Search results for: national security exception
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7120

Search results for: national security exception

5860 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 335
5859 Mainstreaming Climate Change Adaptation into National and Sectoral Policies in Nepal

Authors: Bishwa Nath Oli

Abstract:

Nepal is highly impacted by climate change and adaptation has been a major focus. This paper investigates the gaps and coherence in national policies across water, forestry, local development and agriculture sectors, identifies their links to climate change adaptation and national development plans and analyzes the effectiveness of climate change policy on adaptation. The study was based on a content analysis of relevant policy documents on the level of attention given to adaptation and key informant interviews. Findings show that sectoral policies have differing degrees of cross thematic coherence, often with mismatched priorities and differing the paths towards achieving climate change goal. They are somewhat coherent in addressing immediate disaster management issues rather than in climate adaptation. In some cases, they are too broad and complicated and the implementation suffers from barriers and limits due to lack of capacity, investment, research and knowledge needed for evidence-based policy process. They do not adequately provide operational guidance in supporting communities in adapting to climate change. The study recommends to a) embrace longer-term cross-sectoral planning within government structures to foster greater policy coherence and integrated adaptation planning, b) increase awareness and flow of information on the potential role of communities in climate change, c) review the existing development sectors from the climate change perspectives, and d) formulate a comprehensive climate change legislation based on the need to implement the new Constitution.

Keywords: agriculture, climate change adaptation, forestry, policies

Procedia PDF Downloads 222
5858 Resilient Security System with Toll Free Call Services: Case Study of Adama City

Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein

Abstract:

Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.

Keywords: smart, safety, crime, call center, security

Procedia PDF Downloads 55
5857 Biotechnology Sector in the Context of National Innovation System: The Case of Norway

Authors: Parisa Afshin, Terje Grønning

Abstract:

Norway, similar to many other countries, has set the focus of its policies in creating new strong and highly innovative sectors in recent years, as the oil and gas sector profitability is declining. Biotechnology sector in Norway has a great potential, especially in marine-biotech and cancer medicine. However, Norway being a periphery faces especial challenges in the path of creating internationally well-known biotech sector and an international knowledge hub. The aim of this article is to analyze the progress of the Norwegian biotechnology industry, its pathway to build up an innovation network and conduct collaborative innovation based on its initial conditions and its own advantage and disadvantages. The findings have important implications not only for politicians and academic in understanding the infrastructure of biotechnology sector in the country, but it has important lessons for other periphery countries or regions aiming in creating strong biotechnology sector and catching up with the strong internationally-recognized regions. Data and methodology: To achieve the main goal of this study, information has been collected via secondary resources such as web pages and annual reports published by the officials and mass media along with interviews were used. The data were collected with the goal to shed light on a brief history and current status of Norway biotechnology sector, as well as geographic distribution of biotech industry, followed by the role of academic and industry collaboration and public policies in Norway biotech. As knowledge is the key input in innovation, knowledge perspective of the system such as knowledge flow in the sector regarding the national and regional innovation system has been studied. Primary results: The internationalization has been an important element in development of periphery regions' innovativeness enabling them to overcome their weakness while putting more weight on the importance of regional policies. Following such findings, suggestions on policy decision and international collaboration, regarding national and regional system of innovation, has been offered as means of promoting strong innovative sector.

Keywords: biotechnology sector, knowledge-based industry, national innovation system, regional innovation system

Procedia PDF Downloads 225
5856 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations

Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang

Abstract:

Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.

Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security

Procedia PDF Downloads 359
5855 Efficient Internal Generator Based on Random Selection of an Elliptic Curve

Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche

Abstract:

The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.

Keywords: PRNG, security, cryptosystem, ECC

Procedia PDF Downloads 444
5854 Mitigating Denial of Service Attacks in Information Centric Networking

Authors: Bander Alzahrani

Abstract:

Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.

Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network

Procedia PDF Downloads 198
5853 Enterprise Harmonic Fusion as National Sustainability

Authors: L. R. Valencia Pérez, J. M. Peña Aguilar, Valencia Pérez, Héctor Fernando, Lamadrid A. Alberto, Vivanco V. Martín

Abstract:

Cosmology is a discipline commonly linked to philosophy. In this work, we show cosmology, from a perspective that can provide some proposals to help develop SMB in Mexico. We start from the belief that, in a complex world, the solutions to problems must nurture from different approaches. In order to be able to do this, we need to change our point of reference and use theoretical proposals and methodologies that came from other disciplines; in this case, we will try to show that between philosophy and administration exist dialogs that need to be incentivized. The work is structured in three parts. In the first one, we create a description of cosmology and how it could be applied to business. In the second, we show some of the most common problems that the SMB suffer from and in the third, we present a proposal of how cosmology can help improve the development. Finally, we concluded that better understanding of real needs, integration of knowledge at large scale and using information technologies within the cosmology framework presentment could make a difference.

Keywords: harmonic fusion, national sustainability, financial management, triple helix

Procedia PDF Downloads 394
5852 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 149
5851 Professional Competences of E-Learning Lecturers: Case of Russian National Platforms of Open Education

Authors: Polina Pekker

Abstract:

This work analyzes the role of lecturers in e-learning in Russia. It is based on qualitative research of lecturers who conduct courses on Russian national platforms of open education. The platform is based on edx software (provider of massive open online courses). The interviews with e-learning lecturers were conducted: from December 2015 till January 2016 and from April 2016 till May 2016. The results of interviews (face-to-face, telephone, skype) show, firstly, the difference between the role of lecturers in e-learning and in traditional education and, secondly, that the competition between lecturers is high in Russia. The results of interviews in Russia show that e-learning lecturer should have several special professional competences: the ability to keep attention of audiences without real contact, the ability to work on camera and competences related with e-learning course support (test, forum, communication on forum and etc.) It is concluded that lecturers need special course on acting and speech skills and on conducting and organizing of e-learning course in Russia. It is planned to conduct French study. When results from French research will be totally ready, they will be compared to Russian. As well French platform, France Universite Numerique, was launched earlier, in January 2014, so Russian lecturers should get best practice from the French colleagues.

Keywords: e-courses lecturer, e-learning, professional competences of lecturers, national Russian and French platforms of open education

Procedia PDF Downloads 192
5850 Protection towards Investor: Enforcement of the Authorities of Indonesian Financial Services Authority (OJK) during Capital Market Integration

Authors: Muhammad Ilham Agus Salim, Muhammad Ikbal

Abstract:

The ASEAN Economic Community (AEC) was set up in 2003 with the objectives of creating a single market and production base, enhancing equitable economic development as well as facilitating the integration into the global economy. The AEC involves liberalization and facilitation of trade in goods, skilled labour, services, and investment, as well as protection and promotion of investment. The thesis outlines the AEC Blueprint actions in scope of globalization of investment and capital market. Free flows of investment and freer flows of capital market urge countries in South East Asia to coordinate and to collaborate in securing the interest of public, and this leads to the importance of financial services authorities in ASEAN to prepare the mechanism of guarding the flows of investment. There is no exception, especially for Indonesian Financial Services Authority (OJK) as one of the authorized body in capital market supervision, to enforce its authorities as supervisory body.

Keywords: AEC blueprint, OJK, capital market, integration

Procedia PDF Downloads 312
5849 Usability and Biometric Authentication of Electronic Voting System

Authors: Nighat Ayub, Masood Ahmad

Abstract:

In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.

Keywords: e-voting, security, usability, authentication

Procedia PDF Downloads 392
5848 Fundamentals and Techniques of Organic Agriculture in Egypt

Authors: Moustafa Odah

Abstract:

Organic Agriculture is a new and sustainable agricultural system that depends on the use of organic materials from within the farm resulting from crop residues and animal husbandry and the cultivation of leguminous crops, away from the use of chemicals in fertilization or pest resistance, which leads to the production of safe, clean and healthy food products with nutritional value high and free of chemicals enhance food security; it is also an agricultural model preserve natural resources by improving the fertility and soil characteristics, and enhance biodiversity and biological cycles; additionally, they preserve the environment from pollution, which makes it play an important role in providing food needs of the present generations and the preservation of the rights of the coming generations to achieve sustainable development.

Keywords: organic agriculture, food security and achieving sustainable development, fertilization or pest resistance, crop residues and animal husbandry and the cultivation of leguminous crops

Procedia PDF Downloads 83
5847 Importance of Ethics in Cloud Security

Authors: Pallavi Malhotra

Abstract:

This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.

Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education

Procedia PDF Downloads 325
5846 The Business of American Football: The Kicker Position and Performance to Salary Correlation

Authors: James R. Ogden, Denise T. Ogden

Abstract:

The National Football League (USA) is the largest sporting business in the United States. In order to generate revenue, it is important that NFL teams win. Coaches, owners and general managers of the NFL teams want to create powerful teams with reliable players and they are willing to spend large amounts of money in order to do so. This research looks at one of the National Football League’s key players, the kicker. It would be intuitively obvious to suggest that those kickers who perform the best get paid the most. In this paper the researchers performed a correlation and regression analysis to determine if there is a correlation between an NFL kicker’s field goal percentage and salary. The research proposition was that higher performing kickers receive higher salaries. The data suggest that there is no correlation between salary and on-field performance.

Keywords: business management, sports marketing, tourism, American football

Procedia PDF Downloads 305
5845 Similarities and Differences in Values of Young Women and Their Parents: The Effect of Value Transmission and Value Change

Authors: J. Fryt, K. Pietras, T. Smolen

Abstract:

Intergenerational similarities in values may be effect of value transmission within families or socio-cultural trends prevailing at a specific point in time. According to salience hypothesis, salient family values may be transmitted more frequently. On the other hand, many value studies reveal that generational shift from social values (conservation and self-transcendence) to more individualistic values (openness to change and self-enhancement) suggest that value transmission and value change are two different processes. The first aim of our study was to describe similarities and differences in values of young women and their parents. The second aim was to determine which value similarities may be due to transmission within families. Ninety seven Polish women aged 19-25 and both their mothers and fathers filled in the Portrait Value Questionaire. Intergenerational similarities in values between women were found in strong preference for benevolence, universalism and self-direction as well as low preference for power. Similarities between younger women and older men were found in strong preference for universalism and hedonism as well as lower preference for security and tradition. Young women differed from older generation in strong preference for stimulation and achievement as well as low preference for conformity. To identify the origin of intergenerational similarities (whether they are the effect of value transmission within families or not), we used the comparison between correlations of values in family dyads (mother-daughter, father-daughter) and distribution of correlations in random intergenerational dyads (random mother-daughter, random father-daughter) as well as peer dyads (random daughter-daughter). Values representing conservation (security, tradition and conformity) as well as benevolence and power were transmitted in families between women. Achievement, power and security were transmitted between fathers and daughters. Similarities in openness to change (self-direction, stimulation and hedonism) and universalism were not stronger within families than in random intergenerational and peer dyads. Taken together, our findings suggest that despite noticeable generation shift from social to more individualistic values, we can observe transmission of parents’ salient values such as security, tradition, benevolence and achievement.

Keywords: value transmission, value change, intergenerational similarities, differences in values

Procedia PDF Downloads 429
5844 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 525
5843 IT and Security Experts' Innovation and Investment Front for IT-Entrepreneurship in Pakistan

Authors: Ahmed Mateen, Zhu Qingsheng, Muhammad Awais, Muhammad Yahya Saeed

Abstract:

This paper targets the rising factor of entrepreneurship innovation, which lacks in Pakistan as compared to the other countries or the regions like China, India, and Malaysia, etc. This is an exploratory and explanatory study. Major aspects have identified as the direction for the policymakers while highlighting the issues in true spirit. IT needs to be considered not only as a technology but also as itself growing as a new community. IT management processes are complex and broad, so generally requires extensive attention to the collective aspects of human variables, capital and technology. In addition, projects tend to have a special set of critical success factors, and if these are processed and given attention, it will improve the chances of successful implementation. This is only possible with state of the art intelligent decision support systems and accumulating IT staff to some extent in decision processes. This paper explores this issue carefully and discusses six issues to observe the implemented strength and possible enhancement.

Keywords: security and defense forces, IT-incentives, big IT-players, IT-entrepreneurial-culture

Procedia PDF Downloads 220
5842 A Guidance to Enhance the Risk Culture among the Organizations

Authors: Najeebah Almahmeed

Abstract:

Risk Management is an evolving subject among organizations that include corporations, governments, non-governmental organizations, and not-for-profit corporations. In order to enhance awareness around the importance of Risk Management and make sure everyone is using it in their day-to-day job, the Risk Culture topic has emerged and gained importance not only in the Finance Sector but also in the National Oil Companies in Kuwait. Risk Culture can be defined as the shared beliefs, attitudes, and behaviors within a company that guide its approach to managing risks. It acts as a connecting force that links policies, procedures, and individuals, influencing how risks are understood and tackled through activities. In this research, benefits of Risk Culture are shared, guidelines are presented to promote a risk aware culture, and fully embed and enforce Risk-based processes and procedures. Moreover, this research demonstrates methodologies of measuring the Risk Culture using specific dimensions and clusters.

Keywords: clusters, dimensions, national oil companies, risk culture, risk management

Procedia PDF Downloads 79
5841 Exploring the Potential of Blockchain to Improve Higher Education

Authors: Tony Cripps, Larry Kimber

Abstract:

This paper will begin by briefly explaining how blockchain technology works. Then, after highlighting a few of the ways it promises to heavily impact all aspects of the digital landscape, the focus will shift to Blockchain in the field of education, with specific emphasis placed on practical applications in foreign language education. Blockchain is a decentralized Internet-based software application that guarantees truth in transactions. This means whenever two parties engage in a transaction using Blockchain, it is time-stamped, added to a block of other transactions, and then permanently attached to an unalterable ‘chain’ of blocks. The potential for developing applications with Blockchain is therefore immense, since software systems that ensure the impossibility of outside tampering are invaluable. Innovative ideas in every imaginable domain are presently being entertained and Blockchain in education is no exception. For instance, records kept within and between institutions of students’ grade performance, academic achievement and verification of assignment/course completion are just a few examples of how this new technology might potentially be used to revolutionize education. It is hoped that this paper will be of use to all educators interested in the application of technology in the field of education.

Keywords: blockchain, disruption, potential, technology

Procedia PDF Downloads 138
5840 The Limits of Charity: Advancing a Rights-based Justice Model to Remedy Poverty and Hunger

Authors: Tracy Smith-Carrier

Abstract:

In 1995, the World Health Organization declared that poverty was the biggest killer and the greatest cause of suffering in the world. Income is certainly a key social determinant of health, the lack of which causes innumerable health and mental health conditions. In seeking to provide relief from financial hardship for residents within their populace, states in the Global North have largely turned to the non-profit and charitable sector. The stigma and shame of accessing charity is a significant barrier for many, but what is more problematic is that the embrace of the charitable model has let governments off the hook from responding to their international human rights obligations. Although states are signatories to various human rights treaties and conventions internationally, many of these laws have not been implemented domestically. This presentation explores the limits of the charitable model in addressing poverty in countries of the Global North. Unlike in the ages passed, when poverty was thought to be an individual problem, we now know that poverty is largely systemic in nature. In this presentation, we will identify the structural determinants of poverty, outline why people are reticent to access charitable programs and services and how income security is reproduced through the charitable model, and discuss evidence-informed solutions, such as a basic income guarantee, to move beyond the charitable model in favour of a rights-based justice model. To move beyond charity, we must demand that governments recognize our fundamental human rights and address poverty and hunger using a justice model based on substantive human rights.

Keywords: basic income, charity, poverty, income security, hunger, food security, social justice, human rights

Procedia PDF Downloads 117
5839 Freight Forwarders’ Liability: A Need for Revival of Unidroit Draft Convention after Six Decades

Authors: Mojtaba Eshraghi Arani

Abstract:

The freight forwarders, who are known as the Architect of Transportation, play a vital role in the supply chain management. The package of various services which they provide has made the legal nature of freight forwarders very controversial, so that they might be qualified once as principal or carrier and, on other occasions, as agent of the shipper as the case may be. They could even be involved in the transportation process as the agent of shipping line, which makes the situation much more complicated. The courts in all countries have long had trouble in distinguishing the “forwarder as agent” from “forwarder as principal” (as it is outstanding in the prominent case of “Vastfame Camera Ltd v Birkart Globistics Ltd And Others” 2005, Hong Kong). It is not fully known that in the case of a claim against the forwarder, what particular parameter would be used by the judge among multiple, and sometimes contradictory, tests for determining the scope of the forwarder liability. In particular, every country has its own legal parameters for qualifying the freight forwarders that is completely different from others, as it is the case in France in comparison with Germany and England. The unpredictability of the courts’ decisions in this regard has provided the freight forwarders with the opportunity to impose any limitation or exception of liability while pretending to play the role of a principal, consequently making the cargo interests incur ever-increasing damage. The transportation industry needs to remove such uncertainty by unifying national laws governing freight forwarders liability. A long time ago, in 1967, The International Institute for Unification of Private Law (UNIDROIT) prepared a draft convention called “Draft Convention on Contract of Agency for Forwarding Agents Relating to International Carriage of Goods” (hereinafter called “UNIDROIT draft convention”). The UNIDROIT draft convention provided a clear and certain framework for the liability of freight forwarder in each capacity as agent or carrier, but it failed to transform to a convention, and eventually, it was consigned to oblivion. Today, after nearly 6 decades from that era, the necessity of such convention can be felt apparently. However, one might reason that the same grounds, in particular, the resistance by forwarders’ association, FIATA, exist yet, and thus it is not logical to revive a forgotten draft convention after such long period of time. It is argued in this article that the main reason for resisting the UNIDROIT draft convention in the past was pending efforts for developing the “1980 United Nation Convention on International Multimodal Transport of Goods”. However, the latter convention failed to become in force on due time in a way that there was no new accession since 1996, as a result of which the UNIDROIT draft convention must be revived strongly and immediately submitted to the relevant diplomatic conference. A qualitative method with the concept of interpretation of data collection has been used in this manuscript. The source of the data is the analysis of international conventions and cases.

Keywords: freight forwarder, revival, agent, principal, uidroit, draft convention

Procedia PDF Downloads 74
5838 Social and Political Economy of Paid and Unpaid Work: Work of Women Home Based Workers in National Capital Region (NCR), India

Authors: Sudeshna Sengupta

Abstract:

Women’s work lives weave a complex fabric of myriad work relations and complex structures. Lives, when seen from the lens of work, is a saga of conjugated oppression by intertwined structures that are vertically and horizontally interwoven in a very complex manner. Women interact with multiple institutions through their work. The interactions and interplay of institutions shape their organization of work. They intersperse productive work with reproductive work, unpaid economic activities with unpaid care work, and all kinds of activities with leisure and self-care. The proposed paper intends to understand how women working as home-based workers in the National Capital Region (NCR) of India are organizing their everyday work, and how the organization of work is influenced by the interplay of structures. Situating itself in a multidisciplinary theoretical framework, this paper brings out how the gendering of work is playing out in the political, economic and social domain and shaping the work-life within the family, and in the paid workspace. The paper will use a primary data source, which is qualitative in nature. It will comprise 15 qualitative interviews of women home-based workers from the National Capital Region. The research uses a life history approach. The sampling was purposive using snowballing as a method. The dataset is part of the primary data (qualitative) collected for the ongoing Ph.D. work in Gender Studies at Ambedkar University Delhi. The home-based workers interviewed were in “non-factory” wage relations based on piece rates with flexible working hours. Their workplaces were their own homes with no spatial divide between living spaces and workspaces. Home-based workers were recognized as a group in the domain of labor economics in the 1980s. When menial work was cheaper than machine work, the capital owners preferred to outsource work as home-based work to women. These production spaces are fragmented and the identity of gender is created within labor processes to favor material accumulation. Both the employers and employees acknowledged the material gain of the capital owner when work was subcontracted to women at home. Simultaneously the market reinforced women’s reproductive role by conforming to patriarchal ideology. The contractors played an important role in implementing localized control on workers and also in finding workers for fragmented, gendered production processes. Their presence helped the employers in bringing together multiple forms of oppression that ranged from creating a structure to flout laws by creating shadow employers. It created an intertwined social and economic structure as well as a workspace where the line between productive and reproductive work gets blurred. The state invisibilized itself either by keeping the sector out of the domain of laws or by not implementing its own laws regulating working conditions or social security. It allowed the local hierarchy to function and define localized working conditions. The productive reproductive continuum reveals a labor control that influenced both the productive and reproductive work of women.

Keywords: informal sector, paid work, women workers, labor processes

Procedia PDF Downloads 161
5837 Optimal Analysis of Grounding System Design for Distribution Substation

Authors: Thong Lantharthong, Nattchote Rugthaicharoencheep, Att Phayomhom

Abstract:

This paper presents the electrical effect of two neighboring distribution substation during the construction phase. The size of auxiliary grounding grid have an effect on entire grounding system. The bigger the size of auxiliary grounding grid, the lower the GPR and maximum touch voltage, with the exception that when the two grids are unconnected, i.e. the bigger the size of auxiliary grounding grid, the higher the maximum step voltage. The results in this paper could be served as design guideline of grounding system, and perhaps remedy of some troublesome grounding grids in power distribution’s system. Modeling and simulation is carried out on the Current Distribution Electromagnetic interference Grounding and Soil structure (CDEGS) program. The simulation results exhibit the design and analysis of power system grounding and perhaps could be set as a standard in grounding system design and modification in distribution substations.

Keywords: grounding system, touch voltage, step voltage, safety criteria

Procedia PDF Downloads 451
5836 Application of the Tripartite Model to the Link between Non-Suicidal Self-Injury and Suicidal Risk

Authors: Ashley Wei-Ting Wang, Wen-Yau Hsu

Abstract:

Objectives: The current study applies and expands the Tripartite Model to elaborate the link between non-suicidal self-injury (NSSI) and suicidal behavior. We propose a structural model of NSSI and suicidal risk, in which negative affect (NA) predicts both anxiety and depression, positive affect (PA) predicts depression only, anxiety is linked to NSSI, and depression is linked to suicidal risk. Method: Four hundreds and eighty seven undergraduates participated. Data were collected by administering self-report questionnaires. We performed hierarchical regression and structural equation modeling to test the proposed structural model. Results: The results largely support the proposed structural model, with one exception: anxiety was strongly associated with NSSI and to a lesser extent with suicidal risk. Conclusions: We conclude that the co-occurrence of NSSI and suicidal risk is due to NA and anxiety, and suicidal risk can be differentiated by depression. Further theoretical and practical implications are discussed.

Keywords: non-suicidal self-injury, suicidal risk, anxiety, depression, the tripartite model, hierarchical relationship

Procedia PDF Downloads 470
5835 Tackling Corruption in Nigeria Using Social Studies and Other Agents of Socialization

Authors: Joshua Garba Dodo

Abstract:

Corruption has become endemic in Nigeria, affecting almost all facets of the society, thereby thwarting the effort of national development. The thrust of this paper, therefore, is to see how corruption can be brought to its barest minimum if not totally eradicated using social studies and other agents of socialization. In doing that, the paper defines the concepts of corruption, social studies, and socialization. Discourse on the causes of corruption and the effect on national development is made. The paper examines the role of social studies, family, and the mass media in tackling corruption. The paper also asserts that if an aggressive campaign is mounted by the mass media as a way of supporting the present government in her effort to solve the corruption problem in the country, it will help in changing the psyche of the citizenry about corruption. Finally, the paper recommends, among others, that families and communities should sanction their sons and daughters involved in corrupt practices if proven by a competent court of law.

Keywords: corruption, social studies, family, mass media, socialization

Procedia PDF Downloads 93
5834 Aerodynamics of Nature Inspired Turbine Blade Using Computational Simulation

Authors: Seung Ki Lee, Richard Kyung

Abstract:

In the airfoil analysis, as the camber is greater, the minimal angle of attack causing the stall and maximum lift force increases. The shape of the turbine blades is similar to the shape of the wings of planes. After major wars, many remarkable blade shapes are made through researches about optimal blade shape. The blade shapes developed by National Advisory Committee for Aeronautics, NACA, is well known. In this paper, using computational and numerical analysis, the NACA airfoils are analyzed. This research shows that the blades vary with their thickness, which thinner blades are expected to be better. There is no significant difference of coefficient of lift due to the difference in thickness, but the coefficient of drag increases as the thickness increases.

Keywords: blades, drag force, national advisory committee for aeronautics airfoils, turbine

Procedia PDF Downloads 226
5833 Coastal Adaptation to Climate Change: A Review of EU Tools, Legislation, National Strategies and Projects in the Mediterranean Basin

Authors: Dimitris Kokkinos, Panagiotis Prinos

Abstract:

In the last three decades, climate change has been studied extensively from scientific community, and its consequences are more than clear all around the world. Most countries have carried out a great effort to reduce global warming rates with the ratification and implementation of several international treaties. Moreover, many of them have already adopted national plans in order to adapt to climate change effects and mitigate human and economic losses. Coastal environments, with their inherent physical sensitivity, will face important challenges as a result of projected changes in climate conditions and hundreds of millions of people will be affected. Coastal zones are of high social and economic value and this research focuses on the Mediterranean basin, which is a densely populated and highly urbanized area. With 40% of its land used for human activity and the inevitability of the impacts of the climate change, it is obvious that some form of adaptation measures will be necessary. In this regard, the EU tools, policies and legislation concerning adaptation to climate change are presented. Additionally, the National Adaptation Strategies of State members of the Mediterranean basin are compared and analyzed concerning the coastal areas, along with an overview of projects and programs results focused on coastal issues at different spatial scales. The purpose of this research is to stress the differences between Mediterranean State members at methodologies implemented, to highlight the possible gaps in co-ordination and to emphasize on research initiatives that EU can build upon moving towards an integrated adaptation planning on a region-wide basis.

Keywords: coastal adaptation, Mediterranean Basin, climate change, coastal environments

Procedia PDF Downloads 308
5832 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability

Procedia PDF Downloads 65
5831 2-Dimensional Kinematic Analysis on Sprint Start with Sprinting Performance of Novice Athletes

Authors: Satpal Yadav, Biswajit Basumatary, Arvind S. Sajwan, Ranjan Chakravarty

Abstract:

The purpose of the study was to assess the effect of 2D kinematical selected variables on sprint start with sprinting performance of novice athletes. Six (3 National and 3 State level) athletes of sports authority of India, Guwahati has been selected for this study. The mean (M) and standard deviation (SD) of sprinters were age (17.44, 1.55), height (1.74m, .84m), weight (62.25 kg, 4.55), arm length (65.00 cm, 3.72) and leg length (96.35 cm, 2.71). Biokin-2D motion analysis system V4.5 can be used for acquiring two-dimensional kinematical data/variables on sprint start with Sprinting Performance. For the purpose of kinematic analysis a standard motion driven camera which frequency of the camera was 60 frame/ second i.e. handy camera of Sony Company were used. The sequence of photographic was taken under controlled condition. The distance of the camera from the athletes was 12 mts away and was fixed at 1.2-meter height. The result was found that National and State level athletes significant difference in there, trajectory knee, trajectory ankle, displacement knee, displacement ankle, linear velocity knee, linear velocity ankle, and linear acceleration ankle whereas insignificant difference was found between National and State level athletes in their linear acceleration knee joint on sprint start with sprinting performance. For all the Statistical test the level of significance was set at p<0.05.

Keywords: 2D kinematic analysis, sprinting performance, novice athletes, sprint start

Procedia PDF Downloads 323