Search results for: public security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8255

Search results for: public security

6845 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 238
6844 Determining Importance Level of Factors Affecting Selection of Online Shopping Website with AHP: A Research on Young Consumers

Authors: Nurullah Ekmekci, Omer Akkaya, Vural Cagliyan

Abstract:

Increased use of the Internet has resulted in the emergence of a new retail types called online shopping or electronic retail (e-retail). The rapid growth of the Internet has enabled customers to search information about the product and buy these products or services from e-retailers. Although this new form of shopping has grown in a remarkable way because of offering easiness to people, it is not an easy task to capture the success by distinguishing from competitors in this environment which millions of players takes place. For the success, e-retailers should determine the factors which the customers take notice while they are buying from e-retailers. This paper aims to identify the factors that provide preferability for the online shopping websites and the importance levels of these factors. These main criteria which have taken notice are Customer Service Performance (CSP), Website Performance (WSP), Criteria Related to Product (CRP), Ease of Payment (EP), Security/Privacy (SP), Ease of Return (ER), Delivery Service Performance (DSP) and Order Fulfillment Performance (OFP). It has benefited from Analytic Hierarchy Process to determine the priority of the criteria. Based on analysis, Security/Privacy (SP) criteria seems to be most important criterion with 22 % weight. Companies should attach importance to the security and privacy for making their online website more preferable among the online shoppers.

Keywords: AHP (analytical hierarchy process), multi-criteria decision making, online shopping, shopping

Procedia PDF Downloads 240
6843 A Comparative Human Rights Analysis of Expulsion as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

Where criminal law used to be the traditional response to cope with the terrorist threat, European governments are increasingly relying on administrative paths. The reliance on immigration law fits into this trend. Terrorism is seen as a civilization menace emanating from abroad. In this context, the expulsion of dangerous aliens, immigration law’s core task, is put forward as a key security tool. Governments all over Europe are focusing on removing dangerous individuals from their territory rather than bringing them to justice. This research reflects on the consequences for the expelled individuals’ fundamental rights. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, igniting the recourse to immigration law as a counterterrorism tool. Yet, they adopt a very different approach on this: the United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also 'securitized' its immigration policy after the recent terrorist hit in Stockholm, but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This paper addresses the situation in Belgium. In 2017, the Belgian parliament introduced several legislative changes by which it considerably expanded and facilitated the possibility to expel unwanted aliens. First, the expulsion measure was subjected to new and questionably definitions: a serious attack on the nation’s safety used to be required to expel certain categories of aliens. Presently, mere suspicions suffice to fulfil the new definition of a 'serious threat to national security'. A definition which fails to respond to the principle of legality; the law, nor the prepatory works clarify what is meant by 'a threat to national security'. This creates the risk of submitting this concept’s interpretation almost entirely to the discretion of the immigration authorities. Secondly, in name of intervening more quickly and efficiently, the automatic suspensive appeal for expulsions was abolished. The European Court of Human Rights nonetheless requires such an automatic suspensive appeal under Article 13 and 3 of the Convention. Whether this procedural reform will stand to endure, is thus questionable. This contribution also raises questions regarding expulsion’s efficacy as a key security tool. In a globalized and mobilized world, particularly in a European Union with no internal boundaries, questions can be raised about the usefulness of this measure. Even more so, by simply expelling a dangerous individual, States avoid their responsibility and shift the risk to another State. Criminal law might in these instances be more capable of providing a conclusive and long term response. This contribution explores the human rights consequences of expulsion as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counter-terrorism and human rights, expulsion, immigration law

Procedia PDF Downloads 127
6842 Social Accountability: Persuasion and Debate to Contain Corruption

Authors: A. Lambert-Mogiliansky

Abstract:

In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.

Keywords: accountability, corruption, persuasion, debate

Procedia PDF Downloads 380
6841 Agriculture, Food Security and Poverty Reduction in Nigeria: Cointegration and Granger Causality Approach

Authors: Ogunwole Cecilia Oluwakemi, Timothy Ayomitunde Aderemi

Abstract:

Provision of sufficient food and elimination of abject poverty have usually been the conventional benefits of agriculture in any society. Meanwhile, despite the fact that Nigeria is an agrarian society, food insecurity and poverty have become the issues of concern among both scholars and policymakers in the recent times. Against this backdrop, this study examined the nexus among agriculture, food security, and poverty reduction in Nigeria from 1990 to 2019 within the framework of the Cointegration and Granger Causality approach. Data was collected from the Central Bank of Nigeria Statistical Bulletin and the World Development Indicators, respectively. The following are the major results that emanated from the study. A long run equilibrium relationship exists among agricultural value added, food production index, and GDP per capita in Nigeria. Similarly, there is a unidirectional causality which flows from food production index to poverty reduction in Nigeria. In the same vein, one way causality flows from poverty reduction to agricultural value added in Nigeria. Consequently, this study makes the following recommendation for the policymakers in Nigeria, and other African countries by extension, that agricultural value added and food production are the important variables that cannot be undermined when poverty reduction occupies the central focus of the policymakers. Therefore, any time these policymakers want to reduce poverty, policies that drive agricultural value added and food production should be embarked upon. Therefore, this study will contribute to the literature by establishing the type of linkage that exists between agriculture, food security, and poverty reduction in Nigeria.

Keywords: agriculture, value added, food production, GDP per capita, Nigeria

Procedia PDF Downloads 195
6840 Electronic Government around the World: Key Information and Communication Technology Indicators

Authors: Isaac Kofi Mensah

Abstract:

Governments around the world are adopting Information and Communication Technologies (ICTs) because of the important opportunities it provides through E-government (EG) to modernize government public administration processes and delivery of quality and efficient public services. Almost every country in the world is adopting ICT in its public sector administration (EG) to modernize and change the traditional process of government, increase citizen engagement and participation in governance, as well as the provision of timely information to citizens. This paper, therefore, seeks to present the adoption, development and implementation of EG in regions globally, as well as the ICT indicators around the world, which are making EG initiatives successful. Europe leads the world in its EG adoption and development index, followed by the Americas, Asia, Oceania and Africa. There is a gradual growth in ICT indicators in terms of the increase in Internet access and usage, increase in broadband penetration, an increase of individuals using the Internet at home and a decline in fixed telephone use, while the mobile cellular phone has been on the increase year-on-year. Though the lack of ICT infrastructure is a major challenge to EG adoption and implementation around the world, in Africa it is very pervasive, hampering the expansion of Internet access and provision of broadband, and hence is a barrier to the successful adoption, development, and implementation of EG initiatives in countries on the continent. But with the general improvement and increase in ICT indicators around the world, it provides countries in Europe, Americas, Asia, Arab States, Oceania and Africa with the huge opportunity to enhance public service delivery through the adoption of EG. Countries within these regions cannot fail their citizens who desire to enjoy an enhanced and efficient public service delivery from government and its many state institutions.

Keywords: e-government development index, e-government, indicators, information and communication technologies (ICTs)

Procedia PDF Downloads 302
6839 Carbon Emission Reduction by Compact City Construction in Toyama, Japan

Authors: Benyan Jiang, Dawei Xia, Yong Li

Abstract:

Compact city construction is considered as an effective measure to reduce carbon emission in city lives. Toyama City started its compact city strategy in 2000 and was selected as a Japanese Environmental Model City in 2008 for its achievement. This paper takes Toyama as a study case, aiming to find how city polices affected people’s life styles and reduced carbon emission. The main materials used in this study are first-hand documents, like urban planning materials, government annual report and statistic data from transportation association. It is found that the main measures taken by Toyama City include the construction of light rail transit, increasing the frequency of buses, building park and ride parking lots. In addition to hardware facilities, it also offers flexible policies like passengers' coupons for the senior citizens and free use of parking lots by buying shopping vouchers. Besides, Toyama City encourages citizens to live within 500 meters of public transportation. People who buy an apartment near public transportation will receive 500,000 Japanese Yen. These measures have proven to their effects. Compared with 2005, in 2014, the transportation sector reduced emissions of 2.35 million tons of CO₂, 13.6%. This aspect is related to the increase in the number of cars in public transport and also related to fuel improvement.

Keywords: Toyama, compact city, public transportation, CO₂ reduction

Procedia PDF Downloads 142
6838 An Application of Contingent Valuation Method in Valuing Protected Area: A Case Study of Pulau Kukup National Parks

Authors: A. Mukrimah, M. Mohd Parid, H. F. Lim

Abstract:

Wetland ecosystem has valuable resources that contribute to national income generation and public well-being, either directly by resources that have a market value or indirectly by resources that have no market value. Economic approach is used to evaluate the resources to determine the best use of wetland resources and should be emphasized in policy development planning. This approach is to prevent imbalance in the allocation of resources and welfare benefits. A case study was conducted in 2016 to assess the economic value of wetland ecosystem services at Pulau Kukup National Parks (PKNP). This study has applied dichotomous choice survey design Contingent Valuation Method (CVM) to investigate empirically the willingness-to-pay (WTP) by the public. The study interviewed 400 household respondents at Pontian, Johor. Analysis showed 81% of household interviewed were willing to contribute to the Wetland Conservation Trust Fund. The results also indicated that on average a household was willing to pay RM87 annually. By taking into account 21,664 households in Pontian district in 2016, public’s contribution to conserves wetland ecosystem at PKNP was calculated to be RM1, 884,334. From the public’s interest to contribute to the conservation of wetland ecosystem services at PKNP, it indicates that more concerted effort is needed by both the federal and state governments to conserve and rehabilitate the mangrove ecosystem in Malaysia.

Keywords: environmental economy, economic valuation, choice experiment, Pulau Kukup national parks

Procedia PDF Downloads 190
6837 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 756
6836 The Importance of Municipal Agenda for Gender Policies in Brazilian Federalism

Authors: Eliane Cristina De Carvalho Mendoza Meza

Abstract:

The Brazilian Federal Constitution from 1988 innovated with decentralized management, sharing the decision process among the federal government, states, and municipality (federalism). This innovation gave the opportunity to the civil society participates in the public policy agenda, including the municipal one; the state recognized that new actors were needed now it has been one more actor and not the only one. It was in this context that the woman’s Policy Secretaries were created in the three levels of government: federal, state and municipal. It intend to reduce the historical and social differences between men and women, especially in the poorest municipalities, working in a network basis with other secretaries, governmental institutions and non-governmental organizations to promote actions that can result in benefits and empowerment for women. In addition, they promote actions to protect them from domestic violence and to help them to learn how generate income. It was not a calm process, women have been fighting for their rights since the 1970s and despite the gender equality was recognized in the Federal Constitution of 1988, just in 2013 it was possible to see a real growth in the creation of municipal Women’s Policy Secretary. In 2009, just 6.5% of the cities in Brazil had implemented the Secretary; in 2013, it was 11%. The municipality realized that the gender issue was in reality a public problem, so the municipal agenda incorporated it and transformed in public policy, creating the municipal Women’s Policy Secretary. The introduction of a gender policy in Brazilian municipalities shows us that the female citizens are treated as political subjects and it is the first step to try to compensate inequality between men and women in the local level. It becomes more important when the Brazilian federalism is analyzed. In Brazil, the federal government controls the municipalities’ budgets to implement federal public policies and others federal interests, so having a public policy of gender approved by the actors in the local government with so little freedom to manage is something very important. It is necessary mark some points: taking a gender policy to the poorest cities is a form to protect all citizens with no distinction, men and women, as recommended in the Federal Constitution; not all problems in a city center in the municipal agenda, this only happens when a problem is perceived as an issue, it means the women situation was perceived as important, so that it became a public policy; at least, the gender public policy intend to emancipate and contemplate the empowerment of women.

Keywords: federalism, gender, municipal agenda, social participation

Procedia PDF Downloads 427
6835 Board of Directors of Small and Medium-Sized Enterprises to Go Public: Characteristics and Moderating Factors

Authors: María-José Palacin-Sanchez, Filippo Di Pietro, Reyes Samaniego-Medina

Abstract:

This article examines, in an institutional context such as Spanish one, the corporate board structure characteristics and determinants in entrepreneurial firms to go public. Specifically, it explores these issues through all the initial public offerings in the Spanish Alternative Equity Market (MAB), which is a market segment for smaller growing companies. The results show that: a) firm size, age of the company, and the reputation of the auditor and the nominated advisor and Corporate Governance Code favour a larger and more independent board structure that enhances its monitoring functions; and b) leverage, opportunities of growth, sector risk and ownership by executive directors all lead towards a smaller broad of directors where the role of entrepreneurship provided by executive directors remains crucial. This reflects the delicate balance of power between small-business entrepreneurs and financial equity market forces, which demand more transparency and monitoring in the companies.

Keywords: board composition, board size, corporate governance, IPO, SMEs

Procedia PDF Downloads 400
6834 Fracking the UK's Shale Gas Regulatory Regime

Authors: Yanal Abul Failat

Abstract:

The production of oil and natural gas from shale formations is becoming a trend, and many countries with technically and economically recoverable unconventional resources are endeavoring to explore how shale formations may benefit the economy and achieve energy security. The trajectory of shale gas development in the UK is highly supported by the government; in the Gas Generation Strategy Paper published by the UK government on 5 December 2013, it is recognized that the shale gas production would decrease reliance on imports and thus enhance the UK’s energy security. Moreover, the UK Institute of Directors report on UK Shale Gas Potential explains that in the UK there is a potential of production peaking at around 1.13 trillion cubic feet (“tcf”) and a sector that could support around 70,000 jobs and secure net benefit to the Treasury in tax revenues. On this basis, there has been a growing interest in the benefits of exploring the UK’s shale gas but a combination of technical challenges faced in shale gas operations, a stern opposition by environmentalists and concerns on the adequacy of the legal framework have slowed the progress of the emerging UK shale industry.

Keywords: shale gas, UK, legal, oil and gas, energy

Procedia PDF Downloads 711
6833 Relationshiop Between Occupants' Behaviour And Indoor Air Quality In Malaysian Public Hospital Outpatient Department

Authors: Farha Ibrahim, Ely Zarina Samsudin, Ahmad Razali Ishak, Jeyanthini Sathasivam

Abstract:

Introduction: Indoor air quality (IAQ) has recently gained substantial traction as the airborne transmission of infectious respiratory disease has become an increasing public health concern. Public hospital outpatient department (OPD). IAQ warrants special consideration as it is the most visited department in which patients and staff are all directly impacted by poor IAQ. However, there is limited evidence on IAQ in these settings. Moreover, occupants’ behavior like occupant’s movement and operation of door, windows and appliances, have been shown to significantly affect IAQ, yet the influence of these determinants on IAQ in such settings have not been established. Objectives: This study aims to examine IAQ in Malaysian public hospitals OPD and assess its relationships with occupants’ behavior. Methodology: A multicenter cross-sectional study in which stratified random sampling of Johor public hospitals OPD (n=6) according to building age was conducted. IAQ measurements include indoor air temperature, relative humidity (RH), air velocity (AV), carbon dioxide (CO2), total bacterial count (TBC) and total fungal count (TFC). Occupants’ behaviors in Malaysian public hospital OPD are assessed using observation forms, and results were analyzed. Descriptive statistics were performed to characterize all study variables, whereas non-parametric Spearman Rank correlation analysis was used to assess the correlation between IAQ and occupants’ behavior. Results: After adjusting for potential cofounder, the study has suggested that occupants’ movement in new building, like seated quietly, is significantly correlated with AV in new building (r 0.642, p-value 0.010), CO2 in new (r 0.772, p-value <0.001) and old building (r -0.559, p-value 0.020), TBC in new (r 0.747, p-value 0.001) and old building (r -0.559, p-value 0.020), and TFC in new (r 0.777, p-value <0.001) and old building (r -0.485, p-value 0.049). In addition, standing relaxed movement is correlated with indoor air temperature (r 0.823, p-value <0.001) in new building, CO2 (r 0.559, p-value 0.020), TBC (r 0.559, p-value 0.020), and TFC (r -0.485, p-value 0.049) in old building, while walking is correlated with AV in new building (r -0.642, p-value 0.001), CO2 in new (r -0.772, p-value <0.001) and old building (r 0.559, p-value 0.020), TBC in new (r -0.747, p-value 0.001) and old building (r 0.559, p-value 0.020), and TFC in old building (r -0.485, p-value 0.049). The indoor air temperature is significantly correlated with number of doors kept opened (r 0.522, p-value 0.046), frequency of door adjustments (r 0.753, p-value 0.001), number of windows kept opened (r 0.522, p-value 0.046), number of air-conditioned (AC) switched on (r 0.698, p-value 0.004) and frequency of AC adjustment (r 0.753, p-value 0.001) in new hospital OPD building. AV is found to be significantly correlated with number of doors kept opened (r 0.642, p-value 0.01), frequency of door adjustments (r 0.553, p-value 0.032), number of windows kept opened (r 0.642, p-value 0.01), and frequency of AC adjustment, number of fans switched on, and frequency of fans adjustment(all with r 0.553, p-value 0.032) in new building. In old hospital OPD building, the number of doors kept opened is significantly correlated with CO₂, TBC (both r -0.559, p-value 0.020) and TFC (r -0.495, p-value 0.049), frequency of door adjustment is significantly correlated with CO₂, TBC (both r-0.559, p-value 0.020) and TFC (r -0.495, p-value 0.049), number of windows kept opened is significantly correlated with CO₂, TBC (both r 0.559, p-value 0.020) and TFC (r 0.495, p-value 0.049), frequency of window adjustment is significantly correlated with CO₂,TBC (both r -0.559, p-value 0.020) and TFC (r -0.495, p-value 0.049), number of AC switched on is significantly correlated with CO₂, TBC (both r -0.559, p-value 0.020) and TFC (r -0.495, p-value 0.049),, frequency of AC adjustment is significantly correlated with CO2 (r 0.559, p-value 0.020), TBC (0.559, p-value 0.020) and TFC (r -0.495, p-value 0.049), number of fans switched on is significantly correlated with CO2, TBC (both r 0.559, p-value 0.020) and TFC (r 0.495, p-value 0.049), and frequency of fans adjustment is significantly correlated with CO2, TBC (both r -0.559, p-value 0.020) and TFC (r -0.495, p-value 0.049). Conclusion: This study provided evidence on IAQ parameters in Malaysian public hospitals OPD and significant factors that may be effective targets of prospective intervention, thus enabling stakeholders to develop appropriate policies and programs to mitigate IAQ issues in Malaysian public hospitals OPD.

Keywords: outpatient department, iaq, occupants practice, public hospital

Procedia PDF Downloads 93
6832 Designing Urban Spaces Differently: A Case Study of the Hercity Herstreets Public Space Improvement Initiative in Nairobi, Kenya

Authors: Rehema Kabare

Abstract:

As urban development initiatives continue to emerge and are implemented amid rapid urbanization and climate change effects in the global south, the plight of women is only being noticed. The pandemic exposed the atrocities, violence and unsafety women and girls face daily both in their homes and in public urban spaces. This is a result of poorly implemented and managed urban structures, which women have been left out of during design and implementation for centuries. The UN Habitat’s HerCity toolkit provides a unique opportunity to change course for both governments and civil society actors where women and girls are onboarded onto urban development initiatives, with their designs and ideas being the focal point. This toolkit proves that when women and girls design, they design for everyone. The HerCity HerStreets, Public Space Improvement Initiative, resulted in a design that focused on two aspects: Streets are a shared resource, and Streets are public spaces. These two concepts illustrate that for streets to be experienced effectively as cultural spaces, they need to be user-friendly, safe and inclusive. This report demonstrates how the HerCity HerStreets as a pilot project can be a benchmark for designing urban spaces in African cities. The project focused on five dimensions to improve the air quality of the space, the space allocation to street vending and bodaboda (passenger motorcycle) stops parking and the green coverage. The process displays how digital tools such as Minecraft and Kobo Toolbox can be utilized to improve citizens’ participation in the development of public spaces, with a special focus on including vulnerable groups such as women, girls and youth.

Keywords: urban space, sustainable development, gender and the city, digital tools and urban development

Procedia PDF Downloads 82
6831 Collaborative Governance to Foster Public Good: The Case of the Etorkizuna Eraikiz Initiative

Authors: Igone Guerra, Xabier Barandiaran

Abstract:

The deep crisis (economic, social and cultural) in which Europe and Gipuzkoa, in the Basque Country (Spain), have been immersed in since 2008 forces governments to face a necessary transformation. These challenges demand different solutions and answers to meet the needs of the citizens. Adapting to continuous and sometimes abrupt changes in the social and political landscape requires an undeniable will to reinvent the way in which governments practice politics. This reinvention of government should help us build different organizations that, first, develop challenging public services, second, respond effectively to the needs of the citizens, and third, manage scarce resources, ultimately offering a contemporary concept of public value. In this context, the Etorkizuna Eraikiz initiative was designed to face the future challenges of the territory in a collaborative way. The aim of the initiative is to promote an alternative form of governance to generate common good and greater public value. In Etorkizuna Eraikiz democratic values, such as collaboration, participation, and accountability are prominent. This government approach is based on several features such as the creation of relational spaces to design and deliberate about the public politics or the promotion of a team-working approach, breaking down the silos between and within organizations, as an exercise in defining a shared vision regarding the Future of the Territory. A future in which the citizens are becoming actors in the problem-solving process and in the construction of a culture of participation and collective learning. In this paper, the Etorkizuna Eraikiz initiative will be presented (vision and methodology) as a model of a local approach to public policy innovation resulting in a way of governance that is more open and collaborative. Based on this case study, this paper explores the way in which collaborative governance leads to better decisions, better leadership, and better citizenry. Finally, the paper also describes some preliminary findings of this local approach, such as the level of knowledge of the citizenry about the projects promoted within Etorkizuna Eraikiz as well as the link between the challenges of the territory, as identified by the citizenry, and the political agenda promoted by the provincial government. Regarding the former, the Survey on the socio-political situation of Gipuzkoa showed that 27.9% of the respondents confirmed that they knew about the projects promoted within the initiative and gave it a mark of 5.71. In connection with the latter, over the last three years, 65 millions of euros have been allocated for a total of 73 projects that have covered socio-economic and political challenges such as aging, climate change, mobility, participation in democratic life, and so on. This governance approach of Etorkizuna Eraikiz has allowed the local government to match the needs of citizens to the political agenda fostering in this way a shared vision about the public value.

Keywords: collaborative governance, citizen participation, public good, social listening, public innovation

Procedia PDF Downloads 138
6830 An Evaluation of Medical Waste in Health Facilities through Data Envelopment Analysis (DEA) Method: Turkey-Amasya Public Hospitals Union Model

Authors: Murat Iskender Aktaş, Sadi Ergin, Rasime Acar Aktaş

Abstract:

In the light of fast-paced changes and developments in the health sector, the Ministry of Health started a new structuring with decree law numbered 663 within the scope of the Project of Transformation in Health. Accordingly, hospitals should ensure patient satisfaction through more efficient, more effective use of resources and sustainable finance by placing patients in the centre and should operate to increase efficiency to its maximum level while doing these. Within this study, in order to find out how efficient the hospitals were in terms of medical waste management between the years 2011-2014, the data from six hospitals of Amasya Public Hospitals Union were evaluated separately through Data Envelopment Analysis (DEA) method. First of all, input variables were determined. Input variables were the number of patients admitted to polyclinics, the number of inpatients in clinics, the number of patients who were operated and the number of patients who applied to the laboratory. Output variable was the cost of medical wastes in Turkish liras. Each hospital’s total medical waste level before and after public hospitals union; the amounts of average medical waste per patient admitted to polyclinics, per inpatient in clinics, per patient admitted to laboratory and per operated patient were compared within each group. In addition, average medical waste levels and costs were compared for Turkey in general and Europe in general. Paired samples t-test was used to find out whether the changes (increase-decrease) after public hospitals union were statistically significant. The health facilities that were unsuccessful in terms of medical waste management before and after public hospital union and the factors that caused this failure were determined. Based on the results, for each health facility that was ineffective in terms of medical waste management, the level of improvement required for each input was determined. The results of the study showed that there was an improvement in medical waste management applications after the health facilities became a member of public hospitals union; their medical waste levels were lower than the average of Turkey and Europe while the averages of cost of disposal were the highest.

Keywords: medical waste management, cost of medical waste, public hospitals, data envelopment analysis

Procedia PDF Downloads 415
6829 Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations

Authors: Sadiq Nasir

Abstract:

The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture.

Keywords: cybersecurity, cybersecurity awareness, human factor in security, human security

Procedia PDF Downloads 87
6828 Comparative Analysis between Wired and Wireless Technologies in Communications: A Review

Authors: Jafaru Ibrahim, Tonga Agadi Danladi, Haruna Sani

Abstract:

Many telecommunications industry are looking for new ways to maximize their investment in communication networks while ensuring reliable and secure information transmission. There is a variety of communications medium solutions, the two must popularly in used are wireless technology and wired options, such as copper and fiber-optic cable. Wired network has proven its potential in the olden days but nowadays wireless communication has emerged as a robust and most intellect and preferred communication technique. Each of these types of communication medium has their advantages and disadvantages according to its technological characteristics. Wired and wireless networking has different hardware requirements, ranges, mobility, reliability and benefits. The aim of the paper is to compare both the Wired and Wireless medium on the basis of various parameters such as usability, cost, efficiency, flexibility, coverage, reliability, mobility, speed, security etc.

Keywords: cost, mobility, reliability, speed, security, wired, wireless

Procedia PDF Downloads 470
6827 Peace Based Diplomacy, Peace Communication and Peace Lobbying in the Example of Turkey-France Relations

Authors: Bilgehan Gültekin, Tuba Gültekin

Abstract:

The first stage to procure peace communication is to construct a mutual accordance, which can be defined as: To constitute reconciliation ground in order to open and constitute the right peace and dialogue areas. For example: In Turkey’s EU entry process, in order to procure French public opinion, to constitute a communication frame is a must. For the constitution of this frame, the titles of discussion in which it will be moved and for which French public opinion will show its support must be determined. The most important title of this ground is Turkey’s peace potential for Europe with its strategic position. For this reason, it’s is so strategic for peace communication that Turkey’s contributions for Europe and World should be opened up for discussion in public opinion in France and be introduced as a strong accordance ground.Peace based diplomacy, peace communication strategies and peace lobbying in the example of Turkey-France relations presents a strong peace titles.

Keywords: intercultural communication, mediation education, common sense leaders, artistic sensitivity

Procedia PDF Downloads 454
6826 ANOVA-Based Feature Selection and Machine Learning System for IoT Anomaly Detection

Authors: Muhammad Ali

Abstract:

Cyber-attacks and anomaly detection on the Internet of Things (IoT) infrastructure is emerging concern in the domain of data-driven intrusion. Rapidly increasing IoT risk is now making headlines around the world. denial of service, malicious control, data type probing, malicious operation, DDos, scan, spying, and wrong setup are attacks and anomalies that can affect an IoT system failure. Everyone talks about cyber security, connectivity, smart devices, and real-time data extraction. IoT devices expose a wide variety of new cyber security attack vectors in network traffic. For further than IoT development, and mainly for smart and IoT applications, there is a necessity for intelligent processing and analysis of data. So, our approach is too secure. We train several machine learning models that have been compared to accurately predicting attacks and anomalies on IoT systems, considering IoT applications, with ANOVA-based feature selection with fewer prediction models to evaluate network traffic to help prevent IoT devices. The machine learning (ML) algorithms that have been used here are KNN, SVM, NB, D.T., and R.F., with the most satisfactory test accuracy with fast detection. The evaluation of ML metrics includes precision, recall, F1 score, FPR, NPV, G.M., MCC, and AUC & ROC. The Random Forest algorithm achieved the best results with less prediction time, with an accuracy of 99.98%.

Keywords: machine learning, analysis of variance, Internet of Thing, network security, intrusion detection

Procedia PDF Downloads 125
6825 An Analysis of Machine Translation: Instagram Translation vs Human Translation on the Perspective Translation Quality

Authors: Aulia Fitri

Abstract:

This aims to seek which part of the linguistics with the common mistakes occurred between Instagram translation and human translation. Instagram is a social media account that is widely used by people in the world. Everyone with the Instagram account can consume the captions and pictures that are shared by their friends, celebrity, and public figures across countries. Instagram provides the machine translation under its caption space that will assist users to understand the language of their non-native. The researcher takes samples from an Indonesian public figure whereas the account is followed by many followers. The public figure tries to help her followers from other countries understand her posts by putting up the English version after the Indonesian version. However, the research on Instagram account has not been done yet even though the account is widely used by the worldwide society. There are 20 samples that will be analysed on the perspective of translation quality and linguistics tools. As the MT, Instagram tends to give a literal translation without regarding the topic meant. On the other hand, the human translation tends to exaggerate the translation which leads a different meaning in English. This is an interesting study to discuss when the human nature and robotic-system influence the translation result.

Keywords: human translation, machine translation (MT), translation quality, linguistic tool

Procedia PDF Downloads 321
6824 Pakistan’s Counterinsurgency Operations: A Case Study of Swat

Authors: Arshad Ali

Abstract:

The Taliban insurgency in Swat which started apparently as a social movement in 2004 transformed into an anti-Pakistan Islamist insurgency by joining hands with the Tehrik-e-Taliban Pakistan (TTP) upon its formation in 2007. It quickly spread beyond Swat by 2009 making Swat the second stronghold of TTP after FATA. It prompted the Pakistan military to launch a full-scale counterinsurgency military operation code named Rah-i-Rast to regain the control of Swat. Operation Rah-i-Rast was successful not only in restoring the writ of the State but more importantly in creating a consensus against the spread of Taliban insurgency in Pakistan at political, social and military levels. This operation became a test case for civilian government and military to seek for a sustainable solution combating the TTP insurgency in the north-west of Pakistan. This study analyzes why the counterinsurgency operation Rah-i-Rast was successful and why the previous ones came into failure. The study also explores factors which created consensus against the Taliban insurgency at political and social level as well as reasons which hindered such a consensual approach in the past. The study argues that the previous initiatives failed due to various factors including Pakistan army’s lack of comprehensive counterinsurgency model, weak political will and public support, and states negligence. Also, the initial counterinsurgency policies were ad-hoc in nature fluctuating between military operations and peace deals. After continuous failure, the military revisited its approach to counterinsurgency in the operation Rah-i-Rast. The security forces learnt from their past experiences and developed a pragmatic counterinsurgency model: ‘clear, hold, build, and transfer.’ The military also adopted the population-centric approach to provide security to the local people. This case Study of Swat evaluates the strengths and weaknesses of the Pakistan's counterinsurgency operations as well as peace agreements. It will analyze operation Rah-i-Rast in the light of David Galula’s model of counterinsurgency. Unlike existing literature, the study underscores the bottom up approach adopted by the Pakistan’s military and government by engaging the local population to sustain the post-operation stability in Swat. More specifically, the study emphasizes on the hybrid counterinsurgency model “clear, hold, and build and Transfer” in Swat.

Keywords: Insurgency, Counterinsurgency, clear, hold, build, transfer

Procedia PDF Downloads 364
6823 Privacy for the Internet of Things and its Different Dimensions

Authors: Maryam M Esfahani

Abstract:

The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.

Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies

Procedia PDF Downloads 98
6822 Public Space Appropriation of a Public Peripheric Library in El Agustino, Lima Metropolitana: A Qualitative Study

Authors: Camila Freire Barrios, Gonzalo Rivera Talavera

Abstract:

The importance of public spaces has been shown for many years, and in different disciplines, with one example being their ability for developing a sustainable social environment, especially in mega cities like Lima. The aim of this study was to explore the process of space appropriation that occurs in the Peripheral Library of the district El Agustino in Lima, Peru. Space appropriation is a process by which people develop a link with a place within a specific sociocultural context. This process has been related to positive outcomes, such as: participation and in the development of compassionate behaviors with these places. To achieve the purpose of the research, a qualitative design was selected because this will allowed exploring in deep the process in an specific context. The study interviewed six adults, all of whom were deliberately chosen to have the longest residence time in the district and also utilized the library the most. In a complementary manner, two children and one adolescent were interviewed. Likewise, two observations were made on a weekday and weekend, and public documentation information was collected. As a result, five categories linked to this process were identified. It was found that the process of space appropriation begins with the needs of the people who arrive at the library, which provides benefits to these people by fulfilling them. Next in the process, through the construction of meanings, the library is then valued as a pleasant, productive, safe and regulated place; as a result, people become identified with the library. The identification generated is subsequently reflected in the level of participation that the person has in the library, which may go in a continuum from no participating at all to a more direct involvement in the library activities, as well as voluntary and altruistic work. Finally, this process leads to the library becoming part of the neighborhood. This study allows having a better understanding of how sociospatial processes work in a Latinamerican context and in cities like Lima, where the third of the country’s population lives. Also, Lima has grown in the past 50 years in a excessively way and with lack of planification. Therefore, these results brings new research questions and highlights the importance of learning how to design public spaces in order to promote these processes to develop.

Keywords: bond with the place, place identity, public spaces, space appropriation

Procedia PDF Downloads 243
6821 Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict

Authors: Christopher Holroyd

Abstract:

With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important.

Keywords: human trafficking, reconstruction, security, terrorism

Procedia PDF Downloads 132
6820 Keyloggers Prevention with Time-Sensitive Obfuscation

Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee

Abstract:

Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.

Keywords: authentication, computer security, keylogger, privacy, information leakage

Procedia PDF Downloads 122
6819 Social Impact Bonds in the US Context

Authors: Paula M. Lantz

Abstract:

In the United States, significant socioeconomic and racial inequalities exist in many population-based indicators of health and social welfare. Although a number of effective prevention programs and interventions are available, local and state governments often do not pursue prevention in the face of budgetary constraints and more acute problems. There is growing interest in and excitement about Pay for Success” (PFS) strategies, also referred to as social impact bonds, as an approach to financing and implementing promising prevention programs and services that help the public sector either save money or achieve greater value for an investment. The PFS finance model implements evidence-based interventions using capital from investors who only receive a return on their investment from the government if agreed-upon, measurable outcomes are achieved. This paper discusses the current landscape regarding social impact bonds in the U.S., and their potential and challenges in addressing serious health and social problems. The paper presents an analysis of a number of social science issues that are fundamental to the potential for social impact bonds to successfully address social inequalities in health and social welfare. This includes: a) the economics of the intervention and a potential public payout; b) organizational and management issues in intervention implementation; c) evaluation research design and methods; d) legal/regulatory issues in public payouts to investors; e) ethical issues in the design of social impact bond deals and their evaluation; and f) political issues. Despite significant challenges in the U.S. context, there is great potential for social impact bonds as a type of social impact investing to encourage private investments in evidence-based interventions that address important public health and social problems in underserved populations and provide a return on investment.

Keywords: pay for success, public/private partnerships, social impact bonds, social impact investing

Procedia PDF Downloads 300
6818 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 366
6817 Introduction of Mass Rapid Transit System and Its Impact on Para-Transit

Authors: Khalil Ahmad Kakar

Abstract:

In developing countries increasing the automobile and low capacity public transport (para-transit) which are creating congestion, pollution, noise, and traffic accident are the most critical quandary. These issues are under the analysis of assessors to break down the puzzle and propose sustainable urban public transport system. Kabul city is one of those urban areas that the inhabitants are suffering from lack of tolerable and friendly public transport system. The city is the most-populous and overcrowded with around 4.5 million population. The para-transit is the only dominant public transit system with a very poor level of services and low capacity vehicles (6-20 passengers). Therefore, this study after detailed investigations suggests bus rapid transit (BRT) system in Kabul City. It is aimed to mitigate the role of informal transport and decreases congestion. The research covers three parts. In the first part, aggregated travel demand modelling (four-step) is applied to determine the number of users for para-transit and assesses BRT network based on higher passenger demand for public transport mode. In the second part, state preference (SP) survey and binary logit model are exerted to figure out the utility of existing para-transit mode and planned BRT system. Finally, the impact of predicted BRT system on para-transit is evaluated. The extracted outcome based on high travel demand suggests 10 km network for the proposed BRT system, which is originated from the district tenth and it is ended at Kabul International Airport. As well as, the result from the disaggregate travel mode-choice model, based on SP and logit model indicates that the predicted mass rapid transit system has higher utility with the significant impact regarding the reduction of para-transit.

Keywords: BRT, para-transit, travel demand modelling, Kabul City, logit model

Procedia PDF Downloads 183
6816 Understanding Success Factors of an Information Security Management System Plan Phase Self-Implementation

Authors: Nurazean Maarop, Noorjan Mohd Mustapha, Rasimah Yusoff, Roslina Ibrahim, Norziha Megat Mohd Zainuddin

Abstract:

The goal of this study is to identify success factors that could influence the ISMS self-implementation in government sector from qualitative perspective. This study is based on a case study in one of the Malaysian government agency. Semi-structured interviews involving five key informants were conducted to examine factors addressed in the conceptual framework. Subsequently, thematic analysis was executed to describe the influence of each factor on the success implementation of ISMS. The result of this study indicates that management commitment, implementer commitment and implementer competency are part of the success factors for ISMS self-implementation in Malaysian Government Sector.

Keywords: ISMS success factors, IT project management, IS success, information security

Procedia PDF Downloads 315