Search results for: national security strategy
8860 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security
Authors: Temitope Francis Abiodun
Abstract:
The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.Keywords: terrorism, non-violent state actors, private sector intelligence, security
Procedia PDF Downloads 1378859 Industrial and Environmental Safety in the Integrated Security Policy of the Industry: A Corporation and an Enterprise
Authors: Vladimir A. Grachev
Abstract:
Today, in the context of rapidly developing technosphere and hourly emerging new technologies, the industrial and environmental safety issue is ever more pressing. The article is devoted to the relationship of social, environmental, and industrial policies with industrial safety, occupational health and safety, environmental safety, and environmental protection. The author assesses the up-to-day situation through system analysis and on the basis of the existing practices. A complex system of the policies implementation without "gaps" and missing links ensures preservation of human lives, health and a favorable living environment. The author demonstrates that absence of an "environmental safety" high-priority link can lead to a significant loss of human lives and health and the global changes in the environment. The role of implementing the environmental policy of enterprises and organizations, and of economic sectors in the implementation of national environmental policy is shown. It was established that the system for implementing environmental policy should be based on a system analysis.Keywords: environmental protection, environmental safety, industrial safety, occupational health and safety
Procedia PDF Downloads 2158858 Mobile Cloud Computing: How to Improve
Authors: Abdullah Aljumah, Tariq Ahamad
Abstract:
The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.Keywords: Cloud Computing, MCC, SAAS, computer interaction
Procedia PDF Downloads 3818857 Teaching Food Discourse in Cross-Cultural Communication Lectures at University
Authors: Sanjar Davronov
Abstract:
Linguistic research of food discourse helps to analyze gastronomic picture of the world which plays important role in cross-cultural communications. 20 hours lecture can’t provide broad knowledge about national picture of the world of native speakers whose language being studied by future translator students. This abstract analyses how to research food discourse in “Cross-cultural (or lingvo-cultural) communication” lectures for ESL students. During compare Uzbek and American national meals, we found some specific features of food names in both countries. For example: If names of food includes advertising character in USA restaurant menus like: New York strip Sirloin crowned with Fresh – squeezed orange and lemon with a hint of garlic; Uzbek meals names are too simple, short and force general afford in underlining action – preparation process like: “Dimlama” (dimla(verb-to stew)+ma(suffix of past perfect like- stew- stewed). “Qovurdoq” (qovur (verb- to fry)+ doq (suffix of adverb like “fried one”) but these are the most delicious and difficult in preparing national meals however it is heritage of national cuisine. There are also similarity between US and Uzbek food names which has geographical color - South African Lobster tail; Qashqadaryo tandiri (lamb prepared in “tandir” typical national oven with pine leafs in Qashkadarya region). Food for European people contains physical context more than spiritual but in Asian literature especially Uzbek food has some pragmatic stuff: salt and bread (associates with hospitality and humanity), don’t be faithlessness 40 for owners of house where you where a guest. We share some teaching techniques for food discourse analyzing lectures.Keywords: cross-cultural communications, food discourse, ESL lectures, linguistic research
Procedia PDF Downloads 6168856 Effect of the Diverse Standardized Patient Simulation Cultural Competence Education Strategy on Nursing Students' Transcultural Self-Efficacy Perceptions
Authors: Eda Ozkara San
Abstract:
Nurse educators have been charged by several nursing organizations and accrediting bodies to provide innovative and evidence-based educational experiences, both didactic and clinical, to help students to develop the knowledge, skills, and attitudes needed to provide culturally competent nursing care to patients. Clinical simulation, which offers the opportunity for students to practice nursing skills in a risk-free, controlled environment and helps develop self-efficacy (confidence) within the nursing role. As one simulation method, the standardized patients (SPs) simulation helps educators to teach nursing students variety of skills in nursing, medicine, and other health professions. It can be a helpful tool for nurse educators to enhance cultural competence of nursing students. An alarming gap exists within the literature concerning the effectiveness of SP strategy to enhance cultural competence development of diverse student groups, who must work with patients from various backgrounds. This grant-supported, longitudinal, one-group, pretest and post-test educational intervention study aimed to examine the effect of the Diverse Standardized Patient Simulation (DSPS) cultural competence education strategy on students’ (n = 53) transcultural self-efficacy (TSE). The researcher-developed multidimensional DSPS strategy involved careful integration of transcultural nursing skills guided by the Cultural Competence and Confidence (CCC) model. As a carefully orchestrated teaching and learning strategy by specifically utilizing the SP pedagogy, the DSPS also followed international guidelines and standards for the design, implementation, evaluation, and SP training; and had content validity review. The DSPS strategy involved two simulation scenarios targeting underrepresented patient populations (Muslim immigrant woman with limited English proficiency and Irish-Italian American gay man with his partner (Puerto Rican) to be utilized in a second-semester, nine-credit, 15-week medical-surgical nursing course at an urban public US university. Five doctorally prepared content experts reviewed the DSPS strategy for content validity. The item-level content validity index (I-CVI) score was calculated between .80-1.0 on the evaluation forms. Jeffreys’ Transcultural Self-Efficacy Tool (TSET) was administered as a pretest and post-test to assess students’ changes in cognitive, practical, and affective dimensions of TSE. Results gained from this study support that the DSPS cultural competence education strategy assisted students to develop cultural competence and caused statistically significant changes (increase) in students’ TSE perceptions. Results also supported that all students, regardless of their background, benefit (and require) well designed cultural competence education strategies. The multidimensional DSPS strategy is found to be an effective way to foster nursing students’ cultural competence development. Step-by-step description of the DSPS provides an easy adaptation of this strategy with different student populations and settings.Keywords: cultural competence development, the cultural competence and confidence model, CCC model, educational intervention, transcultural self-efficacy, TSE, transcultural self-efficacy tool, TSET
Procedia PDF Downloads 1498855 Studying the Influence of the Intellectual Assets on Strategy Implementation: Case Study, Modiran Ideh Pardaz Company
Authors: Farzam Chakherlouy, Amirmehdi Dokhanchi
Abstract:
Nowadays organizations have to identify, evaluate and manage intangible assets which enable them to provide maximum requirements to achieve their goals and strategies. Organizations also have to try to promote and improve these kinds of assets continuously. It seems necessary to implement developed strategies in today’s competitive world where all the organizations and companies spend great amounts of expenses for developing their own strategies. In fact, after determining strategies to be implemented, the management process is not completed and it will not have any effect on the success and existence of the organization until these strategies are implemented. The objective of this article is to define the intellectual capital and it components and studying the impact of intellectual capital on the implementation of strategy based upon the Bozbura model. Three dimensions of human capital, relational capital, and the structural capital. According to the test’s results, the correlation between the intellectual capital and three components of strategic implementation (leadership, human resource management, and culture) has not been approved yet. According to results of Friedman’s test in relation with the intellectual capital, the maximum inadequacy of this company is in the field of human capital (with an average of 3.59) and the minimum inadequacy is in the field of the relational capital (customer) with an average of 2.83. Besides, according to Friedman test in relation with implementation of the strategy, the maximum inadequacy relates to the culture of the organization and the corporate control with averages of 2.60 and 3.45 respectively. In addition, they demonstrate a good performance in scopes of human resources management and financial resources management strategies.Keywords: Bozbura model, intellectual capital, strategic management, implementation of strategy, Modiran Ideh Pardaz company
Procedia PDF Downloads 4218854 A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium
Authors: Louise Reyntjens
Abstract:
The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed.Keywords: Belgium, counterterrorism strategies, human rights, immigration law
Procedia PDF Downloads 1068853 Weakly Solving Kalah Game Using Artificial Intelligence and Game Theory
Authors: Hiba El Assibi
Abstract:
This study aims to weakly solve Kalah, a two-player board game, by developing a start-to-finish winning strategy using an optimized Minimax algorithm with Alpha-Beta Pruning. In weakly solving Kalah, our focus is on creating an optimal strategy from the game's beginning rather than analyzing every possible position. The project will explore additional enhancements like symmetry checking and code optimizations to speed up the decision-making process. This approach is expected to give insights into efficient strategy formulation in board games and potentially help create games with a fair distribution of outcomes. Furthermore, this research provides a unique perspective on human versus Artificial Intelligence decision-making in strategic games. By comparing the AI-generated optimal moves with human choices, we can explore how seemingly advantageous moves can, in the long run, be harmful, thereby offering a deeper understanding of strategic thinking and foresight in games. Moreover, this paper discusses the evaluation of our strategy against existing methods, providing insights on performance and computational efficiency. We also discuss the scalability of our approach to the game, considering different board sizes (number of pits and stones) and rules (different variations) and studying how that affects performance and complexity. The findings have potential implications for the development of AI applications in strategic game planning, enhancing our understanding of human cognitive processes in game settings, and offer insights into creating balanced and engaging game experiences.Keywords: minimax, alpha beta pruning, transposition tables, weakly solving, game theory
Procedia PDF Downloads 558852 The Impact of Leadership Culture on Motivation, Efficiency, and Performance of Customs Employees: A Case Study of Iran Customs
Authors: Kazem Samadi
Abstract:
In today’s world, public agencies like customs have become vital institutions in international trade processes and in maintaining national economic security due to increasing economic and commercial complexities. In this regard, human resource management (HRM) is crucial to achieving organizational goals. This research employed a descriptive survey method, in which the statistical population consisted of all customs employees. Using Cochran's formula, 300 employees were selected from the central customs office. A researcher-made questionnaire was used as the data collection tool, with content validity and reliability confirmed using Cronbach's alpha coefficient. The collected data were analyzed through structural modeling using SPSS and AMOS 24. The results indicated that leadership culture significantly affected employee motivation, efficiency, and performance in customs. Customs managers and leaders in Iran can improve organizational productivity by fostering this culture, thereby facilitating individual and organizational development for their staff.Keywords: leadership culture, organizational culture, employee performance, customs
Procedia PDF Downloads 198851 Factors That Stimulate Employee Development in Polish Small Enterprises
Authors: Ewa Rak
Abstract:
This paper is part of a broader research project on employee development in small enterprises, financed by Polish National Science Centre. The project results will serve as basis for a doctoral dissertation. The paper utilises literature studies and qualitative research conducted in small enterprises operating in the Lower Silesia region of Poland. This paper aims to identify some of the factors that stimulate employee development in small companies operating in Poland. The great variety of business pursuits and applications represented by this sector makes it hard to determine a universal configuration of factors to offer best possible conditions for employee development. Research results suggest that each of the examined companies had one or two of such factors in focus, and serving as the basis for the entire pro-development system. These include: employment security (both for employee and entrepreneur) and extensive knowledge and experience of entrepreneurs, but only if it is combined with a willingness and ability to share it.Keywords: employee development, factors that stimulate employee development, human resources development, Poland, small enterprises, training
Procedia PDF Downloads 2688850 A Fast, Reliable Technique for Face Recognition Based on Hidden Markov Model
Authors: Sameh Abaza, Mohamed Ibrahim, Tarek Mahmoud
Abstract:
Due to the development in the digital image processing, its wide use in many applications such as medical, security, and others, the need for more accurate techniques that are reliable, fast and robust is vehemently demanded. In the field of security, in particular, speed is of the essence. In this paper, a pattern recognition technique that is based on the use of Hidden Markov Model (HMM), K-means and the Sobel operator method is developed. The proposed technique is proved to be fast with respect to some other techniques that are investigated for comparison. Moreover, it shows its capability of recognizing the normal face (center part) as well as face boundary.Keywords: HMM, K-Means, Sobel, accuracy, face recognition
Procedia PDF Downloads 3318849 Privacy Policy Prediction for Uploaded Image on Content Sharing Sites
Authors: Pallavi Mane, Nikita Mankar, Shraddha Mazire, Rasika Pashankar
Abstract:
Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site.Keywords: online information services, prediction, security and protection, web based services
Procedia PDF Downloads 3588848 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies
Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk
Abstract:
Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)
Procedia PDF Downloads 938847 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security
Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna
Abstract:
Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.Keywords: cipher text, cryptography, plaintext, raaga
Procedia PDF Downloads 2898846 The Change in Management Accounting from an Institutional Perspective: A Case Study for a Romania Company
Authors: Gabriel Jinga, Madalina Dumitru
Abstract:
The objective of this paper is to present the process of change in management accounting in Romania, a former communist country from Eastern Europe. In order to explain this process, we used the contingency and institutional theories. We focused on the following directions: the presentation of the scientific context and motivation of this research and the case study. We presented the state of the art in the process of change in the management accounting from the international and national perspective. We also described the evolution of management accounting in Romania in the context of economic and political changes. An important moment was the fall of communism in 1989. This represents a starting point for a new economic environment and for new management accounting. Accordingly, we developed a case study which presented this evolution. The conclusion of our research was that the changes in the management accounting system of the company analysed occurred in the same time with the institutionalization of some elements (e.g. degree of competition, training and competencies in management accounting). The management accounting system was modeled by the contingencies specific to this company (e.g. environment, industry, strategy).Keywords: management accounting, change, Romania, contingency, institutional theory
Procedia PDF Downloads 5168845 Novel Fluorescent High Density Polyethylene Composites for Fused Deposition Modeling 3D Printing in Packaging Security Features
Authors: Youssef R. Hassan, Mohamed S. Hasanin, Reda M. Abdelhameed
Abstract:
Recently, innovations in packaging security features become more important to see the originality of packaging in industrial application. Luminescent 3d printing materials have been a promising property which can provides a unique opportunity for the design and application of 3D printing. Lack emission of terbium ions, as a source of green emission, in salt form prevent its uses in industrial applications, so searching about stable and highly emitter material become essential. Nowadays, metal organic frameworks (MOFs) play an important role in designing light emitter material. In this work, fluorescent high density polyethylene (FHDPE) composite filament with Tb-benzene 1,3,5-tricarboxylate (Tb-BTC) MOFs for 3D printing have been successfully developed.HDPE pellets were mixed with Tb-BTC and melting extrustion with single screw extruders. It was found that Tb-BTCuniformly dispersed in the HDPE matrix and significantly increased the crystallinity of PE, which not only maintained the good thermal property but also improved the mechanical properties of Tb-BTC@HDPE composites. Notably, the composite filaments emitted ultra-bright green light under UV lamp, and the fluorescence intensity increased as the content of Tb-BTC increased. Finally, several brightly luminescent exquisite articles could be manufactured by fused deposition modeling (FDM) 3D printer with these new fluorescent filaments. In this context, the development of novel fluorescent Tb-BTC@HDPE composites was combined with 3D printing technology to amplified the packaging Security Features.Keywords: 3D printing, fluorescent, packaging, security
Procedia PDF Downloads 1018844 Quality of Romanian Food Products on Rapid Alert System for Food and Feed Notifications
Authors: Silvius Stanciu
Abstract:
Romanian food products sold on European markets have been accused of several non-conformities of quality and safety. Most products incriminated last period were those of animal origin, especially meat and meat products. The study proposed an analysis of the notifications made by network members through Rapid Alert System for Food and Feed on products originating in Romania. As a source of information, the Rapid Alert System portal and the official communications of the National Sanitary Veterinary and Food Safety Authority were used. The research results showed that nearly a quarter of network notifications were rejected and were withdrawn by the European Authority. Although national authorities present these issues as success stories of national quality policies, the large number of notifications related to the volume of exported products is worrying. The paper is of practical and applicative importance for both the business environment and the academic environment, laying the basis for a wider research on the quality differences between Romanian and imported products.Keywords: food, quality, RASFF, Rapid Alert System for Food and Feed, Romania
Procedia PDF Downloads 1608843 Investigating the Effects of Empowering the Employees in Managing Crimes by the Police
Authors: Akbar Salimi, Mehdi Moghimi
Abstract:
Goal: The human resource empowerment is a new strategy in achieving a competitive advantage. The aim of the research is to understand crime management by the police by using this strategy. Method: The research is applied in terms of goal and it is a survey type research. The sample intended include all the police officers of a police station for as many as 52 people. The data were collected by a researcher made four choice questionnaire after the validity and reliability were confirmed. Findings: By regarding the Melhem pattern as the framework, four dimensions of empowerment were identified and the triangle of crime was explained and then four hypotheses proportionate to it were formulated. Results: Given the fact that the sample was all counted, all the four hypotheses were supported by using the average data received and by regarding the %50 as the criterion.Keywords: management, empowerment, employees, police
Procedia PDF Downloads 3738842 Public Perception on Child Street Hawking in Aba Urban, Abia State, Nigeria
Authors: Paul Anyaogu, E. U. M. Igbo
Abstract:
This study examines the public view on child street hawking in Aba Urban, Abia State, Nigeria, its causes and effect on the child participant and society at large. The study tends to investigate the influence of socioeconomic status on child street hawking. The current situation reflects a chronic urban poverty, which disposed of parents/guardians to send their children and wards of school age to income yielding activities. A social survey research design was employed to select the respondents. A total of 1,108 questionnaires were administered to the respondents of 18 years and above and 1,038 were retrieved. Also, 24 in-depth interviews were conducted in the study area. The findings revealed that child street hawking is on the increase and a serious threat to social cohesion and national security. The study also revealed that poverty is a major cause of child street hawking. The study recommends that government should create job opportunities for urban dwellers, as well as provide social amenities and also put up poverty alleviation/eradication programmes for the people.Keywords: Aba Urban, child street hawking, dangers, disposition, poverty
Procedia PDF Downloads 2818841 Tourism Development and Planning in Rwanda
Authors: Ntachobazi bosco
Abstract:
Tourism Development and Planning in Rwanda: Rwanda, a small landlocked country located in the heart of Africa, has experienced significant growth in its tourism industry in recent years. The country’s stunning natural beauty, rich cultural heritage, and warm hospitality have made it an attractive destination for travelers from around the world. However, to ensure sustainable tourism development and planning, the Rwandan government has implemented various strategies and policies to promote responsible tourism practices. Infrastructure Development: To support the growth of the tourism industry, the Rwandan government has invested heavily in infrastructure development. This includes the construction of new hotels, resorts, and lodges, as well as the upgrading of existing facilities. The government has also improved the country’s transportation network, including the construction of new airports and the upgrading of existing ones. Conservation Efforts: Rwanda is home to several national parks and reserves, including the famous Volcanoes National Park, which is known for its mountain gorilla populations. To protect these natural wonders, the Rwandan government has implemented conservation efforts, such as the establishment of protected areas and the development of sustainable tourism practices. Community-Based Tourism: Community-based tourism is a key component of Rwanda’s tourism development strategy. The government has established several community-based tourism programs, which aim to involve local communities in the tourism industry and provide them with economic benefits. These programs include homestays, village tours, and cultural performances. Sustainable Tourism Practices: To promote sustainable tourism practices, the Rwandan government has implemented several initiatives, such as the use of eco-friendly accommodations and the promotion of responsible wildlife viewing practices. The government has also established the Rwanda Tourism Board, which is responsible for promoting and regulating the tourism industry. Challenges and Opportunities: Despite the growth of the tourism industry in Rwanda, several challenges need to be addressed, such as the lack of skilled labor and the need for more infrastructure development. However, there are also several opportunities for the industry, such as the potential for ecotourism and the growth of the meetings, incentives, conventions, and exhibitions (MICE) market.Keywords: tourism, in rwanda, developent, in africa
Procedia PDF Downloads 638840 The Determinants and Effects of R&D Outsourcing in Korean Manufacturing Firm
Authors: Sangyun Han, Minki Kim
Abstract:
R&D outsourcing is a strategy for acquiring the competitiveness of firms as an open innovation strategy. As increasing total R&D investment of firms, the ratio of amount of R&D outsourcing in it is also increased in Korea. In this paper, we investigate the determinants and effects of R&D outsourcing of firms. Through analyzing the determinants of R&D outsourcing and effect on firm’s performance, we can find some academic and politic issues. Firstly, in the point of academic view, distinguishing the determinants of R&D outsourcing is linked why the firms do open innovation. It can be answered resource based view, core competence theory, and etc. Secondly, we can get some S&T politic implication for transferring the public intellectual properties to private area. Especially, for supporting the more SMEs or ventures, government can get the basement and the reason why and how to make the policies.Keywords: determinants, effects, R&D, outsourcing
Procedia PDF Downloads 5068839 “Friction Surfaces” of Airport Emergency Plan
Authors: Jakub Kraus, Vladimír Plos, Peter Vittek
Abstract:
This article focuses on the issue of airport emergency plans, which are documents describing reactions to events with impact on aviation safety or aviation security. The article specifically focuses on the use and creation of emergency plans, where could be found a number of disagreements between different stakeholders, for which the airport emergency plan applies. Those are the friction surfaces of interfaces, which is necessary to identify and ensure them smooth process to avoid dangerous situations or delay.Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system, friction surfaces of airport emergency plan, interfaces of processes
Procedia PDF Downloads 5198838 The Impact of International Human Rights Law on Local Efforts to Address Women’s Realities of Violence: Lessons from Jamaica
Authors: Ramona Georgeta Biholar
Abstract:
Gender-based violence against women plagues societies around the world. The work to eliminate it is an ongoing battle. At the international level, Article 5 (a) CEDAW establishes an agenda for social and cultural transformation: it imposes on States parties to CEDAW an obligation to modify sex roles and stereotypical social and cultural patterns of conduct. Also, it provides for the protection of women from violence stemming from such gender norms. Yet, the lived realities of women are frequently disconnected from this agenda. Nonetheless, it is the reality of the local that is crucial for the articulation, implementation and realization of women’s rights in general, and for the elimination of gender-based violence against women in particular. In this paper we discuss the transformation of sex roles and gender stereotyping with a view to realize women’s right to be free from gender-based violence. This paper is anchored in qualitative data collection undertaken in Jamaica and socio-legal research. Based on this research, 1) We explain the process of vernacularisation as a strategy that enables women’s human rights to hit the ground and benefit rights holders, and 2) We present a synergistic model for the implementation of Article 5 (a) CEDAW so that women’s right to be free from gender-based violence can be realized in a concrete national jurisdiction. This model is grounded in context-based demands and recommendations for social and cultural transformation as a remedy for the incidence of gender-based violence against women. Moreover, the synergistic model offers directions that have a general application for the implementation of CEDAW and Article 5 (a) CEDAW in particular, with a view to realize women’s right to be free from gender-based violence. The model is thus not only a conceptual tool of analysis, but also a prescriptive tool for action. It contributes to the work of both academics and practitioners, such as Governmental officials, and national and local civil society representatives. Overall, this paper contributes to understanding the process necessary to bridge that gap between women’s human rights norms and women’s life realities of discrimination and violence.Keywords: CEDAW, gender-based violence against women, international human rights law, women’s rights implementation, the Caribbean
Procedia PDF Downloads 3328837 Technical and Economic Environment in the Polish Power System as the Basis for Distributed Generation and Renewable Energy Sources Development
Authors: Pawel Sowa, Joachim Bargiel, Bogdan Mol, Katarzyna Luszcz
Abstract:
The article raises the issue of the development of local renewable energy sources and the production of distributed energy in context of improving the reliability of the Polish Power System and the beneficial impact on local and national energy security. The paper refers to the current problems of local governments in the process of investment in the area of distributed energy projects, and discusses the issues of the future role and cooperation within the local power plants and distributed energy. Attention is paid to the local communities the chance to raise their own resources and management of energy fuels (biomass, wind, gas mining) and improving the local energy balance. The material presented takes the issue of the development of the energy potential of municipalities and future cooperation with professional energy. As an example, practical solutions used in one of the communes in Silesia.Keywords: distributed generation, mini centers energy, renewable energy sources, reliability of supply of rural commune
Procedia PDF Downloads 6008836 The Role of University in High-Level Human Capital Cultivation in China’s West Greater Bay Area
Authors: Rochelle Yun Ge
Abstract:
University has played an active role in the country’s development in China. There has been an increasing research interest on the development of higher education cooperation, talent cultivation and attraction, and innovation in the regional development. The Triple Helix model, which indicates that regional innovation and development can be engendered by collaboration among university, industry and government, is often adopted as research framework. The research using triple helix model emphasizes the active and often leading role of university in knowledge-based economy. Within this framework, universities are conceptualized as key institutions of knowledge production, transmission and transference potentially making critical contributions to regional development. Recent research almost uniformly consistent in indicating the high-level research labours (i.e., doctoral, post-doctoral researchers and academics) as important actors in the innovation ecosystem with their cross-geographical human capital and resources presented. In 2019, the development of the Guangdong-Hong Kong-Macao Greater Bay Area (GBA) was officially launched as an important strategy by the Chinese government to boost the regional development of the Pearl River Delta and to support the realization of “One Belt One Road” strategy. Human Capital formation is at the center of this plan. One of the strategic goals of the GBA development is set to evolve into an international educational hub and innovation center with high-level talents. A number of policies have been issued to attract and cultivate human resources in different GBA cities, in particular for the high-level R&D (research and development) talents such as doctoral and post-doctoral researchers. To better understand the development of high-level talents hub in the GBA, more empirical considerations should be given to explore the approaches of talents cultivation and attraction in the GBA. What remains to explore is the ways to better attract, train, support and retain these talents in the cross-systems context. This paper aims to investigate the role of university in human capital development under China’s national agenda of GBA integration through the lens of universities and actors. Two flagship comprehensive universities are selected to be the cases and 30 interviews with university officials, research leaders, post-doctors and doctoral candidates are used for analysis. In particular, we look at in what ways have universities aligned their strategies and practices to the Chinese government’s GBA development strategy? What strategies and practices have been developed by universities for the cultivation and attraction of high-level research labor? And what impacts the universities have made for the regional development? The main arguments of this research highlights the specific ways in which universities in smaller sub-regions can collaborate in high-level human capital formation and the role policy can play in facilitating such collaborations.Keywords: university, human capital, regional development, triple-helix model
Procedia PDF Downloads 1138835 Reproduction of New Media Art Village around NTUT: Heterotopia of Visual Culture Art Education
Authors: Yu Cheng-Yu
Abstract:
‘Heterotopia’, ‘Visual Cultural Art Education’ and ‘New Media’ of these three subjects seemingly are irrelevant. In fact, there are synchronicity and intertextuality inside. In addition to visual culture, art education inspires students the ability to reflect on popular culture image through visual culture teaching strategies in school. We should get involved in the community to construct the learning environment that conveys visual culture art. This thesis attempts to probe the heterogeneity of space and value from Michel Foucault and to research sustainable development strategy in ‘New Media Art Village’ heterogeneity from Jean Baudrillard, Marshall McLuhan's media culture theory and social construction ideology. It is possible to find a new media group that can convey ‘Visual Culture Art Education’ around the National Taipei University of Technology in this commercial district that combines intelligent technology, fashion, media, entertainment, art education, and marketing network. Let the imagination and innovation of ‘New Media Art Village’ become ‘implementable’ and new media Heterotopia of inter-subjectivity with the engagement of big data and digital media. Visual culture art education will also bring aesthetics into the community by New Media Art Village.Keywords: social construction, heterogeneity, new media, big data, visual culture art education
Procedia PDF Downloads 2488834 A Study of Transferable Strategies in Multilanguage Learning
Authors: Zixi You
Abstract:
With the demand of multilingual speakers increasing in the job market, multi-language learning programs have become more and more popular among undergraduate students. A study on multi-language learning strategies is therefore highly demanded on both practical and theoretical levels. Based on previous classification of learning strategies in SLA, and an investigation of BA Modern Language program students (with post-A level L2 and ab initio L3 learning experience from year one), this study explores and compares different types of learning strategies used by multi-language speakers and learners, transferable learning strategies between L2 and L3, and factors affecting the transfer. The results indicate that all the 23 types of learning strategies of L2 are employed when learning L3 from ab initio level, yet with different tendencies. Learning strategy transfer from L2 to L3 (i.e., the learners attribute the applying of these L3 learning strategies to be a direct result of their L2 learning experience) are observed in all 23 types of learning strategies. Comparatively, six types of “cognitive strategies” have higher transfer tendency than others. With regard to the failure of the transfer of some particular L2 strategies and the development of independent L3 strategies of individual learners, factors such as language proficiency, language typology and learning environment have played important roles among others. The presentation of this study will provide audiences with detailed data, insightful analysis and discussion on both theoretical and practical aspects of multi-language learning that will benefit both students and educators.Keywords: learning strategy, multi-language acquisition, second language acquisition, strategy transfer
Procedia PDF Downloads 5758833 Can Urbanisation Be the Cause for Increasing Urban Poverty: An Exploratory Analysis for India
Authors: Sarmistha Singh
Abstract:
An analysis of trend of urbanization and urban poverty in recent decades is showing that a distinctly reducing rural poverty and increasing in urban areas. It can be argued that the higher the urbanization fuelled by the urban migration to city, which is picking up people from less skilled, education so they faced obstacle to enter into the mainstream economy of city. The share of workforce in economy is higher; in contrast it remains as negligence. At the same time, less wages, absence of social security, social dialogue make them insecure. The vulnerability in their livelihood found. So the paper explores the relation of urbanization and urban poverty in the city, in other words how the urbanization process affecting the urban space in creating the number of poor people in the city. The central focus is the mobility of people with less education and skilled with motive of job search and better livelihood. In many studies found the higher the urbanization and higher the urban poverty in city. In other words, poverty is the impact of urbanization. The strategy of urban inequality through ‘dispersal of concentration’ by the World Bank and others, need to be examined.Keywords: urbanization, mobility, urban poverty, informal settlements, informal worker
Procedia PDF Downloads 4148832 Combating Illegal Logging in Malaysia: Policies and Strategies under National Forestry Act (NFA) 1984
Authors: Muhammad Nur Haniff Mohd Noor, Rokiah Kadir, Suriyani Muhamad
Abstract:
The National Forestry Act (NFA) 1984 is the primary forest law that regulates forest-related activities in Peninsular Malaysia. In the 1990s, abundance of illegal logging cases have called for legislative reform of the NFA 1984. As a result, NFA 1984 was amended in 1993 with the principal goal of controlling illegal forest encroachment in the forms of illegal logging, unauthorized harvesting, unlicensed forest settlement and other forms of unlawful activities. At a conceptual level, this paper discusses the policies and strategies implemented under the NFA 1984 (Amendment 1993) that are dedicated to overcome illegal logging. Then, the policies and strategies employed are reviewed and evaluated. Next, this paper conceptually discusses the loopholes of NFA 1984 (Amendment 1993) in relation to aspects where the regulation is considered insufficient to curb illegal logging. In the final section, vital actions and suggested improvements to improve the overall effectiveness of NFA 1984 (Amendment 1993) are examined.Keywords: forest law and regulation, illegal logging, National Forestry Act 1984, NFA 1984, Amendment 1993, Peninsular Malaysia
Procedia PDF Downloads 2608831 Compromising Relevance for Elegance: A Danger of Dominant Growth Models for Backward Economies
Authors: Givi Kupatadze
Abstract:
Backward economies are facing a challenge of achieving sustainable high economic growth rate. Dominant growth models represent a roadmap in framing economic development strategy. This paper examines a relevance of the dominant growth models for backward economies. Cobb-Douglas production function, the Harrod-Domar model of economic growth, the Solow growth model and general formula of gross domestic product are examined to undertake a comprehensive study of the dominant growth models. Deductive research method allows to uncover major weaknesses of the dominant growth models and to come up with practical implications for economic development strategy. The key finding of the paper shows, contrary to what used to be taught by textbooks of economics, that constant returns to scale property of the dominant growth models are a mere coincidence and its generalization over space and time can be regarded as one of the most unfortunate mistakes in the whole field of political economy. The major suggestion of the paper for backward economies is that understanding and considering taxonomy of economic activities based on increasing and diminishing returns to scale represent a cornerstone of successful economic development strategy.Keywords: backward economies, constant returns to scale, dominant growth models, taxonomy of economic activities
Procedia PDF Downloads 375