Search results for: biodiversity threats
1111 Assessing Native Plant Presence and Maintenance Resource Allocations in New Zealand Backyards: A Nationwide Online Questionnaire
Authors: Megan Burfoot, Shanta Budha-Magar, Ali Ghaffarianhoseini, Amirhoseini Ghaffarianhoseini
Abstract:
Domestic backyards offer a valuable opportunity to contribute to biodiversity conservation efforts and promote ecological sustainability by cultivating native plant species. This study focuses on assessing the presence and maintenance of native plants in New Zealand's residential gardens through an online questionnaire. The survey was designed to collect data on the presence of native, exotic, and lawn plants in New Zealand backyards, alongside the allocation of maintenance resources for each category. Targeting a diverse range of residents and property sizes from different regions of New Zealand, this study sought to gain essential insights into practices related to native plant cultivation. Results reveal there is a collective inclination to reduce lawn coverage and introduce a higher abundance of native and exotic species. A thorough analysis of maintenance practices reveals a significant portion of respondents embracing environmentally friendly gardening, characterized by low-intensity fertilizer usage. Homeowners, especially those residing in their properties, demonstrate proactive engagement in backyard maintenance. Native plants were found to require more time, money and fertilizer for maintenance than those of exotic and lawn species. The insights gained from this study can guide targeted efforts to enhance urban biodiversity, making a significant contribution to the preservation and enrichment of New Zealand's unique biodiversity and ecological heritage in urban settings.Keywords: biodiversity, backyards, planting behaviour, backyard maintenance, native planting
Procedia PDF Downloads 681110 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective
Authors: Obinna Emmanuel Nkomadu
Abstract:
A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea
Procedia PDF Downloads 1481109 Biodiversity Indices for Macrobenthic Community structures of Mangrove Forests, Khamir Port, Iran
Authors: Mousa Keshavarz, Abdul-Reza Dabbagh, Maryam Soyuf Jahromi
Abstract:
The diversity of mangrove macrobenthos assemblages at mudflat and mangrove ecosystems of Port Khamir, Iran were investigated for one year. During this period, we measured physicochemical properties of water temperature, salinity, pH, DO and the density and distribution of the macrobenthos. We sampled a total of 9 transects, at three different topographic levels along the intertidal zone at three stations. Assemblages at class level were compared. The five most diverse and abundant classes were Foraminifers (54%), Gastropods (23%), Polychaetes (10%), Bivalves (8%) & Crustaceans (5%), respectively. Overall densities were 1869 ± 424 ind/m2 (26%) in spring, 2544 ± 383 ind/m2(36%) in summer, 1482 ± 323 ind/m2 (21%) in autumn and 1207 ± 80 ind/m2 (17%) in winter. Along the intertidal zone, the overall relative density of individuals at high, intermediate, and low topographic levels was 40, 30, and 30% respectively. Biodiversity indices were used to compare different classes: Gastropoda (Shannon index: 0.33) and Foraminifera (Simpson index: 0.28) calculated the highest scores. It was also calculated other bio-indices. With the exception of bivalves, filter feeders were associated with coarser sediments at higher intertidal levels, while deposit feeders were associated with finer sediments at lower levels. Salinity was the most important factor acting on community structure, while DO and pH had little influence.Keywords: macrobenthos, biodiversity, mangrove forest, Khamir Port
Procedia PDF Downloads 3761108 Study of Halophytic Vegetation of Chott Gamra (Batna, High Plateaus of Eastern Algeria)
Authors: Marref C., Marref S., Melakhssou M. A.
Abstract:
The halophytic vegetation of Chott Gamra (Gadaïne Eco-complex, High Plateaus of Eastern Algeria) is characterized by a very rich cover. It is structured according to the variation in soil salinity and moisture. The objective of this study is to understand the biodiversity, distribution, and classification of halophytic vegetation. This wetland is characterized by a Mediterranean climate in the semi-arid to cool winter stage. The wetland area of the High Plateaus of Eastern Algeria constitutes a biodiversity reservoir. It is considered exceptional, although it remains little explored and documented to date. The study was conducted over consecutive spring seasons (2020/2021). Indeed, the inventory we established includes forty plant species belonging to fourteen different families, the majority of which are resistant to salinity and drought. These halophytic species that thrive there establish themselves in bands according to their tolerance threshold to salinity and their affinity to the hygroscopic level of the soil. Thus, other edaphic factors may come into play in the zonation of halophytes in saline environments. Species belonging to the Juncaceae and Poaceae families dominate by far the non-flooded vegetation cover of this site. These plants are perfectly adapted to saline environments.Keywords: halophytes, biodiversity, salinity, wetland
Procedia PDF Downloads 491107 Measuring the Resilience of e-Governments Using an Ontology
Authors: Onyekachi Onwudike, Russell Lock, Iain Phillips
Abstract:
The variability that exists across governments, her departments and the provisioning of services has been areas of concern in the E-Government domain. There is a need for reuse and integration across government departments which are accompanied by varying degrees of risks and threats. There is also the need for assessment, prevention, preparation, response and recovery when dealing with these risks or threats. The ability of a government to cope with the emerging changes that occur within it is known as resilience. In order to forge ahead with concerted efforts to manage reuse and integration induced risks or threats to governments, the ambiguities contained within resilience must be addressed. Enhancing resilience in the E-Government domain is synonymous with reducing risks governments face with provisioning of services as well as reuse of components across departments. Therefore, it can be said that resilience is responsible for the reduction in government’s vulnerability to changes. In this paper, we present the use of the ontology to measure the resilience of governments. This ontology is made up of a well-defined construct for the taxonomy of resilience. A specific class known as ‘Resilience Requirements’ is added to the ontology. This class embraces the concept of resilience into the E-Government domain ontology. Considering that the E-Government domain is a highly complex one made up of different departments offering different services, the reliability and resilience of the E-Government domain have become more complex and critical to understand. We present questions that can help a government access how prepared they are in the face of risks and what steps can be taken to recover from them. These questions can be asked with the use of queries. The ontology focuses on developing a case study section that is used to explore ways in which government departments can become resilient to the different kinds of risks and threats they may face. A collection of resilience tools and resources have been developed in our ontology to encourage governments to take steps to prepare for emergencies and risks that a government may face with the integration of departments and reuse of components across government departments. To achieve this, the ontology has been extended by rules. We present two tools for understanding resilience in the E-Government domain as a risk analysis target and the output of these tools when applied to resilience in the E-Government domain. We introduce the classification of resilience using the defined taxonomy and modelling of existent relationships based on the defined taxonomy. The ontology is constructed on formal theory and it provides a semantic reference framework for the concept of resilience. Key terms which fall under the purview of resilience with respect to E-Governments are defined. Terms are made explicit and the relationships that exist between risks and resilience are made explicit. The overall aim of the ontology is to use it within standards that would be followed by all governments for government-based resilience measures.Keywords: E-Government, Ontology, Relationships, Resilience, Risks, Threats
Procedia PDF Downloads 3371106 Analysis of Citation Rate and Data Reuse for Openly Accessible Biodiversity Datasets on Global Biodiversity Information Facility
Authors: Nushrat Khan, Mike Thelwall, Kayvan Kousha
Abstract:
Making research data openly accessible has been mandated by most funders over the last 5 years as it promotes reproducibility in science and reduces duplication of effort to collect the same data. There are evidence that articles that publicly share research data have higher citation rates in biological and social sciences. However, how and whether shared data is being reused is not always intuitive as such information is not easily accessible from the majority of research data repositories. This study aims to understand the practice of data citation and how data is being reused over the years focusing on biodiversity since research data is frequently reused in this field. Metadata of 38,878 datasets including citation counts were collected through the Global Biodiversity Information Facility (GBIF) API for this purpose. GBIF was used as a data source since it provides citation count for datasets, not a commonly available feature for most repositories. Analysis of dataset types, citation counts, creation and update time of datasets suggests that citation rate varies for different types of datasets, where occurrence datasets that have more granular information have higher citation rates than checklist and metadata-only datasets. Another finding is that biodiversity datasets on GBIF are frequently updated, which is unique to this field. Majority of the datasets from the earliest year of 2007 were updated after 11 years, with no dataset that was not updated since creation. For each year between 2007 and 2017, we compared the correlations between update time and citation rate of four different types of datasets. While recent datasets do not show any correlations, 3 to 4 years old datasets show weak correlation where datasets that were updated more recently received high citations. The results are suggestive that it takes several years to cumulate citations for research datasets. However, this investigation found that when searched on Google Scholar or Scopus databases for the same datasets, the number of citations is often not the same as GBIF. Hence future aim is to further explore the citation count system adopted by GBIF to evaluate its reliability and whether it can be applicable to other fields of studies as well.Keywords: data citation, data reuse, research data sharing, webometrics
Procedia PDF Downloads 1771105 Conservation Detection Dogs to Protect Europe's Native Biodiversity from Invasive Species
Authors: Helga Heylen
Abstract:
With dogs saving wildlife in New Zealand since 1890 and governments in Africa, Australia and Canada trusting them to give the best results, Conservation Dogs Ireland want to introduce more detection dogs to protect Europe's native wildlife. Conservation detection dogs are fast, portable and endlessly trainable. They are a cost-effective, highly sensitive and non-invasive way to detect protected and invasive species and wildlife disease. Conservation dogs find targets up to 40 times faster than any other method. They give results instantly, with near-perfect accuracy. They can search for multiple targets simultaneously, with no reduction in efficacy The European Red List indicates the decline in biodiversity has been most rapid in the past 50 years, and the risk of extinction never higher. Just two examples of major threats dogs are trained to tackle are: (I)Japanese Knotweed (Fallopia Japonica), not only a serious threat to ecosystems, crops, structures like bridges and roads - it can wipe out the entire value of a house. The property industry and homeowners are only just waking up to the full extent of the nightmare. When those working in construction on the roads move topsoil with a trace of Japanese Knotweed, it suffices to start a new colony. Japanese Knotweed grows up to 7cm a day. It can stay dormant and resprout after 20 years. In the UK, the cost of removing Japanese Knotweed from the London Olympic site in 2012 was around £70m (€83m). UK banks already no longer lend on a house that has Japanese Knotweed on-site. Legally, landowners are now obliged to excavate Japanese Knotweed and have it removed to a landfill. More and more, we see Japanese Knotweed grow where a new house has been constructed, and topsoil has been brought in. Conservation dogs are trained to detect small fragments of any part of the plant on sites and in topsoil. (II)Zebra mussels (Dreissena Polymorpha) are a threat to many waterways in the world. They colonize rivers, canals, docks, lakes, reservoirs, water pipes and cooling systems. They live up to 3 years and will release up to one million eggs each year. Zebra mussels attach to surfaces like rocks, anchors, boat hulls, intake pipes and boat engines. They cause changes in nutrient cycles, reduction of plankton and increased plant growth around lake edges, leading to the decline of Europe's native mussel and fish populations. There is no solution, only costly measures to keep it at bay. With many interconnected networks of waterways, they have spread uncontrollably. Conservation detection dogs detect the Zebra mussel from its early larvae stage, which is still invisible to the human eye. Detection dogs are more thorough and cost-effective than any other conservation method, and will greatly complement and speed up the work of biologists, surveyors, developers, ecologists and researchers.Keywords: native biodiversity, conservation detection dogs, invasive species, Japanese Knotweed, zebra mussel
Procedia PDF Downloads 1961104 Bridging Livelihood and Conservation: The Role of Ecotourism in the Campo Ma’an National Park, Cameroon
Authors: Gadinga Walter Forje, Martin Ngankam Tchamba, Nyong Princely Awazi, Barnabas Neba Nfornka
Abstract:
Ecotourism is viewed as a double edge sword for the enhancement of conservation and local livelihood within a protected landscape. The Campo Ma’an National Park (CMNP) adopted ecotourism in its management plan as a strategic axis for better management of the park. The growing importance of ecotourism as a strategy for the sustainable management of CMNP and its environs requires adequate information to bolster the sector. This study was carried out between November 2018 and September 2021, with the main objective to contribute to the sustainable management of the CMNP through suggestions for enhancing the capacity of ecotourism in and around the park. More specifically, the study aimed at; 1) Analyse the governance of ecotourism in the CMNP and its surrounding; 2) Assessing the impact of ecotourism on local livelihood around the CMNP; 3) Evaluating the contribution of ecotourism to biodiversity conservation in and around the CMNP; 4) Evaluate the determinants of ecotourism possibilities in achieving sustainable livelihood and biodiversity conservation in and around the CMNP. Data were collected from both primary and secondary sources. Primary data were obtained from household surveys (N=124), focus group discussions (N=8), and key informant interviews (N=16). Data collected were coded and imputed into SPSS (version 19.0) software and Microsoft Excel spreadsheet for both quantitative and qualitative analysis. Findings from the Chi-square test revealed overall poor ecotourism governance in and around the CMNP, with benefit sharing (X2 = 122.774, p <0.01) and conflict management (X2 = 90.839, p<0.01) viewed to be very poor. For the majority of the local population sampled, 65% think ecotourism does not contribute to local livelihood around CMNP. The main factors influencing the impact of ecotourism around the CMNP on the local population’s livelihood were gender (logistic regression (β) = 1.218; p = 0.000); and level of education (logistic regression (β) = 0.442; p = 0.000). Furthermore, 55.6% of the local population investigated believed ecotourism activities do not contribute to the biodiversity conservation of CMNP. Spearman correlation between socio-economic variables and ecotourism impact on biodiversity conservation indicated relationships with gender (r = 0.200, p = 0.032), main occupation (r = 0.300 p = 0.012), time spent in the community (r = 0.287 p = 0.017), and number of children (r =-0.286 p = 0.018). Variables affecting ecotourism impact on biodiversity conservation were age (logistic regression (β) = -0.683; p = 0.037) and gender (logistic regression (β) = 0.917; p = 0.045). This study recommends the development of ecotourism-friendly policies that can accelerate Public Private Partnership for the sustainable management of the CMNP as a commitment toward good governance. It also recommends the development of gender-sensitive ecotourism packages, with fair opportunities for rural women and more parity in benefit sharing to improve livelihood and contribute more to biodiversity conservation in and around the Park.Keywords: biodiversity conservation, Campo Ma’an national park, ecotourism, ecotourism governance, rural livelihoods, protected area management
Procedia PDF Downloads 1191103 Modeling Biomass and Biodiversity across Environmental and Management Gradients in Temperate Grasslands with Deep Learning and Sentinel-1 and -2
Authors: Javier Muro, Anja Linstadter, Florian Manner, Lisa Schwarz, Stephan Wollauer, Paul Magdon, Gohar Ghazaryan, Olena Dubovyk
Abstract:
Monitoring the trade-off between biomass production and biodiversity in grasslands is critical to evaluate the effects of management practices across environmental gradients. New generations of remote sensing sensors and machine learning approaches can model grasslands’ characteristics with varying accuracies. However, studies often fail to cover a sufficiently broad range of environmental conditions, and evidence suggests that prediction models might be case specific. In this study, biomass production and biodiversity indices (species richness and Fishers’ α) are modeled in 150 grassland plots for three sites across Germany. These sites represent a North-South gradient and are characterized by distinct soil types, topographic properties, climatic conditions, and management intensities. Predictors used are derived from Sentinel-1 & 2 and a set of topoedaphic variables. The transferability of the models is tested by training and validating at different sites. The performance of feed-forward deep neural networks (DNN) is compared to a random forest algorithm. While biomass predictions across gradients and sites were acceptable (r2 0.5), predictions of biodiversity indices were poor (r2 0.14). DNN showed higher generalization capacity than random forest when predicting biomass across gradients and sites (relative root mean squared error of 0.5 for DNN vs. 0.85 for random forest). DNN also achieved high performance when using the Sentinel-2 surface reflectance data rather than different combinations of spectral indices, Sentinel-1 data, or topoedaphic variables, simplifying dimensionality. This study demonstrates the necessity of training biomass and biodiversity models using a broad range of environmental conditions and ensuring spatial independence to have realistic and transferable models where plot level information can be upscaled to landscape scale.Keywords: ecosystem services, grassland management, machine learning, remote sensing
Procedia PDF Downloads 2181102 An Overview of the Current Status of Lake Jipe and Its Biodiversity Dilemma
Authors: Mercy Chepkirui, Paul Orina, Robin Abell, Leonard Akwany, Tonny Orina, Mercy Matuma, Rasowo Joseph
Abstract:
Lake jipe, a shared water resource between Kenya and Tanzania located at the East African Coast, is under multiple pressures. The lake has receded from 30Km2 to 27.32Km2 due to prolonged dry spells and intensified water abstraction for irrigation and re-route to Mungu ya Nyumba Dam in Tanzania. Agricultural activities have significantly (90%) contributed to the lake levels decline and further affected the lakes’ aquatic biodiversity. Among the most affected are the commercially important endemic fish species of the lake, of which Oreochromis jipe has experienced the greatest decline. Overfishing, use of illegal unreported and unregulated fishing gears, intensified fishing along protected fish breeding areas as well as poor management and uncoordinated conservation efforts have significantly contributed to the decline of fish catches from 348 kg of O. jipe in 2016 to 90 kg daily catches in 2022. Therefore, the lake is on the verge of extinction if no action is taken. This calls for awareness of the significance of the L. Jipe ecosystems and its immediate and long-term benefits. Further, there is a need to revive alternative economic activities, including aquaculture and sustainable agriculture, to offer alternative livelihood to local communities.Keywords: biodiversity, ecosystem, conservation, fisheries
Procedia PDF Downloads 1761101 Concealed Objects Detection in Visible, Infrared and Terahertz Ranges
Authors: M. Kowalski, M. Kastek, M. Szustakowski
Abstract:
Multispectral screening systems are becoming more popular because of their very interesting properties and applications. One of the most significant applications of multispectral screening systems is prevention of terrorist attacks. There are many kinds of threats and many methods of detection. Visual detection of objects hidden under clothing of a person is one of the most challenging problems of threats detection. There are various solutions of the problem; however, the most effective utilize multispectral surveillance imagers. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. We investigate the possibility of long lasting detection of potentially dangerous objects covered with various types of clothing. In the article we present the results of comparative studies of passive imaging in three spectrums – visible, infrared and terahertzKeywords: terahertz, infrared, object detection, screening camera, image processing
Procedia PDF Downloads 3571100 Leadership in Future Operational Environment
Authors: M. Şimşek
Abstract:
Rapidly changing factors that affect daily life also affect operational environment and the way military leaders fulfill their missions. With the help of technological developments, traditional linearity of conflict and war has started to fade away. Furthermore, mission domain has broadened to include traditional threats, hybrid threats and new challenges of cyber and space. Considering the future operational environment, future military leaders need to adapt themselves to the new challenges of the future battlefield. But how to decide what kind of features of leadership are required to operate and accomplish mission in the new complex battlefield? In this article, the main aim is to provide answers to this question. To be able to find right answers, first leadership and leadership components are defined, and then characteristics of future operational environment are analyzed. Finally, leadership features that are required to be successful in redefined battlefield are explained.Keywords: future operational environment, leadership, leadership components
Procedia PDF Downloads 4321099 Natural Forest Ecosystem Services Provided to Local Populations
Authors: Mohammed Sghir Taleb
Abstract:
Located at the northwest corner of the African continent between 21 ° and 36 ° north latitude and between the 1st and the 17th degree of west longitude, Morocco, with a total area of 715,000 km2, enjoys a privileged position with a coastline of 3 446 km long opening to the Mediterranean and the Atlantic Ocean. Its privileged location with a double coastline and its diverse mountain with four major mountain ranges: the Rif, Middle Atlas, High Atlas and Anti Atlas, with altitudes exceeding 2000 m in the Rif, 3000 m in the Middle Atlas and 4000 m in the High Atlas. Morocco is characterized by an important forest genetic diversity represented by a rich and varied flora and many ecosystems: forest, preforest, presteppe, steppe, Sahara that spans a range of bioclimatic zones: arid, semiarid, subhumid, and humid. The vascular flora of Morocco is rich and highly diversified, with a very significant degree of endemism. Natural flora and ecosystems provide important services to populations represented by grazing, timber harvest, harvesting of medicinal and aromatic plants. This work will be focused on the Moroccan biodiversity and natural ecosystem services and on the interaction between local populations and ecosystems and on the strategies developed by Morocco for restoring and conserving biodiversity and ecosystem services.Keywords: morocco, biodiversity, forest ecosystems, local population
Procedia PDF Downloads 811098 Privacy for the Internet of Things and its Different Dimensions
Authors: Maryam M Esfahani
Abstract:
The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies
Procedia PDF Downloads 971097 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy
Authors: Babatunde Osabiya
Abstract:
Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.Keywords: security risk, legal framework, cyber security and policy, national security
Procedia PDF Downloads 921096 Prioritizing Biodiversity Conservation Areas based on the Vulnerability and the Irreplaceability Framework in Mexico
Authors: Alma Mendoza-Ponce, Rogelio Corona-Núñez, Florian Kraxner
Abstract:
Mexico is a megadiverse country and it has nearly halved its natural vegetation in the last century due to agricultural and livestock expansion. Impacts of land use cover change and climate change are unevenly distributed and spatial prioritization to minimize the affectations on biodiversity is crucial. Global and national efforts for prioritizing biodiversity conservation show that ~33% to 45% of Mexico should be protected. The width of these targets makes difficult to lead resources. We use a framework based on vulnerability and irreplaceability to prioritize conservation efforts in Mexico. Vulnerability considered exposure, sensitivity and adaptive capacity under two scenarios (business as usual, BAU based, on the SSP2 and RCP 4.5 and a Green scenario, based on the SSP1 and the RCP 2.6). Exposure to land use is the magnitude of change from natural vegetation to anthropogenic covers while exposure to climate change is the difference between current and future values for both scenarios. Sensitivity was considered as the number of endemic species of terrestrial vertebrates which are critically endangered and endangered. Adaptive capacity is used as the ration between the percentage of converted area (natural to anthropogenic) and the percentage of protected area at municipality level. The results suggest that by 2050, between 11.6 and 13.9% of Mexico show vulnerability ≥ 50%, and by 2070, between 12.0 and 14.8%, in the Green and BAU scenario, respectively. From an ecosystem perspective cloud forests, followed by tropical dry forests, natural grasslands and temperate forests will be the most vulnerable (≥ 50%). Amphibians are the most threatened vertebrates; 62% of the endemic amphibians are critically endangered or endangered while 39%, 12% and 9% of the mammals, birds, and reptiles, respectively. However, the distribution of these amphibians counts for only 3.3% of the country, while mammals, birds, and reptiles in these categories represent 10%, 16% and 29% of Mexico. There are 5 municipalities out of the 2,457 that Mexico has that represent 31% of the most vulnerable areas (70%).These municipalities account for 0.05% of Mexico. This multiscale approach can be used to address resources to conservation targets as ecosystems, municipalities or species considering land use cover change, climate change and biodiversity uniqueness.Keywords: biodiversity, climate change, land use change, Mexico, vulnerability
Procedia PDF Downloads 1641095 Supervised Learning for Cyber Threat Intelligence
Authors: Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk
Abstract:
The major aim of cyber threat intelligence (CTI) is to provide sophisticated knowledge about cybersecurity threats to ensure internal and external safeguards against modern cyberattacks. Inaccurate, incomplete, outdated, and invaluable threat intelligence is the main problem. Therefore, data analysis based on AI algorithms is one of the emergent solutions to overcome the threat of information-sharing issues. In this paper, we propose a supervised machine learning-based algorithm to improve threat information sharing by providing a sophisticated classification of cyber threats and data. Extensive simulations investigate the accuracy, precision, recall, f1-score, and support overall to validate the designed algorithm and to compare it with several supervised machine learning algorithms.Keywords: threat information sharing, supervised learning, data classification, performance evaluation
Procedia PDF Downloads 1461094 Urban Green Transitioning in The Face of Current Global Change: The Management Role of the Local Government and Residents
Authors: Titilope F. Onaolapo, Christiana A. Breed, Maya Pasgaard, Kristine E. Jensen, Peta Brom
Abstract:
In the face of fast-growing urbanization in most of the world's developing countries, there is a need to understand and address the risk and consequences involved in the indiscriminate use of urban green space. Tshwane city in South Africa has the potential to become one of the world's top biodiversity cities as South Africa is ranked one of the mega countries in biodiversity conservation, and Tshwane metropolitan municipality is the city with the wealthiest biodiversity with grassland biomes. In this study, we focus on the potentials and challenges of urban green transitioning from the Global South perspective with Tshwane city as the case study. We also address the issue of management conflicts that have resulted in informal and illegal activities in and around green spaces, with consequences such as land degradation, loss of livelihoods and biodiversity, and socio-ecological imbalances. A desk study review of eight policy frameworks related to green urban planning and development was done based on four GI principles: multifunctionality, connectivity, interdisciplinary and social inclusion. We interviewed 15 key informants in related departments in the city and administered 200 survey questionnaires among residents. We also had several workshops the other researchers and experts on biodiversity and ecosystem. We found out there is no specific document dedicated to green space management, and where green infrastructure was mentioned, it was focused on as an approach to climate mitigation and adaptation. Also, residents perceive green and open spaces as extra land that could be developed at will. We demonstrated the use of collaborative learning approaches in ecological and development research and the tying research to the existing frameworks, programs, and strategies. Based on this understanding. We outlined the need to incorporate principles of green infrastructure in policy frameworks on spatial planning and environmental development. Furthermore, we develop a model for co-management of green infrastructures by stakeholders, such as residents, developers, policymakers, and decision-makers, to maximize benefits. Our collaborative, interdisciplinary projects pursue SDG multifunctionality of goals 11 and 15 by simultaneously addressing issues around Sustainable Cities and Communities, Climate Action, Life on Land, and Strong Institutions, and halt and reverse land degradation and biodiversity.Keywords: governance, green infrastructure, South Africa, sustainable development, urban planning, Tshwane
Procedia PDF Downloads 1201093 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom
Authors: John Hardy
Abstract:
The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing
Procedia PDF Downloads 1421092 Inconsistent Effects of Landscape Heterogeneity on Animal Diversity in an Agricultural Mosaic: A Multi-Scale and Multi-Taxon Investigation
Authors: Chevonne Reynolds, Robert J. Fletcher, Jr, Celine M. Carneiro, Nicole Jennings, Alison Ke, Michael C. LaScaleia, Mbhekeni B. Lukhele, Mnqobi L. Mamba, Muzi D. Sibiya, James D. Austin, Cebisile N. Magagula, Themba’alilahlwa Mahlaba, Ara Monadjem, Samantha M. Wisely, Robert A. McCleery
Abstract:
A key challenge for the developing world is reconciling biodiversity conservation with the growing demand for food. In these regions, agriculture is typically interspersed among other land-uses creating heterogeneous landscapes. A primary hypothesis for promoting biodiversity in agricultural landscapes is the habitat heterogeneity hypothesis. While there is evidence that landscape heterogeneity positively influences biodiversity, the application of this hypothesis is hindered by a need to determine which components of landscape heterogeneity drive these effects and at what spatial scale(s). Additionally, whether diverse taxonomic groups are similarly affected is central for determining the applicability of this hypothesis as a general conservation strategy in agricultural mosaics. Two major components of landscape heterogeneity are compositional and configurational heterogeneity. Disentangling the roles of each component is important for biodiversity conservation because each represents different mechanisms underpinning variation in biodiversity. We identified a priori independent gradients of compositional and configurational landscape heterogeneity within an extensive agricultural mosaic in north-eastern Swaziland. We then tested how bird, dung beetle, ant and meso-carnivore diversity responded to compositional and configurational heterogeneity across six different spatial scales. To determine if a general trend could be observed across multiple taxa, we also tested which component and spatial scale was most influential across all taxonomic groups combined, Compositional, not configurational, heterogeneity explained diversity in each taxonomic group, with the exception of meso-carnivores. Bird and ant diversity was positively correlated with compositional heterogeneity at fine spatial scales < 1000 m, whilst dung beetle diversity was negatively correlated to compositional heterogeneity at broader spatial scales > 1500 m. Importantly, because of these contrasting effects across taxa, there was no effect of either component of heterogeneity on the combined taxonomic diversity at any spatial scale. The contrasting responses across taxonomic groups exemplify the difficulty in implementing effective conservation strategies that meet the requirements of diverse taxa. To promote diverse communities across a range of taxa, conservation strategies must be multi-scaled and may involve different strategies at varying scales to offset the contrasting influences of compositional heterogeneity. A diversity of strategies are likely key to conserving biodiversity in agricultural mosaics, and we have demonstrated that a landscape management strategy that only manages for heterogeneity at one particular scale will likely fall short of management objectives.Keywords: agriculture, biodiversity, composition, configuration, heterogeneity
Procedia PDF Downloads 2601091 The Role of Institutions in Community Wildlife Conservation in Zimbabwe
Authors: Herbert Ntuli, Edwin Muchapondwa
Abstract:
This study used a sample of 336 households and community level data from 30 communities around the Gonarezhou National Park in Zimbabwe to analyse the association between ability to self-organize or cooperation and institutions on one hand and the relationship between success of biodiversity outcomes and cooperation on the other hand. Using both the ordinary least squares and instrumental variables estimation with heteroskedasticity-based instruments, our results confirmed that sound institutions are indeed an important ingredient for cooperation in the respective communities and cooperation positively and significantly affects biodiversity outcomes. Group size, community level trust, the number of stakeholders and punishment were found to be important variables explaining cooperation. From a policy perspective, our results show that external enforcement of rules and regulations does not necessarily translate into sound ecological outcomes but better outcomes are attainable when punishment is rather endogenized by local communities. This seems to suggest that communities should rather be supported in such a way that robust institutions that are tailor made to suit the needs of local condition will emerge that will in turn facilitate good environmental husbandry. Cooperation, training, benefits, distance from the nearest urban canter, distance from the fence, social capital average age of household head, fence and information sharing were found to be very important variables explaining the success of biodiversity outcomes ceteris paribus. Government programmes should target capacity building in terms of institutional capacity and skills development in order to have a positive impact on biodiversity. Hence, the role of stakeholders (e.g., NGOs) in capacity building and government effort should complement each other to ensure that the necessary resources are mobilized and all communities receive the necessary training and resources.Keywords: institutions, self-organize, common pool resources, wildlife, conservation, Zimbabwe
Procedia PDF Downloads 2791090 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 951089 Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez
Abstract:
In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks.Keywords: CAR processes, defense/attack strategies, exponential failure, survivability
Procedia PDF Downloads 3911088 Efficient and Timely Mutual Authentication Scheme for RFID Systems
Authors: Hesham A. El Zouka, Mustafa M. Hosni ka
Abstract:
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature
Procedia PDF Downloads 2671087 Conservation Challenges of Fish and Fisheries in Lake Tana, Ethiopia
Authors: Shewit Kidane, Abebe Getahun, Wassie Anteneh, Admassu Demeke, Peter Goethals
Abstract:
We have reviewed major findings of scientific studies on Lake Tana fish resources and their threats. The aim was to provide summarized information for all concerned bodies and international readers to get full and comprehensive picture about the lake’s fish resource and conservation problems. The Lake Tana watershed comprise 28 fish species, of which 21 are endemic. Moreover, Lake Tana is the one among the top 250 lake regions of global importance for biodiversity and it is world recognized migratory birds wintering site. Lake Tana together with its adjacent wetlands provide directly and indirectly a livelihood for more than 500,000 people. However, owing to anthropogenic activities, the lake ecosystem as well as fish and attributes of the fisheries sector are severely degraded. Fish species in Lake Tana are suffering due to illegal fishing, damming, habitat/breeding ground degradation, wastewater disposal, introduction of exotic species, and lack of implementing fisheries regulations. Currently, more than 98% of fishers in Lake Tana are using the most destructive monofilament. Indeed, dams, irrigation schemes and hydropower are constructed in response to the emerging development need only. Mitigation techniques such as construction of fish ladders for the migratory fishes are the most forgotten. In addition, water resource developers are likely unaware of both the importance of the fisheries and the impact of dam construction on fish. As a result, the biodiversity issue is often missed. Besides, Lake Tana wetlands, which play vital role to sustain biodiversity, are not wisely utilised in the sense of the Ramsar Convention’s definition. Wetlands are considered as unhealthy and hence wetland conversion for the purpose of recession agriculture is still seen as advanced mode of development. As a result, many wetlands in the lake watershed are shrinking drastically over time and Cyprus papyrus, one of the characteristic features of Lake Tana, has dramatically declined in its distribution with some local extinction. Furthermore, the recently introduced water hyacinth (Eichhornia crassipes) is creating immense problems on the lake ecosystem. Moreover, currently, 1.56 million tons of sediment have deposited into the lake each year and wastes from the industries and residents are directly discharged into the lake without treatment. Recently, sign of eutrophication is revealed in Lake Tana and most coarsely, the incidence of cyanobacteria genus Microcystis was reported from the Bahir Dar Gulf of Lake Tana. Thus, the direct dependency of the communities on the lake water for drinking as well as to wash their body and clothes and its fisheries make the problem worst. Indeed, since it is home to many endemic migratory fish, such kind of unregulated developmental activities could be detrimental to their stocks. This can be best illustrated by the drastic stock reduction (>75% in biomass) of the world unique Labeobarbus species. So, unless proper management is put in place, the anthropogenic impacts can jeopardize the aquatic ecosystems. Therefore, in order to sustainably use the aquatic resources and fulfil the needs of the local people, every developmental activity and resource utilization should be carried out adhering to the available policies.Keywords: anthropogenic impacts, dams, endemic fish, wetland degradation
Procedia PDF Downloads 2471086 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure
Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano
Abstract:
Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security
Procedia PDF Downloads 1631085 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks
Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas
Abstract:
Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model
Procedia PDF Downloads 551084 Human Resource Management Challenges in Nigeria Under a Globalised Economy
Authors: Odeh Linus
Abstract:
The pace of globalization is increasing continuously in terms of markets for goods and services, investment opportunities across borders amongst others. Enterprises face competition from all fronts. Human resource management is not left out in this transformation crusade as it has obligation to move along with the changing demands of the globalization process. One of the objectives of this paper is to show that effective managers should constantly be aware of the changes taking place in domestic (home country) environment, as well as around the globe (international and foreign environments) on HR issues and developments. By so doing, they can scan their environment on an ongoing basis, and when they detect opportunities and/or threats, they can transform their organization to seize the opportunities and/or combat or neutralize the threats as the case may be. In this presentation, problems, issues and trends in HRM practice in Nigeria in the current period were reviewed. The factors affecting HRM and its practice in a global context and what should be the direction of the profession and its practice in Nigeria constitute the main focus of this paper.Keywords: human resource, globalization, management, developing countries
Procedia PDF Downloads 3081083 Criminal Law and Internet of Things: Challenges and Threats
Authors: Celina Nowak
Abstract:
The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.Keywords: criminal law, internet of things, privacy, security threats
Procedia PDF Downloads 1611082 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities
Authors: Mehmet Kargaci
Abstract:
Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning
Procedia PDF Downloads 333