analysis of food diversity intake in the study area shows that 63.33% of the sampled households fell under the low household food diversity intake, while 33 households, representing 36.67% ranks high in term of household food diversity intake. The result for the food security status shows that the sampled population was food secure (58.89%) while 41.11% falls below the recommended threshold. The result for the logistics regression model shows that age, engagement in off farm employment and household size are significant in determining the food security status of farm household in the study area. The three variables were significant at 10%, 5% and 1% respectively. The study therefore recommends among others, that measures be put in place by stakeholders to make agriculture attractive for youth since age is a significant determinant of food security in the study area. Awareness should also be created by stakeholders on the needs for effective family planning methods to be adopted by farm household in the study area.

Keywords: Niger State, Guinea Savana, food diversity, logit regression model and food security

Procedia PDF Downloads 110
11210 Feasibility Study of Iraq' Decomposition and Its Effects on the Region

Authors: Ebrahim Rahmani, Siyamak Moazeni

Abstract:

According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.

Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan

Procedia PDF Downloads 334
11209 Conceptualizing Psycho-Social Intervention with Juvenile Offenders as Attachment Therapy: A Practical Approach

Authors: Genziana Lay

Abstract:

A wide majority of older children and adolescents who enter the juvenile court system present with an array of problematic symptoms and behaviors including anxiety, depression, aggressive acting out, detachment, and substance abuse. Attachment theory offers a framework for understanding normative and pathological functioning, which during development is influenced by emotional, social and cognitive elements. There is clear evidence that children and adolescents with the highest risk of developing adaptation problems present an insecure attachment profile. Most offending minors have experienced dysfunctional family relationships as well as social and/or economic deprivation. Their maladaptive attachment develops not only through their relationship with caregivers but with the environment at large. Activation of their faulty attachment system leads them to feel emotionally overwhelmed and engage in destructive behaviors and decision-making. A psycho-social intervention with this population conceptualized as attachment therapy is a multi-faceted, practical approach that has shown excellent results in terms of increased psychological well-being and drastically reduced rates of re-offense/ destructive behavior. Through several; components including psychotherapy, monitoring, volunteering, meditation and socialization, the program focuses on seven dimensions: self-efficacy, responsibility, empathy/reparation, autonomy/security, containment/structure, insight building, and relational health. This paper presents the program and illustrates how the framework of attachment theory practically applied to psycho-social intervention has great therapeutic and social reparation potential. Preliminary evidence drawn from the Sassari Juvenile Court is very promising; this paper will illustrate these results and propose an even more comprehensive, applicable approach to psycho-social reparative intervention that leads to greater psychological health and reduced recidivism in the child and adolescent population.

Keywords: attachment, child, adolescent, crime, juvenile, psychosocial

Procedia PDF Downloads 174
11208 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 272
11207 Social Information Seeking: Studying the Effect of Question Type on Responses in Social Q&A Sites

Authors: Arshia Ayoub, Zahid Ashraf Wani

Abstract:

With the introduction of online social Q&A sites, people are able to reach each other efficiently for information seeking and simultaneously creating social bonds. There prevails an issue of low or no response for some questions posed by an information seeker on these sites. So this study tries to understand the effect of question type on responses in Social Q & A sites. The study found that among the answered queries, majority of them were answered within 24 hours of posting the questions and surprisingly most replies were received within one hour of posting. It was observed that questions of general information type were most likely to be answered followed by verification type.

Keywords: community‐based services, information seeking, social search, social Q&A site

Procedia PDF Downloads 179
11206 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 553
11205 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 649
11204 The Application of Nuclear Energy for Sustainable Agriculture and Food Security: A Review

Authors: Gholamreza Farrokhi, Behzad Sani

Abstract:

The goals of sustainable agricultural are development, improved nutrition, and food security. Sustainable agriculture must be developed that will meet today’s needs for food and other products, as well as preserving the vital natural resource base that will allow future generations to meet their needs. Sustainable development requires international cooperation and the effective use of technology. Access to sustainable sources of food will remain a preeminent challenge in the decades to come. Based upon current practice and consumption, agricultural production will have to increase by about 70% by 2050 to meet demand. Nuclear techniques are used in developing countries to increase production sustainably by breeding improved crops, enhancing livestock reproduction and nutrition, as well as controlling animal and plant pests and diseases. Post-harvest losses can be reduced and safety increased with nuclear technology. Soil can be evaluated with nuclear techniques to conserve and improve soil productivity and water management.

Keywords: food safety, food security, nuclear techniques, sustainable agriculture, sustainable future

Procedia PDF Downloads 363
11203 Enhancing Project Success: A Case Study of Investment Strategies and Planning Practices in Rwanda’s Housing Projects Managed by Rwanda Social Security Board

Authors: Amina Umulisa

Abstract:

Background: Despite efforts to enhance profitability and project planning, Rwanda has experienced a decline in project success rates, notably in housing projects managed by the Rwanda Social Security Board (RSSB). This study aims to assess the impact of investment strategies and project planning practices on the performance of pension funds projects in Rwanda, focusing on housing projects by RSSB. Methods: Using descriptive and correlational research designs, this study surveyed 109 randomly selected respondents from a pool of 148 workers. Data analysis was conducted using descriptive and inferential statistics in STATA version 18. Results: Findings revealed that 54% of respondents acknowledged the importance of personnel generation. Additionally, 61% agreed with the effectiveness of training programs, and 79% supported the cost of human resource utilization. In terms of project management practices, 65.7% could determine when a project needed adjustments, 65.7% agreed with the approved budget, and 73% supported forecasted expenses. Furthermore, 68% agreed with order placement, 76.0% with using the right materials, and 64.4% with defining project scope. The study found significant associations between order placement and project quality outcomes (r=0.711, P-value <0.001), as well as with time management (Pearson was 0.701 and sing was 0.00) and cost management (r=0.885, P-value <0.001). Moreover, project time targets were found to significantly affect quality management (Pearson was 0.798, sing was 0.000), time management, and cost management (r=0.740, P-value <0.001). Conclusion: The findings highlight the positive association between the project implementation stage and quality management, indicating effective project planning practices among senior staff. However, there is a need to enhance project team collaboration and coordination to improve the performance of constructed houses.

Keywords: project success rates, investment strategies, training programs, cost management

Procedia PDF Downloads 59
11202 Computational Approaches for Ballistic Impact Response of Stainless Steel 304

Authors: A. Mostafa

Abstract:

This paper presents a numerical study on determination of ballistic limit velocity (V50) of stainless steel 304 (SS 304) used in manufacturing security screens. The simulated ballistic impact tests were conducted on clamped sheets with different thicknesses using ABAQUS/Explicit nonlinear finite element (FE) package. The ballistic limit velocity was determined using three approaches, namely: numerical tests based on material properties, FE calculated residual velocities and FE calculated residual energies. Johnson-Cook plasticity and failure criterion were utilized to simulate the dynamic behaviour of the SS 304 under various strain rates, while the well-known Lambert-Jonas equation was used for the data regression for the residual velocity and energy model. Good agreement between the investigated numerical methods was achieved. Additionally, the dependence of the ballistic limit velocity on the sheet thickness was observed. The proposed approaches present viable and cost-effective assessment methods of the ballistic performance of SS 304, which will support the development of robust security screen systems.

Keywords: ballistic velocity, stainless steel, numerical approaches, security screen

Procedia PDF Downloads 170
11201 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand

Authors: John Battersby, Rhys Ball

Abstract:

After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.

Keywords: academic, counter terrorism, intelligence, practitioner, research, security

Procedia PDF Downloads 114
11200 Medical Social Work: Connotation, Prospects, and Challenges in Pakistan

Authors: Syeda Mahnaz Hassan

Abstract:

Social work as a specialized field, grounded in scientific knowledge and skills, is more inclined towards problem-solving process rather than charity focused approach. Medical social work, as a primary method, deals with the bio-psychosocial-spiritual elements of an individual with a problem and assesses the pliability and strength of the patients, social support systems, and their families, to assist the patients to resolve their problems independently. The medical social worker, also known as case-worker or care-worker, has to play a substantial role in the rehabilitation and retrieval of an affected person. This paper examines the roles played and responsibilities discharged by the Medical Social Workers internationally and specifically concerning Pakistan. The capacity constraints and challenges confronted by Medical Social Workers in hospitals have also been highlighted, and some policy implications have been suggested to enhance the capabilities of Medical Social Workers for serving the patients in a befitting manner.

Keywords: medical social work, Pakistan, patients, rehabilitation

Procedia PDF Downloads 367
11199 Distinguishing Substance from Spectacle in Violent Extremist Propaganda through Frame Analysis

Authors: John Hardy

Abstract:

Over the last decade, the world has witnessed an unprecedented rise in the quality and availability of violent extremist propaganda. This phenomenon has been fueled primarily by three interrelated trends: rapid adoption of online content mediums by creators of violent extremist propaganda, increasing sophistication of violent extremist content production, and greater coordination of content and action across violent extremist organizations. In particular, the self-styled ‘Islamic State’ attracted widespread attention from its supporters and detractors alike by mixing shocking video and imagery content in with substantive ideological and political content. Although this practice was widely condemned for its brutality, it proved to be effective at engaging with a variety of international audiences and encouraging potential supporters to seek further information. The reasons for the noteworthy success of this kind of shock-value propaganda content remain unclear, despite many governments’ attempts to produce counterpropaganda. This study examines violent extremist propaganda distributed by five terrorist organizations between 2010 and 2016, using material released by the ‎Al Hayat Media Center of the Islamic State, Boko Haram, Al Qaeda, Al Qaeda in the Arabian Peninsula, and Al Qaeda in the Islamic Maghreb. The time period covers all issues of the infamous publications Inspire and Dabiq, as well as the most shocking video content released by the Islamic State and its affiliates. The study uses frame analysis to distinguish thematic from symbolic content in violent extremist propaganda by contrasting the ways that substantive ideology issues were framed against the use of symbols and violence to garner attention and to stylize propaganda. The results demonstrate that thematic content focuses significantly on diagnostic frames, which explain violent extremist groups’ causes, and prognostic frames, which propose solutions to addressing or rectifying the cause shared by groups and their sympathizers. Conversely, symbolic violence is primarily stylistic and rarely linked to thematic issues or motivational framing. Frame analysis provides a useful preliminary tool in disentangling substantive ideological and political content from stylistic brutality in violent extremist propaganda. This provides governments and researchers a method for better understanding the framing and content used to design narratives and propaganda materials used to promote violent extremism around the world. Increased capacity to process and understand violent extremist narratives will further enable governments and non-governmental organizations to develop effective counternarratives which promote non-violent solutions to extremists’ grievances.

Keywords: countering violent extremism, counternarratives, frame analysis, propaganda, terrorism, violent extremism

Procedia PDF Downloads 175
11198 Water Access and Food Security: A Cross-Sectional Study of SSA Countries in 2017

Authors: Davod Ahmadi, Narges Ebadi, Ethan Wang, Hugo Melgar-Quiñonez

Abstract:

Compared to the other Least Developed Countries (LDCs), major countries in sub-Saharan Africa (SSA) have limited access to the clean water. People in this region, and more specifically females, suffer from acute water scarcity problems. They are compelled to spend too much of their time bringing water for domestic use like drinking and washing. Apart from domestic use, water through affecting agriculture and livestock contributes to the food security status of people in vulnerable regions like SSA. Livestock needs water to grow, and agriculture requires enormous quantities of water for irrigation. The main objective of this study is to explore the association between access to water and individuals’ food security status. Data from 2017 Gallup World Poll (GWP) for SSA were analyzed (n=35,000). The target population in GWP is the entire civilian, non-institutionalized, aged 15 and older population. All samples selection is probability based and nationally representative. The Gallup surveys an average of 1,000 samples of individuals per country. Three questions related to water (i.e., water quality, availability of water for crops and availability of water for livestock) were used as the exposure variables. Food Insecurity Experience Scale (FIES) was used as the outcome variable. FIES measures individuals’ food security status, and it is composed of eight questions with simple dichotomous responses (1=Yes and 0=No). Different statistical analyses such as descriptive, crosstabs and binary logistic regression, form the basis of this study. Results from descriptive analyses showed that more than 50% of the respondents had no access to enough water for crops and livestock. More than 85% of respondents were categorized as “food insecure”. Findings from cross-tabulation analyses showed that food security status was significantly associated with water quality (0.135; P=0.000), water for crops (0.106; P=0.000) and water for livestock (0.112; P=0.000). In regression analyses, the probability of being food insecure increased among people who expressed no satisfaction with water quality (OR=1.884 (OR=1.768-2.008)), not enough water for crops (OR=1.721 (1.616-1.834)) and not enough water for livestock (OR=1.706 (1.819)). In conclusion, it should note that water access affects food security status in SSA.

Keywords: water access, agriculture, livestock, FIES

Procedia PDF Downloads 155
11197 Tanzanian Food Origins and Protected Geographical Indications

Authors: Innocensia John, Henrik Egelyng, Razack Lokina

Abstract:

As the world`s population is constantly growing, food security has become a thorny trending issue. The impact has particularly been felt more in Africa as most of the people depend on food Agriculture products. Geographical Indications can aid in transforming the Tanzania agriculture-dependent economy through tapping the unique attributes of their quality products like soil, taste color etc. Consumers worldwide demand more uniquer products featuring a ´connect´ with the land use systems producing particular qualities. Tanzania has demonstrated the capacity to tap into the organic world market and has untapped potential for harvesting market value from geographical indications. This paper presents preliminary results from VALOR — a research project investigating conditions under which Tanzanian origin food producers can add value by incorporating territory specific cultural, environmental and social qualities into marketing, production and processing of unique local, niche and specialty products. Cases are investigated of the prospects for Tanzania to leapfrog perhaps into exports of geographical indications products, and certainly into allowing smallholders to create employment and build monetary value, while stewarding local food cultures and natural environments and resources, and increasing the diversity of supply of natural and unique quality products and so contribute to enhanced food security. Rice from Kyela, coffee and Sugar from Kilimanjaro, are some of the product cases investigated and provides for the in-depth case study, as ´landscape´ products incorporating ´taste of place´. Framework conditions for producers creating or capturing market value as stewards of cultural and landscape values and environments and institutional requirements for such creation or capturing to happen, including presence of export opportunities, are discussed.

Keywords: food origins, food security, protected geographical indications, case study analysis

Procedia PDF Downloads 306