Search results for: European security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4401

Search results for: European security

4281 Does Operating Cash Flow Really Matter in Value Relevance? A Recent Empirical Analysis on the Largest European Companies

Authors: Francesco Paolone

Abstract:

This paper investigates the role of Operating Cash Flow (OCF) and accruals in firm valuation analyzing financial statement information from the largest European companies and evaluating their relation to firm market value. Using a dataset of 500 largest European companies in 2018, the study investigates the relative value-relevance of equity, net income and operating cash flow (OCF). Findings show that the cash flow measure has the same explanatory power and intensity as equity and earnings to explain the market value. This study contributes to the debate on the value relevance of OCF incremental to book value and earnings. It also extends the literature, showing that OCF has information content (value relevance) superior to earnings and book value in the main European markets (Bepari et al., 2013). Finally, the study provides a support that accounting method choice may confuse investors, who have reduced confidence in accounting earnings and book value; in other words, nowadays European investors rely more on cash flows instead of accruals numbers.

Keywords: Cash Flow Statement, Value Relevance, Accounting, Financial Statement Analysis

Procedia PDF Downloads 132
4280 Constitutional Identity: The Connection between National Constitutions and EU Law

Authors: Norbert Tribl

Abstract:

European contemporary scientific public opinion considers the concept of constitutional identity as a highlighted issue. Some scholars interpret the matter as the manifestation of a conflict of Europe. Nevertheless, constitutional identity is a bridge between the Member States and the EU rather than a river that will wash away the achievements of the integration. In accordance with the opinion of the author, the main problem of constitutional identity in Europe is the undetermined nature: the exact concept of constitutional identity has not been defined until now. However, this should be the first step to understand and use identity as a legal institution. Having regard to this undetermined nature, the legal-theoretical examination of constitutional identity is the main purpose of this study. The concept of constitutional identity appears in the Anglo-Saxon legal systems by a different approach than in the supranational system of European Integration. While the interpretation of legal institutions in conformity with the constitution is understood under it, the European concept is applied when possible conflicts arise between the legal system of the European supranational space and certain provisions of the national constitutions of the member states. The European concept of constitutional identity intends to offer input in determining the nature of the relationship between the constitutional provisions of the member states and the legal acts of the EU integration. In the EU system of multilevel constitutionalism, a long-standing central debate on integration surrounds the conflict between EU legal acts and the constitutional provisions of the member states. In spite of the fact that the Court of Justice of the European Union stated in Costa v. E.N.E.L. that the member states cannot refer to the provisions of their respective national constitutions against the integration. Based on the experience of more than 50 years since the above decision, and also in light of the Treaty of Lisbon, we now can clearly see that EU law has itself identified an obligation for the EU to protect the fundamental constitutional features of the Member States under Article 4 (2) of Treaty on European Union, by respecting the national identities of member states. In other words, the European concept intends to offer input for the determination of the nature of the relationship between the constitutional provisions of the member states and the legal acts of the EU integration.

Keywords: constitutional identity, EU law, European Integration, supranationalism

Procedia PDF Downloads 148
4279 Unified Theory of the Security Dilemma: Geography, MAD and Democracy

Authors: Arash Heydarian Pashakhanlou

Abstract:

The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.

Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence

Procedia PDF Downloads 241
4278 EU Citizenship, Brexit, and Democracy

Authors: Noemi Bessa Vilela

Abstract:

The citizenship of the European Union nowadays established under article 20/1 of the Treaty on the Functioning of the European Union has been a hallmark of the EU’s political integration since the adoption of the Maastricht Treaty. Initially received with some doubt regarding what it would mean to be a European citizen, and what would happen to individual national citizenships, the Union’s citizenship appears to have been relegated at present times to a secondary position in relation to other, more pressing, economic and market policies. Notwithstanding the veritable myriad of specific rights and freedoms attributed to citizens of the Union, it is not hard to understand that, given the importance of citizenship as a true cohesion policy at its core, somewhere along the way the Union has failed in its mission of giving its citizens a feeling of European identity, along with the values it so bravely wants to defend and promote. In fact, notwithstanding the ever-so-permanent presence of the blue and yellow flag next to national flags, and the elections to European Parliament, most citizens have no idea of the relevance of EU law as an integral part of their legal heritage. In fact, it is safe to state, while the majority of traveling nationals are aware of i.e. their right to freely move in between Member-States, most overlook the fact that this is a result of their status as EU citizens. We have now arrived at a crossroad between accepting the law as it is, or to create new possibilities. The question raised is whether the citizens of UK may, or may not, and shall or shall not, keep the EU citizenship.

Keywords: Brexit, democracy, EU citizenship, EU law, TFUE

Procedia PDF Downloads 131
4277 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 191
4276 Scenarios for the Energy Transition in Residential Buildings for the European Regions

Authors: Domenico Carmelo Mongelli, Laura Carnieletto, Michele De Carli, Filippo Busato

Abstract:

Starting from the current context in which the Russian invasion in Ukraine has highlighted Europe's dependence on natural gas imports for heating buildings, this study proposes solutions to resolve this dependency and evaluates related scenarios in the near future. In the first part of this work the methodologies and results of the economic impact are indicated by simulating a massive replacement of boilers powered by fossil fuels with electrically powered hightemperature air-water heat pumps for heating residential buildings in different European climates, without changing the current energy mix. For each individual European region, the costs for the purchase and installation of heat pumps for all residential buildings have been determined. Again for each individual European region, the economic savings during the operation phase that would be obtained in this future scenario of energy transition from fossil fuels to the electrification of domestic heating were calculated. For the European regions for which the economic savings were identified as positive, the payback times of the economic investments were analysed. In the second part of the work, hypothesizing different scenarios for a possible greater use of renewable energy sources and therefore with different possible future scenarios of the energy mix, the methodologies and results of the simulations on the economic analysis and on the environmental analysis are reported which have allowed us to evaluate the future effects of the energy transition from boilers to heat pumps for each European region. In the third part, assuming a rapid short-term diffusion of cooling for European residential buildings, the penetration shares in the cooling market and future projections of energy needs for cooling for each European region have been identified. A database was created where the results of this research relating to 38 European Nations divided into 179 regions were reported. Other previous works on the topics covered were limited to analyzing individual European nations, without ever going into detail about the individual regions within each nation, while the original contribution of the present work lies in the fact that the results achieved allow a specific numerical analysis and punctual for every single European region.

Keywords: buildings, energy, Europe, future

Procedia PDF Downloads 93
4275 Marketing and Commercial Activities Offered on Websites of European Union Banks

Authors: Mario Spremić, Natalija Kokolek, Božidar Jaković, Jurica Šimurina

Abstract:

This paper deals with various questions related to functionality and providing banking services in the European union on the Internet. Due to the fact that we live in the information technologies era, the Internet become a new space for doing economic and business activities in all areas, and especially important in banking. Accepting the busy tempo of life, in the past several years electronic banking has become necessity and a must for most users of banking services. On a sample of 300 web sites of the banks operating in European union (EU) we conduct the research on the functionality of e-banking services offered through banks web sites with the key objective to reveal to what extent the information technologies are used in their business operations. Characteristics of EU banks websites will be examined and compared to the basic groups of business activities on the web. Also some recommendations for the successful bank web sites will be provided.

Keywords: electronic banking, electronic business, European union banks, internet

Procedia PDF Downloads 474
4274 Assessing Creative Agents: Engagement in Addressing Sustainability Challenges and Alignment with New European Bauhaus Principles

Authors: Chema Segovia, Pau Díaz-Solano, Tony Ramos Murphy

Abstract:

The PALIMPSEST project, funded by Horizon 2020 and associated with the New European Bauhaus, aims to revitalize sustainability practices in heritage landscapes through co-creation processes led by creative agents. Specifically, PALIMPSEST focuses on the pivotal roles of architecture, design, and art in addressing sustainability challenges. The project aims to demonstrate that these creative disciplines can generate a distinctive kind of value while addressing environmental needs, enhancing societal engagement, supporting foresighting activities, and increasing awareness. In the summer of 2023, Palimpsest launched an open call to select the teams that will lead the development of three creativity-based sustainability processes in three different pilot cities: Jerez de la Frontera (Spain), Lodz (Poland), and Milan (Italy). The call received 141 applications. Through a survey conducted among the candidates and an in-depth analysis of their proposals, we assessed the level of engagement that European creative agents have in tackling sustainability challenges, as well as their alignment with the principles advocated by the New European Bauhaus.

Keywords: arts, architecture, co-creation, design, new European Bauhaus, sustainability

Procedia PDF Downloads 83
4273 The European Legislation on End-of-Waste

Authors: Claudio D'Alonzo

Abstract:

According to recent tendencies, progress on resource efficiency is possible and it will lead to economic, environmental, and social benefits. The passage to a circular economy system, in which all the materials and energy will maintain their value for as long as possible, waste is reduced and only a few resources are used, is one of the most relevant parts of the European Union's environmental policy to develop a sustainable, competitive and low-carbon economy. A definition of circular economy can be found in Decision 1386/2013/EU of the European Parliament and of the Council on a General Union Environment Action Programme to 2020 named “Living well, within the limits of our planet”. The purpose of renewing waste management systems in the UE and making the European model one of the most effective in the world, a revised waste legislative framework entered into force in July 2018. Regarding the Italian legislation, the laws to be modified are the Legislative Decree 3 April 2006, n. 152 and the laws ruling waste management, end-of-waste, by-products and, the regulatory principles regarding circular economy. European rules on end-of-waste are not fully harmonised and so there are legal challenges. The target to be achieved is full consistency between the laws implementing waste and chemicals policies. Only in this way, materials will be safe, fit-for-purpose and designed for durability; additionally, they will have a low environmental impact.

Keywords: circular economy, end-of-waste, legislation, secondary raw materials

Procedia PDF Downloads 85
4272 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 268
4271 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.

Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security

Procedia PDF Downloads 168
4270 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel

Abstract:

The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.

Keywords: security, cooperation, asymmetrical, area denial

Procedia PDF Downloads 804
4269 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 501
4268 Adding Security Blocks to the DevOps Lifecycle

Authors: Andrew John Zeller, Francis Pouatcha

Abstract:

Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.

Keywords: information security, data security, cybersecurity, devOps, IT management

Procedia PDF Downloads 121
4267 The Effects of Cross-Border Use of Drones in Nigerian National Security

Authors: H. P. Kerry

Abstract:

Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.

Keywords: armed drones, drones, cross-border, national security

Procedia PDF Downloads 158
4266 Does sustainability disclosure improve analysts’ forecast accuracy Evidence from European banks

Authors: Albert Acheampong, Tamer Elshandidy

Abstract:

We investigate the extent to which sustainability disclosure from the narrative section of European banks’ annual reports improves analyst forecast accuracy. We capture sustainability disclosure using a machine learning approach and use forecast error to proxy analyst forecast accuracy. Our results suggest that sustainability disclosure significantly improves analyst forecast accuracy by reducing the forecast error. In a further analysis, we also find that the induction of Directive 2014/95/European Union (EU) is associated with increased disclosure content, which then reduces forecast error. Collectively, our results suggest that sustainability disclosure improves forecast accuracy, and the induction of the new EU directive strengthens this improvement. These results hold after several further and robustness analyses. Our findings have implications for market participants and policymakers.

Keywords: sustainability disclosure, machine learning, analyst forecast accuracy, forecast error, European banks, EU directive

Procedia PDF Downloads 78
4265 Renewable Energy and Energy Security in Malaysia: A Quantitative Analysis

Authors: Endang Jati Mat Sahid, Hussain Ali Bekhet

Abstract:

Robust economic growth, increasing population, and personal consumption are the main drivers for the rapid increase of energy demand in Malaysia. Increasing demand has compounded the issue of national energy security due to over-dependence on fossil fuel, depleting indigenous domestic conventional energy resources which in turns has increased the country’s energy import dependence. In order to improve its energy security, Malaysia has seriously embarked on a renewable energy journey. Many initiatives on renewable energy have been introduced in the past decade. These strategies have resulted in the exploding growth of renewable energy deployment in Malaysia. Therefore, this study investigated the impact of renewable energy deployment on energy security. Secondary data was used to calculate the energy security indicators. The study also compared the results of applying different energy security indicators namely availability, applicability, affordability and acceptability dimension of energy resources. The evaluation shows that Malaysia will experience slight improvement in availability and acceptability dimension of energy security. This study suggests that energy security level could be further enhanced by efficient utilization of energy, reducing carbon content of energy and facilitating low-carbon industries.

Keywords: energy policy, energy security, Malaysia, renewable energy

Procedia PDF Downloads 246
4264 The Mediterranean Migration Crisis: The North East Hotspot Policy

Authors: Loizos A. Hadjivasiliou, May Chehab

Abstract:

Confronted with the human tragedy unfolding in the Mediterranean during the 2011-2016 period, the European Union introduced for the first time the “hotspot approach”, the establishment of facilities for initial reception, identification registration, and fingerprinting of asylum seekers and migrants arriving in the EU by sea, at the frontline Member States. However, the lack of a comprehensive collective policy on migration management and border security left the Mediterranean Member States, mainly Italy, Greece, and Cyprus, struggling to overcome these challenges. The current study sheds light on the implementation of the hotspot approach as the frontispiece of the European response to the migration challenges, which, limited to the operational and financial support of the hosting member states, leads to heterogeneous burden-sharing. Within this framework, it highlights the fact that the implementation of the hotspots as a panacea carries the risk of transforming the Mediterranean member states into giant hotspots with unpredictable consequences for the future of the Schengen area.

Keywords: asylum, burden sharing, hotspots, migration management policy, Schengen area

Procedia PDF Downloads 178
4263 European and Scandinavian Tourists' Perceptions and Desire to Travel in Ranong Province

Authors: Wipanee Maen-In

Abstract:

The objectives of the research are i) to study the motivations of european and scandinavian tourists who select Ranong province as their destinations ii) to study their perception towards the Ranong Province and iii) to study the visitors’ decision making while visiting Ranong Province. The samples of the study are 220 European and Scandinavian tourists’ visitors at the Ranong by accidental sampling and in clouding online questionnaires for 53 sampling. The data analysis includes Percentage, Frequency and One-way ANOVA. The findings from the research are the motivation level of the visitors is considered prominent, the average score of the motivational factors ranks higher than the average of the pull factors to visit the Ranong province when considering the factors analysis, the research shows that the reason that most tourists visit the Ranong is for relaxation while the purity of the natural mineral hot springs is the most important pull factor.

Keywords: European and Scandinavian, Ranong province, tourists’ perceptions, visitors’ decision making

Procedia PDF Downloads 233
4262 Public Perception of Energy Security in Lithuania: Between Material Interest and Energy Independence

Authors: Dainius Genys, Vylius Leonavicius, Ricardas Krikstolaitis

Abstract:

Energy security problems in Lithuania are analyzed on a regular basis; however, there is no comprehensive research on the very issue of the concept of public energy security. There is a lack of attention not only to social determinants of perception of energy security, but also a lack of a deeper analysis of the public opinion. This article aims to research the Lithuanian public perception of energy security. Complex tasks were set during the sociological study. Survey questionnaire consisted of different sets of questions: view of energy security (risk perception, political orientation, and energy security; comprehensiveness and energy security); view of energy risks and threats (perception of energy safety factors; individual dependence and burden; disobedience and risk); view of the activity of responsible institutions (energy policy assessment; confidence in institutions and energy security), demographic issues. In this article, we will focus on two aspects: a) We will analyze public opinion on the most important aspects of energy security and social factors influencing them; The hypothesis is made that public perception of energy security is related to value orientations: b) We will analyze how public opinion on energy policy executed by the government and confidence in the government are intertwined with the concept of energy security. Data of the survey, conducted on May 10-19 and June 7-17, 2013, when Seimas and the government consisted of the coalition dominated by Social Democrats with Labor, Order and Justice Parties and the Electoral Action of Poles, were used in this article. It is important to note that the survey was conducted prior to Russia’s occupation of the Crimea.

Keywords: energy security, public opinion, risk, energy threat, energy security policy

Procedia PDF Downloads 512
4261 Freedom with Limitations: The Nature of Free Expression in the European Case-Law

Authors: Laszlo Vari

Abstract:

In the digital age, the spread of the mobile world and the nature of the cyberspace, offers many new opportunities for the prevalence of the fundamental right to free expression, and therefore, for free speech and freedom of the press; however, these new information communication technologies carry many new challenges. Defamation, censorship, fake news, misleading information, hate speech, breach of copyright etc., are only some of the violations, all of which can be derived from the harmful exercise of freedom of expression, all which become more salient in the internet. Here raises the question: how can we eliminate these problems, and practice our fundamental freedom rightfully? To answer this question, we should understand the elements and the characteristic of the nature of freedom of expression, and the role of the actors whose duties and responsibilities are crucial in the prevalence of this fundamental freedom. To achieve this goal, this paper will explore the European practice to understand instructions found in the case-law of the European Court of Human rights for the rightful exercise of freedom of expression.

Keywords: collision of rights, European case-law, freedom opinion and expression, media law, freedom of information, online expression

Procedia PDF Downloads 139
4260 The Securitization of the European Migrant Crisis (2015-2016): Applying the Insights of the Copenhagen School of Security Studies to a Comparative Analysis of Refugee Policies in Bulgaria and Hungary

Authors: Tatiana Rizova

Abstract:

The migrant crisis, which peaked in 2015-2016, posed an unprecedented challenge to the European Union’s (EU) newest member states, including Bulgaria and Hungary. Their governments had to formulate sound migration policies with expediency and sensitivity to the needs of millions of people fleeing violent conflicts in the Middle East and failed states in North Africa. Political leaders in post-communist countries had to carefully coordinate with other EU member states on joint policies and solutions while minimizing the risk of alienating their increasingly anti-migrant domestic constituents. Post-communist member states’ governments chose distinct policy responses to the crisis, which were dictated by factors such as their governments’ partisan stances on migration, their views of the European Union, and the decision to frame the crisis as a security or a humanitarian issue. This paper explores how two Bulgarian governments (Boyko Borisov’s second and third government formed during the 43rd and 44th Bulgarian National Assembly, respectively) navigated the processes of EU migration policy making and managing the expectations of their electorates. Based on a comparative analysis of refugee policies in Bulgaria and Hungary during the height of the crisis (2015-2016) and a temporal analysis of refugee policies in Bulgaria (2015-2018), the paper advances the following conclusions. Drawing on insights of the Copenhagen school of security studies, the paper argues that cultural concerns dominated domestic debates in both Bulgaria and Hungary; both governments framed the issue predominantly as a matter of security rather than humanitarian disaster. Regardless of the similarities in issue framing, however, the two governments sought different paths of tackling the crisis. While the Bulgarian government demonstrated its willingness to comply with EU decisions (such as the proposal for mandatory quotas for refugee relocation), the Hungarian government defied EU directives and became a leading voice of dissent inside the EU. The current Bulgarian government (April 2017 - present) appears to be committed to complying with EU decisions and accepts the strategy of EU burden-sharing, while the Hungarian government has continually snubbed the EU’s appeals for cooperation despite the risk of hefty financial penalties. Hungary’s refugee policies have been influenced by the parliamentary representation of the far right-wing party Movement for a Better Hungary (Jobbik), which has encouraged the majority party (FIDESZ) to adopt harsher anti-migrant rhetoric and more hostile policies toward refugees. Bulgaria’s current government is a coalition of the center-right Citizens for a European Development of Bulgaria (GERB) and its far right-wing junior partners – the United Patriots (comprised of three nationalist political parties). The parliamentary presence of Jobbik in Hungary’s parliament has magnified the anti-migrant stance, rhetoric, and policies of Mr. Orbán’s Civic Alliance; we have yet to observe a substantial increase in the anti-migrant rhetoric and policies in Bulgaria’s case. Analyzing responses to the migrant/refugee crisis is a critical opportunity to understand how issues of cultural identity and belonging, inclusion and exclusion, regional integration and disintegration are debated and molded into policy in Europe’s youngest member states in the broader EU context.

Keywords: Copenhagen School, migrant crisis, refugees, security

Procedia PDF Downloads 121
4259 A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed.

Keywords: Belgium, counterterrorism strategies, human rights, immigration law

Procedia PDF Downloads 106
4258 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 593
4257 Re-Imagining and De-Constructing the Global Security Architecture

Authors: Smita Singh

Abstract:

The paper develops a critical framework to the hegemonic discourses resorted to by the dominant powers in the global security architecture. Within this framework, security is viewed as a discourse through which identities and threats are represented and produced to legitimize the security concerns of few at the cost of others. International security have long been driven and dominated by power relations. Since the end of the Cold War, the global transformations have triggered contestations to the idea of security at both theoretical and practical level. These widening and deepening of the concept of security have challenged the existing power hierarchies at the theoretical level but not altered the substance and actors defining it. When discourses are introduced into security studies, several critical questions erupt: how has power shaped security policies of the globe through language? How does one understand the meanings and impact of those discourses? Who decides the agenda, rules, players and outliers of the security? Language as a symbolic system and form of power is fluid and not fixed. Over the years the dominant Western powers, led by the United States of America have employed various discursive practices such as humanitarian intervention, responsibility to protect, non proliferation, human rights, war on terror and so on to reorient the constitution of identities and interests and hence the policies that need to be adopted for its actualization. These power relations are illustrated in this paper through the narratives used in the nonproliferation regime. The hierarchical security dynamics is a manifestation of the global power relations driven by many factors including discourses.

Keywords: hegemonic discourse, global security, non-proliferation regime, power politics

Procedia PDF Downloads 318
4256 Considering Climate Change in Food Security: A Sociological Study Investigating the Modern Agricultural Practices and Food Security in Bangladesh

Authors: Hosen Tilat Mahal, Monir Hossain

Abstract:

Despite being a food-sufficient country after revolutionary changes in agricultural inputs, Bangladesh still has food insecurity and undernutrition. This study examines the association between agricultural practices (as social practices) and food security concentrating on the potential impact of sociodemographic factors and climate change. Using data from the 2012 Bangladesh Integrated Household Survey (BIHS), this study shows how modifiedagricultural practices are strongly associated with climate change and different sociodemographic factors (land ownership, religion, gender, education, and occupation) subsequently affect the status of food security in Bangladesh. We used linear and logistic regression models to analyze the association between modified agricultural practices and food security. The findings indicate that socioeconomic statuses are significant predictors of determining agricultural practices in a society like Bangladesh and control food security at the household level. Moreover, climate change is adversely impactingeven the modified agricultural and food security association version. We conclude that agricultural practices must consider climate change while boosting food security. Therefore, future research should integrate climate change into the agriculture and food-related mitigation and resiliency models.

Keywords: food security, agricultural productivity, climate change, bangladesh

Procedia PDF Downloads 125
4255 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 343
4254 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 169
4253 European Refugee Camps and the Right to an Adequate Standard of Living: Advancing Accountability under International Human Rights Law

Authors: Genevieve Zingg

Abstract:

Since the onset of the 2015 ‘refugee crisis’ in the European Union (EU), migrant deaths have overwhelmingly occurred in the Mediterranean Sea. However, far less attention has been paid to the startling number of injuries, deaths, and allegations of systematic human rights violations occurring within European refugee camps. Most troubling is the assertion that injuries and deaths in EU refugee camps have occurred as a result of negligent management and poor access to healthcare, food, water and sanitation, and other elements that comprise an adequate standard of living under international human rights law. Using available evidence and documentation, this paper will conduct a thorough examination of the causes of death and injury in EU refugee camps, with a specific focus on Greece, in order to identify instances of negligence or conditions that amount to potential breaches of human rights law. Based on its analysis, this paper will subsequently explore potential legal avenues to achieving justice and accountability under international human rights law in order to effectively address and remedy inadequate standards of living causing wrongful death or injury in European refugee camps.

Keywords: European Union, Greece, human rights, international human rights law, migration, refugees

Procedia PDF Downloads 195
4252 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry

Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht

Abstract:

Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.

Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628

Procedia PDF Downloads 168