Search results for: border cyber-security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 512

Search results for: border cyber-security

392 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network

Authors: Phillip Garrad, Saritha Unnikrishnan

Abstract:

The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.

Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing

Procedia PDF Downloads 99
391 Foreign Real Estate Investment and the Australian Residential Property Market: A Study on Chinese Investors

Authors: Peng Yew Wong

Abstract:

House prices in the Australian capital cities were at record levels subsequent to Global Financial Crisis (GFC) 2008 and many believed that foreign investors, especially the Chinese investors, were the main reason for the Australian capital cities’ house prices escalation. This research conducted an Australian cross border semi-structured interviews in Shanghai, China to uncover historical evidence and emerging trend supporting the existence of a significant relationship between overseas investors and residential housing markets performance in Australia subsequent to the GFC 2008. Some unique investment strategies of private investors from China which emphasised on non-capitalist factors such as early education were identified, alongside with some insights on the significant China government policies that have incentivised the cross border investments from China. It is believed that this understanding will assist policy makers to effectively manage the overheated Australian residential property market without compromising the steady flow of FREI.

Keywords: Australian housing market, residential property, foreign real estate investment, education, China investor

Procedia PDF Downloads 287
390 Torn Between the Lines of Border: The Pakhtuns of Pakistan and Afghanistan in Search of Identity

Authors: Priyanka Dutta Chowdhury

Abstract:

A globalized connected world, calling loud for a composite culture, was still not able to erase the pain of a desired nationalism based on cultural identity. In the South Asian region, the random drawing of the boundaries without taking the ethnic aspect into consideration have always challenged the very basis of the existence of certain groups. The urge to reunify with the fellow brothers on both sides of the border have always called for a chaos and schism in the countries of this region. Sometimes this became a tool to bargain with the state and find a favorable position in the power structure on the basis of cultural identity. In Pakistan and Afghanistan, the Pakhtuns who are divided across the border of the two countries, from the inception of creation of Pakistan have posed various challenges and hampered the growth of a consolidated nation. The Pakhtuns or Pashtuns of both Pakistan and Afghanistan have a strong cultural affinity which blurs their physical distancing and calls for a nationalism based on this ethnic affiliation. Both the sides wanted to create Pakhtunistan unifying all the Pakhtuns of the region. For long, this group have denied to accept the Durand line separating the two. This was an area of concern especially for the Pakhtuns of Pakistan torn between the decision either to join Afghanistan, create a nation of their own or be a part of Pakistan. This ethnic issue became a bone of contention between the two countries. Later, though well absorbed and recognized in the respective countries, they have fought for their identity and claimed for a dominant position in the politics of the nations. Because of the porous borders often influx of refugees was seen especially during Afghan Wars and later many extremists’ groups were born from them especially the Taliban. In the recent string of events, when the Taliban, who are mostly Pakhtuns ethnically, came in power in Afghanistan, a wave of sympathy arose in Pakistan. This gave a strengthening position to the religious Pakhtuns across the border. It is to be noted here that a fragmented Pakhtun identity between the religious and seculars were clearly visible, voicing for their place in the political hierarchy of the country with a vision distinct from each other especially in Pakistan. In this context the paper tries to evaluate the reasons for this cultural turmoil between the countries and this ethnic group. It also aims to analyze the concept of how the identity politics still holds its relevance in the contemporary world. Additionally, the recent trend of fragmented identity points towards instrumentalization of this ethnic groups, who are engaged in the bargaining process with the state for a robust position in the power structure. In the end, the paper aims to deduct from the theoretical conditions of identity politics, whether this is a primordial or a situational tool to have a visibility in the power structure of the contemporary world.

Keywords: cultural identity, identity politics, instrumentalization of identity pakhtuns, power structure

Procedia PDF Downloads 79
389 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 118
388 Robustness Conditions for the Establishment of Stationary Patterns of Drosophila Segmentation Gene Expression

Authors: Ekaterina M. Myasnikova, Andrey A. Makashov, Alexander V. Spirov

Abstract:

First manifestation of a segmentation pattern in the early Drosophila development is the formation of expression domains (along with the main embryo axis) of genes belonging to the trunk gene class. Highly variable expression of genes from gap family in early Drosophila embryo is strongly reduced by the start of gastrulation due to the gene cross-regulation. The dynamics of gene expression is described by a gene circuit model for a system of four gap genes. It is shown that for the formation of a steep and stationary border by the model it is necessary that there existed a nucleus (modeling point) in which the gene expression level is constant in time and hence is described by a stationary equation. All the rest genes expressed in this nucleus are in a dynamic equilibrium. The mechanism of border formation associated with the existence of a stationary nucleus is also confirmed by the experiment. An important advantage of this approach is that properties of the system in a stationary nucleus are described by algebraic equations and can be easily handled analytically. Thus we explicitly characterize the cross-regulation properties necessary for the robustness and formulate the conditions providing this effect through the properties of the initial input data. It is shown that our formally derived conditions are satisfied for the previously published model solutions.

Keywords: drosophila, gap genes, reaction-diffusion model, robustness

Procedia PDF Downloads 360
387 Linguistic Devices Reflecting Violence in Border–Provinces of Southern Thailand on the Front Page of Local and National Newspapers

Authors: Chanokporn Angsuviriya

Abstract:

The objective of the study is to analyse linguistic devices reflecting the violence in the south border provinces; namely Pattani, Yala, Narathiwat and Songkla on 1,344 front pages of three local newspapers; namely ChaoTai, Focus PhakTai and Samila Time and of two national newspapers, including ThaiRath and Matichon, between 2004 and 2005, and 2011 and 2012. The study shows that there are two important linguistic devices: 1) lexical choices consisting of the use of verbs describing violence, the use of quantitative words and the use of words naming someone who committed violent acts, and 2) metaphors consisting of “a violent problem is heat”, “a victim is a leaf”, and “a terrorist is a dog”. Comparing linguistic devices between two types of newspapers, national newspapers choose to use words more violently than local newspapers do. Moreover, they create more negative images of the south of Thailand by using stative verbs. In addition, in term of metaphors “a terrorist is a fox.” is only found in national newspapers. As regards naming terrorists “southern insurgents”, this noun phrase which is collectively called by national newspapers has strongly negative meaning. Moreover, “southern insurgents” have been perceived by the Thais in the whole country while “insurgents” that are not modified have been only used by local newspapers.

Keywords: linguistic devices, local newspapers, national newspapers, violence

Procedia PDF Downloads 235
386 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 86
385 Navigating the Legal Seas: The Freedom to Choose Applicable Law in Tort

Authors: Sara Vora (Hoxha)

Abstract:

An essential feature of any international lawsuit is the ability of the parties to pick the law that would apply in the event of a tort claim. This option to choose the law to use in tort cases is based on Article 14 and 4/3 of the Rome II Regulation. The purpose of this article is to examine the boundaries of this freedom, as well as its relevance in international legal disputes. The article opens with a brief introduction to the basics of tort law. After a short introduction, the article demonstrates why Article 14 and 4/3 of the Rome II Regulation are so crucial to the right to select appropriate law in tort cases. The notion of the right to select the law to use in tort cases is examined, along with its breadth and possible restrictions. The article presents case studies to demonstrate how the right to select relevant law in tort might be put into practise. Case results and the judges' rationales for their rulings are examined. The possible influence of the right to select applicable law in tort on the process of harmonisation is also explored in this study. The results are summarised and the primary research question is addressed in the last section of the paper. In conclusion, the parties' ability to pick the law that rules their dispute via the freedom to choose relevant law in tort is a crucial feature of cross-border litigation. Despite certain restrictions, this freedom is nevertheless an important part of the legal structure that governs international conflicts.

Keywords: applicable law, tort, Rome II regulation, freedom to choose, cross-border litigation, harmonization of tort law

Procedia PDF Downloads 59
384 Assessing the Impact of the Rome II Regulation's General Rule on Cross-Border Road Traffic Accidents: A Critique of Recent Case Law

Authors: Emma Roberts

Abstract:

The Rome II Regulation has established a uniform regime of conflict of law rules across the European Union (except for Denmark) which determines the law applicable in non-contractual obligations disputes. It marks a significant development towards the Europeanization of private international law and aims to provide the most appropriate connecting factors to achieve both legal certainty and justice in individual cases. Many non-contractual obligations are recognised to present such distinct factors that, to achieve these aims, a special rule is provided for determining the applicable law in cases in respect of product liability and environmental torts, for example. Throughout the legislative process, the European Parliament sought to establish a separate rule for road traffic accidents, recognising that these cases too present such novel situations that a blanket application of a lex loci damni approach would not provide an appropriate answer. Such attempts were rejected and, as a result, cases arising out of road traffic accidents are subject to the Regulation’s general lex loci damni rule along with its escape clause and limited exception. This paper offers a critique of the Regulation’s response to cross-border road traffic accident cases. In England and Wales, there have been few cases that have applied the Regulation’s provisions to date, but significantly the majority of such cases are in respect of road traffic accidents. This paper examines the decisions in those cases and challenges the legislators’ decision not to provide a special rule for such incidences. Owing to the diversity in compensation systems globally, applying the Regulation’s general rule to cases of road traffic accidents – given the breadth of matters that are to be subject to the lex cause – cannot ensure an outcome that provides ‘justice in individual cases’ as is assured by the Regulation's recitals. Not only does this paper suggest that the absence of a special rule for road traffic accidents means that the Regulation fails to achieve one of its principal aims, but it further makes out a compelling case for the legislative body of the European Union to implement a corrective instrument.

Keywords: accidents abroad, applicable law, cross-border torts, non-contractual obligations, road traffic accidents

Procedia PDF Downloads 251
383 The Effect of Customs Commission Customer Satisfaction

Authors: Menelik Tilahun Alemu

Abstract:

Customs administrations are now increasingly regarded as the key border agencies responsible for all transactions related to issues arising from the border crossings of goods and people. Raising revenue has traditionally been high on the agenda of governments, represented by the Ministry of Finance (MOF), because of the critical importance of import duties as a source of budget revenue for many developing countries. Most of these functions are undertaken in close cooperation with other national agencies. Due to the need to make structural reforms that consider the nature of business activities in the world and the needs of consumers, the institution was previously divided into the Ministry of Revenue and the Customs Commission. Accordingly, the Ministry of Revenue is primarily responsible for administering and collecting local taxes, while the Customs Commission is responsible for administering customs matters; It supports exports and collects revenue from it. The National Import and Export Trade Service System is working to make the world more transparent and standardized and adapt to the current situation by formulating various guidelines, rules and procedures to provide a clear, simple, predictable and accessible service to customers. As a result, the commission will be able to streamline the business process by enabling Paperless customer service to support the service delivery technology and eliminate the customer iteration without having to incur unnecessary costs and inconveniences.

Keywords: business, consumers, adapt, transparent

Procedia PDF Downloads 46
382 Unusual High Origin and Superficial Course of Radial Artery: A Case Report with Embryological Explanation

Authors: Anasuya Ghosh, Subhramoy Chaudhury

Abstract:

During routine cadaveric dissection at gross anatomy lab of our institution, a radial artery was found with unusual origin and superficial course. Normally the radial artery takes its origin as one of the terminal branches of brachial artery at the level of the neck of radius. It usually lies along the lateral border of fore arm deep to the brachioradialis muscle. While dissecting a 72-year-old Caucasian female cadaver, it was found that the right sided radial artery originated from the upper part of brachial artery of arm, 2 cm below the lower border of teres major muscle, from the lateral aspect of brachial artery. Then the radial artery superficially crossed the brachial artery and median nerve from lateral to medial direction and rested superficially at the cubital fossa. Embryologically, it can be explained as a failure of disappearance, or abnormal persistence of some insignificant embryonic vessels may give rise to this kind of vascular anomalies. As radial artery is one of the most important upper limb arteries, its variation and related complications are clinically significant. This unusual origin and course of radial artery should be kept in mind by all healthcare providers including surgeons and radiologists during routine venipuncture, orthopedic and plastic surgeries of arm, coronary angiographic procedures in radial approach etc. to prevent unwanted complications.

Keywords: brachial artery anomalies, brachio-radial artery, high origin radial artery, superficial radial artery

Procedia PDF Downloads 322
381 Technology and the Need for Integration in Public Education

Authors: Eric Morettin

Abstract:

Cybersecurity and digital literacy are pressing issues among Canadian citizens, yet formal education does not provide today’s students with the necessary knowledge and skills needed to adapt to these challenging issues within the physical and digital labor-market. Canada’s current education systems do not highlight the importance of these respective fields, aside from using technology for learning management systems and alternative methods of assignment completion. Educators are not properly trained to integrate technology into the compulsory courses within public education, to better prepare their learners in these topics and Canada’s digital economy. ICTC addresses these gaps in education and training through cross-Canadian educational programming in digital literacy and competency, cybersecurity and coding which is bridged with Canada’s provincially regulated K-12 curriculum guidelines. After analyzing Canada’s provincial education, it is apparent that there are gaps in learning related to technology, as well as inconsistent educational outcomes that do not adequately represent the current Canadian and global economies. Presently only New Brunswick, Nova Scotia, Ontario, and British Columbia offer curriculum guidelines for cybersecurity, computer programming, and digital literacy. The remaining provinces do not address these skills in their curriculum guidelines. Moreover, certain courses across some provinces not being updated since the 1990’s. The three territories respectfully take curriculum strands from other provinces and use them as their foundation in education. Yukon uses all British Columbia curriculum. Northwest Territories and Nunavut respectfully use a hybrid of Alberta and Saskatchewan curriculum as their foundation of learning. Education that is provincially regulated does not allow for consistency across the country’s educational outcomes and what Canada’s students will achieve – especially when curriculum outcomes have not been updated to reflect present day society. Through this, ICTC has aligned Canada’s provincially regulated curriculum and created opportunities for focused education in the realm of technology to better serve Canada’s present learners and teachers; while addressing inequalities and applicability within curriculum strands and outcomes across the country. As a result, lessons, units, and formal assessment strategies, have been created to benefit students and teachers in this interdisciplinary, cross-curricular, practice - as well as meeting their compulsory education requirements and developing skills and literacy in cyber education. Teachers can access these lessons and units through ICTC’s website, as well as receive professional development regarding the assessment and implementation of these offerings from ICTC’s education coordinators, whose combines experience exceeds 50 years of teaching in public, private, international, and Indigenous schools. We encourage you to take this opportunity that will benefit students and educators, and will bridge the learning and curriculum gaps in Canadian education to better reflect the ever-changing public, social, and career landscape that all citizens are a part of. Students are the future, and we at ICTC strive to ensure their futures are bright and prosperous.

Keywords: cybersecurity, education, curriculum, teachers

Procedia PDF Downloads 75
380 Spatial Cluster Analysis of Human Cases of Crimean Congo Hemorrhagic Fever Reported in Pakistan

Authors: Tariq Abbas, Younus Muhammad, Sayyad Aun Muhammad

Abstract:

Background : Crimean Congo hemorrhagic fever (CCHF) is a tick born viral zoonotic disease that has been notified from almost all regions of Pakistan. The aim of this study was to investigate spatial distribution of CCHF cases reported to National Institue of Health , Islamabad during year 2013. Methods : Spatial statistics tools were applied to detect extent spatial auto-correlation and clusters of the disease based on adjusted cumulative incidence per million population for each district. Results : The data analyses revealed a large multi-district cluster of high values in the uplands of Balochistan province near Afghanistan border. Conclusion : The cluster included following districts: Pishin; Qilla Abdullah; Qilla Saifullah; Quetta, Sibi; Zhob; and Ziarat. These districts may be given priority in CCHF surveillance, control programs, and further epidemiological research . The location of the cluster close to border of Afghanistan and Iran highlight importance of the findings for organizations dealing with disease at national, regional and global levels.

Keywords: Crimean Congo hemorrhagic fever, Pakistan, spatial autocorrelation, clusters , adjusted cumulative incidence

Procedia PDF Downloads 404
379 From Knives to Kites: Developments and Dilemmas around the Use of Force in the Israeli–Palestinian Conflict since "Protective Edge"

Authors: Hilly Moodrick-Even Khen

Abstract:

This study analyzes the legal regulation of the use of force in international law in the context of three emerging Palestinian forms of struggle against Israeli occupation: the Knife Intifada, Gaza border disturbances, and the launching of incendiary kites. It discusses what legal paradigms or concepts should regulate the type and level of force used in each situation—a question that is complicated by various dilemmas—and appraises the Israel Defence Forces policies tailored in response. Methodologically, the study is based on analysis of scholarship on the conceptual legal issues as well as dicta of the courts. It evaluates the applicability of two legal paradigms regulating the use of force in military operations—(i) the conduct of hostilities and (ii) law enforcement—as well as the concept of self-defense in international law and the escalation of force procedure. While the “Knife Intifada” clearly falls under the law enforcement paradigm, the disturbances at the border and the launching of incendiary kites raise more difficult questions, as applying law enforcement, especially in the latter case, can have undesirable ramifications for safeguarding humanitarian interests. The use of force in the cases of the border disturbances and the incendiary kites should thus be regulated, mutatis mutandis, by the concept of self-defense and escalation of force procedures; and in the latter case, the hostilities paradigm can also be applied. The study provides a factual description and analysis of the background and nature of the forms of struggle in Gaza and the West Bank—in each case surveying the geo-political developments since operation Protective Edge, contextualizing how the organized and unorganized violent activities evolved, and analyzing them in terms of level of organization and intensity. It then presents the two paradigms of the use of force—law enforcement and conduct of hostilities—and the concept of self-defense. Lastly, it uses the factual findings as the basis for legally analyzing which paradigm or concept regulating the use of force applies for each form of struggle. The study concludes that in most cases, the concept of self-defense is preferable to the hostilities or the law enforcement paradigms, as it best safeguards humanitarian interests and ensures the least loss of civilian lives.

Keywords: Israeli-Palestinian conflict, self defense, terrorism, use of force

Procedia PDF Downloads 119
378 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid

Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni

Abstract:

In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.

Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic

Procedia PDF Downloads 101
377 Taking Sides: The Frames of Online Media on the Bilateral Relationship between Moslem Countries (Malaysia and Indonesia)

Authors: Gatut Priyowidodo, I. I. Indrayani

Abstract:

The relations between Indonesia and Malaysia are always full of colors. Indonesia is always known as old brother of Malaysia since it has similar history, religion also socio culturally. Some decades show that the declination of relationship the both countries. Another time, as ASEAN members the two countries devotes their nationalities to purify their collective identities as Eastern. The objective of the research is to extricate the construction of Kompas online and Utusan online toward news coverage of the borders dispute between Indonesia-Malaysia in 2010. This research is proposed to examine central issues which reported by Kompas online and Utusan online consistently. As a media industry, Kompas coverage dominates circulation nationally. Kompas.com was the pioneer of online news in Indonesia and born in reformation era. Utusan is prominent media industry in Malaysia that conducted by UMNO as the ruling party in Malaysia for some periods. The method used in this research is framing method by Robert N. Entman’s which consists of four steps identification: defining problem, diagnosing causes, moral judgment and a treatment recommendation. This research found that Kompas news covered the border dispute must be negotiated as recognition of Indonesia dignity. In contrary, Utusan’s spectacle focused on the Indonesia demonstrans anarchism during the dispute.

Keywords: online media, media construction, the border dispute, Indonesia-Malaysia’s bilateral relations

Procedia PDF Downloads 337
376 The Postcolonial Everyday: the Construction of Daily Barriers in the Experience of Asylum Seekers and Refugees in the UK

Authors: Sarah Elmammeri

Abstract:

This paper will represent the postcolonial every day in the journey of asylum seekers through the asylum process in the UK. It represents everyday borders, which are defined as everyday barriers, and obstacles facing asylum seekers and refugees in the host country. These everyday barriers can be legal, financial, social and educational under the umbrella of the racialized administrative border creating a package. The arguments build on a set of 21 semi-structured interviews in English and Arabic. The interviews were conducted in the UK, online via zoom lasting between 25 minutes and 2 hours with asylum seekers, refugees, Non-governmental organisations workers and volunteers. The interviews focus on the meaning of borders both physical and metaphorical and ways to challenge the ongoing postcolonial everyday border practices. The findings conclude that these barriers are there deliberately and intentionally to target asylum seekers and limit their legal right to claim asylum in a form of policy and regulations. People in the asylum process, NGO workers, and refugees relate to this aspect of the everyday borders. Second, these barriers come intertwined together creating a structure that interferes with the daily life of an asylum seeker and later affects people with refugee status creating racialised barriers starting with the structural and official form of it: the asylum process. These structural barriers will be linked forming a multi-level barrier enhancing the racialisation of people who are categorised and selected.

Keywords: everyday borders, asylum policies, inclusion and exclusion, refugees and asylum seekers

Procedia PDF Downloads 111
375 A Coordinated School Health Program Effect on Cardiorespiratory Fitness in Preschool Children

Authors: Zasha Romero, Roberto Trevino, Lin Wang, Elizabeth Alanis, Jesus Cuellar

Abstract:

Background: There is a strong relationship between low cardiorespiratory fitness (CRF) and high adiposity levels. The purpose of this study was to assess the effects of the Bienestar/Neema Coordinated School Health Program (BN CSHP) on the CRF of preschool children. Methods: This is a randomized cluster trial conducted in preschools of two school districts located along the Texas-Mexico border. Of 48 eligible schools, 28 were randomly selected (intervention, n=14; control, n=14). Family demographics and household health characteristics were collected from parents. CRF, as measured by the Progressive Anaerobic Capacity Endurance Run (PACER) fitness test, was collected from the children. A generalized linear mixed model (GLMM) was used to analyze the data. Results: Family demographics, household health characteristics, and children’s weight, obesity prevalence, and sedentary activity were similar among both treatment groups. After adjusting for covariates, the number of laps run by children in the control group increased by 23% (CI: -5% to 60%) per each data collection period compared with 53% (CI: 7% to 119%) in the intervention group. Conclusions: Children in the BN CSHP, compared to those in the control group, had a significantly higher increase in their CRF. This finding is important because of the health benefits of CRF in children.

Keywords: coordinated school health program, cardiorespiratory fitness, obesity, border health, preschool, physical education, movement

Procedia PDF Downloads 78
374 Between Ralph Waldo Emerson and the Dying Infidel

Authors: Michael Keller

Abstract:

Beyond the heterodoxy expressed in his now-famous 1838 address to the Harvard Divinity School, Emerson’s timing was particularly dangerous. Ideologically, New England faced a severe crisis of identity, as traditional categories of class and religion were growing increasingly unstable. Jones Very, influenced by Emerson, crossed the perceived border between acceptable religious zeal and insane enthusiasm. Abner Kneeland, on the other hand, crossed the uncomfortable border between post-Puritan Unitarian rationalism and blasphemous Enlightenment skepticism. More importantly, Kneeland oversaw a more overtly subversive brand of resistance (in the form of freethought periodicals) that not only threatened religious orthodoxy but also threatened to destabilize the class structure of New England. Very and Kneeland provide instructive case studies of how religious ideologies could run afoul of the social contract and the law itself. By looking closely at the social and religious forces that led to Kneeland’s prosecution for blasphemy, Jones Very’s forced committal to McLean Asylum, and Emerson’s escape from these fates, we gain a greater understanding of the shifting cultural landscape of 1830s New England. This paper will examine Emerson’s resistance to the traditional forces of class and ideology in Massachusetts by situating his early work in the context of the ideological battles of his time. More specifically, I will explore how Emerson was able to resist the conservative cultural forces of his time without experiencing the extremity of their wrath.

Keywords: American literature, cultural studies, emerson, religious studies

Procedia PDF Downloads 136
373 Polish Authorities Towards Refugee Crises

Authors: Klaudia Gołębiowska

Abstract:

This article analyzes the actions of Poland's ruling party facing two refugee crises. These crises emerged almost one after the other within a few months. The first concerned irregular migrants from various countries, including the Middle East, seeking to cross the Polish border from the territory of Belarus. The second was caused by Russia's full-scale invasion of Ukraine. I aim to show the evolution of the discourse and law towards immigrants and refugees by the party Prawo i Sprawiedliwość (PiS, ang. Law and Justice), which has been in power in Poland since 2015. The authorities, in power since 2015, have radically changed its anti-immigrant discourse towards the exodus of civilians from Ukraine. Research questions are the following: What were the roots of the refugee crises in Poland in 2021 and 2022? What legal or illegal measures were taken in Poland to deal with the refugee crises? The methods of qualitative source analysis and process tracing. From the first days of the war in Ukraine, not only was aid organised for Ukrainians, but they were also given access to public services and education. All refugees were granted temporary international protection. At the same time, the basic physiological needs of those on the Polish-Belarusian border were ignored. Moreover, illegal pushbacks were used against those coming mainly from the Middle East, pushing them into the territory of Belarus, where they were often subjected to torture and inhumane treatment. The Polish government justified such treatment on the grounds that these people were part of a 'hybrid war' waged by Russia and Belarus using migrants. Only Ukrainians were treated as 'real' refugees in the analyzed crises at the Polish borders.

Keywords: refugee, irregular migrants, hybrid war, migrants

Procedia PDF Downloads 58
372 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 152
371 India’s Neighborhood Policy and the Northeast: Exploratory Study of the Nagas in the Indo-Myanmar Border

Authors: Sachoiba Inkah

Abstract:

The Northeast region has not been a major factor in India’s foreign policy calculation since independence. Instead, the region was ignored and marginalized even to the extent of using force and repressive Acts such as AFSPA(Armed Forces Special Powers Act) to suppress the voices of both states and non-state actors. The liberalization of the economy in the 90s in the wake of globalization gave India a new outlook and the Look East Policy (LEP) was a paradigm shift in India’s engagement with the Southeast Asian nations as it seeks to explore the benefits of the ASEAN. The reorienting of India’s foreign policy to ‘Neighborhood First” is attributed to the present political dispensation, which is further widened to include ‘Extended Neighborhood.’ As a result, the Northeastern states have become key players in India’s participation in regional groupings such as SAARC, BIMSTEC, and BCIM. The need for external balancing, diplomacy and development has reset India’s foreign policy priorities as the Northeast states lie in the confluence of South Asia, Southeast and East Asia, and a stakeholder in Act East Policy. The paper will explore the role of Northeastern states in the framework of Indian foreign policy as it shares international boundaries with China, Bhutan, Bangladesh, and Myanmar and most importantly, study the case of Nagas who are spread across Manipur, Nagaland, and Arunachal Pradesh bordering Myanmar. The Indo-Myanmar border is an area of conflict and various illegal activities such as arms trafficking, illegal migrants, drug, and human trafficking are still being carried out and in order to address this issue, both India and Myanmar need to take into consideration the various communities living across the border. And conflict and insurgency should not be a yardstick to curtailed development of infrastructures such as roads, health facilities, transport, and communication in the contested region. The realities, perceptions, and contentions of the Northeastern states and the different communities living in the border areas need a wider discourse as the region the potential to drive India’s diplomatic relations with its neighbors and extended neighborhood. The methods employed are analytical and more of a descriptive analysis on India’s foreign policy framework with a focus on Nagas in Myanmar, drawing from both primary and secondary sources. Primary sources include official documents, data, and statistics released by various governmental agencies, parliamentary debates, political speeches, press releases, treaties and agreements, historical biographies and organizational policy papers, protocols and procedures of government conferences, regional organization study reports etc. The paper concludes that the recent proactive engagement between India and Myanmar on trade, defense, economic, and infrastructure development are positive signs cementing bilateral ties, but there is not much room for the people-to-people connect, especially for people living in the borderland. The Freedom of Movement Regime that is in place is limited and there is more scope for improvement as people in the borderland looks towards trade and commerce to not only uplift the border economy but also act as a catalyst for robust engagement between the two countries, albeit with more infrastructure such as road, healthcare, education, a tourist hotspot, trade centers, mobile connectivity, etc.

Keywords: foreign policy, infrastructure development, insurgency, people to people connect

Procedia PDF Downloads 190
370 The Development of a Supplementary Course in the Social Studies, Religion and Culture Learning Area in Support of ASEAN Community and for Use in the Northeastern Border Area of Thailand

Authors: Angkana Tungkasamit, Ladda Silanoi , Teerachai Nethanomsak, Sitthipon Art-in, Siribhong Bhiasiri

Abstract:

As the date for the commencement of the ASEAN Community in Year 2015 is approaching, it has become apparent to all that there is an urgent need to get Thai people ready to meet the challenge of entering into the Community confidently. Our research team has been organized by the Faculty of Education, Khon Kaen University with the task of training administrators and teachers of the schools along the borders with Laos People’s Democratic Republic and the Kingdom of Cambodia to be able to develop supplementary courses on ASEAN Community. The course to be developed is based on the essential elements of the Community, i.e. general backgrounds of the member countries, the education, social and economic life in the Community and social skills needed for a good citizen of the ASEAN Community. The study, based on learning outcome and learning management process as a basis for inquiry, was a research and development in nature using participative action research as a means to achieve the goal of helping school administrators and teachers to learn how to develop supplementary courses to be used in their schools. A post-workshop evaluation of the outcome was made and found that, besides the successfully completed supplementary course, the participants were satisfied with their participation in the workshop because they had participated in every step of the development activity, from the beginning to the end.

Keywords: development of supplementary course, ASEAN community, social studies, northeastern border area of Thailand

Procedia PDF Downloads 351
369 BLS-2/BSL-3 Laboratory for Diagnosis of Pathogens on the Colombia-Ecuador Border Region: A Post-COVID Commitment to Public Health

Authors: Anderson Rocha-Buelvas, Jaqueline Mena Huertas, Edith Burbano Rosero, Arsenio Hidalgo Troya, Mauricio Casas Cruz

Abstract:

COVID-19 is a disruptive pandemic for the public health and economic system of whole countries, including Colombia. Nariño Department is the southwest of the country and draws attention to being on the border with Ecuador, constantly facing demographic transition affecting infections between countries. In Nariño, the early routine diagnosis of SARS-CoV-2, which can be handled at BSL-2, has affected the transmission dynamics of COVID-19. However, new emerging and re-emerging viruses with biological flexibility classified as a Risk Group 3 agent can take advantage of epidemiological opportunities, generating the need to increase clinical diagnosis, mainly in border regions between countries. The overall objective of this project was to assure the quality of the analytical process in the diagnosis of high biological risk pathogens in Nariño by building a laboratory that includes biosafety level (BSL)-2 and (BSL)-3 containment zones. The delimitation of zones was carried out according to the Verification Tool of the National Health Institute of Colombia and following the standard requirements for the competence of testing and calibration laboratories of the International Organization for Standardization. This is achieved by harmonization of methods and equipment for effective and durable diagnostics of the large-scale spread of highly pathogenic microorganisms, employing negative-pressure containment systems and UV Systems in accordance with a finely controlled electrical system and PCR systems as new diagnostic tools. That increases laboratory capacity. Protection in BSL-3 zones will separate the handling of potentially infectious aerosols within the laboratory from the community and the environment. It will also allow the handling and inactivation of samples with suspected pathogens and the extraction of molecular material from them, allowing research with pathogens with high risks, such as SARS-CoV-2, Influenza, and syncytial virus, and malaria, among others. The diagnosis of these pathogens will be articulated across the spectrum of basic, applied, and translational research that could receive about 60 daily samples. It is expected that this project will be articulated with the health policies of neighboring countries to increase research capacity.

Keywords: medical laboratory science, SARS-CoV-2, public health surveillance, Colombia

Procedia PDF Downloads 84
368 Sustainable Transboundary Water Management: Challenges and Good Practices of Cooperation in International River Basin Districts

Authors: Aleksandra Ibragimow, Moritz Albrecht, Eerika Albrecht

Abstract:

Close international cooperation between all countries within a river basin has become one of the key aspects of sustainable cross-border water management. This is due to the fact that water does not stop at administrative or political boundaries. Therefore, the preferred mode to protect and manage transnational water bodies is close cooperation between all countries and stakeholders within the natural hydrological unit of the river basin. However, past practices have demonstrated that combining interests of different countries and stakeholders with differing political systems and management approaches to environmental issues upstream as well as downstream can be challenging. The study focuses on particular problems and challenges of water management in international river basin districts by the example of the International Oder River Basin District. The Oder River is one of the largest cross-border rivers of the Baltic Sea basin passing through Poland, Germany, and the Czech Republic. Attention is directed towards the activities and the actions that were carried out during the Districts' first management cycle of transnational river basin management (2009-2015). The results show that actions of individual countries have been focused on the National Water Management Plans while a common appointment about identified supra-regional water management problems has not been solved, and conducted actions can be considered as preliminary and merely a basis for future management. This present state raises the question whether the achievement of main objectives of Water Framework Directive (2000/60/EC) can be a realistic task.

Keywords: International River Basin Districts, water management, water frameworkdirective, water management plans

Procedia PDF Downloads 309
367 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 87
366 System of System Decisions Framework for Cross-Border Railway Projects

Authors: Dimitrios J. Dimitriou, Maria F. Sartzetaki, Anastasia Kalamakidou

Abstract:

Transport infrastructure assets are key components of the national asset portfolio. The decision to invest in a new infrastructure in transports could take from a few years to some decades. This is mainly because of the need to reserve and spent many capitals, the long payback period, the number of the stakeholders involved in the decision process and –many times- the investment and business risks are high. Decision makers and stakeholders need to define the framework and the outputs of the decision process taking into account the project characteristics, the business uncertainties, and the different expectations. Therefore, the decision assessment framework is an essential challenge linked with the key decision factors meet the stakeholder expectations highlighting project trade-offs, financial risks, business uncertainties and market limitations. This paper examines the decision process for new transport infrastructure projects in cross-border regions, where a wide range of stakeholders with different expectation is involved. According to a consequences analysis systemic approach, the relationship of transport infrastructure development, economic system development and stakeholder expectation is analysed. Adopting the on system of system methodological approach, the decision making the framework, variables, inputs and outputs are defined, highlighting the key shareholder’s role and expectations. The application provides the methodology outputs presenting the proposed decision framework for a strategic railway project in north Greece deals with the upgrade of the existing railway corridor connecting Greece, Turkey, and Bulgaria.

Keywords: system of system decision making, managing decisions for transport projects, decision support framework, defining decision process

Procedia PDF Downloads 300
365 A Study of the Effects of Zimbabwean Youth Migration on Musina Area, South Africa

Authors: R. Chinyakata, N. R. Raselekoane

Abstract:

Migration has always been part of human history. Migration is spurred by globalisation which connects nations by encouraging the flow of goods, services, ideas and people across borders. Migration does not only involve movement of adults from one country to another. It also affects and involves the youth as they are the most mobile group. Musina area, like many other border areas, experiences a variety of challenges as a result of the influx of people from the neighbouring Zimbabwe and other African countries. Of great concern about this migration is the fact that the host country or area may become unsafe and unstable as a result of huge influx of migrants. There may also be tensions between local people and migrants over the resources. The study sought to investigate the effects of the Zimbabwean youth migration on Musina area. The study was undertaken in Musina area which is situated 18km from the Beit-Bridge border post. A qualitative research approach was used. Semi-structured interviews were used to collect data. Non-probability quota sampling technique was used to select the respondents. The study sample consisted of sixteen female and male respondents. Thematic coding was used to analyse the data. Ethical considerations such as informed consent, confidentiality, anonymity and voluntary participation were taken into account to protect the participants. The study found that the effects of the Zimbabwean youth migration on the Musina area include, among others, tensions between locals and the Zimbabwean youth migrants over resources, job and business opportunities, overcrowding and crime. Multi-pronged strategies which involve different stakeholders should be applied to address tensions over job and business opportunities, overcrowding and crime in the Musina area.

Keywords: host country, effects, migrant, migration, Musina, youth, Zimbabwe

Procedia PDF Downloads 239
364 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 291
363 Effects of Sn and Al on Phase Stability and Mechanical Properties of Metastable Beta Ti Alloys

Authors: Yonosuke Murayama

Abstract:

We have developed and studied a metastable beta Ti alloy, which shows super-elasticity and low Young’s modulus according to the phase stability of its beta phase. The super-elasticity and low Young’s modulus are required in a wide range of applications in various industrial fields. For example, the metallic implant with low Young’s modulus and non-toxicity is desirable because the large difference of Young’s modulus between the human bone and the implant material may cause a stress-shielding phenomenon. We have investigated the role of Sn and Al in metastable beta Ti-Cr-Sn, Ti-Cr-Al, Ti-V-Sn, and Ti-V-Al alloys. The metastable beta Ti-Cr-Sn, Ti-Cr-Al, Ti-V-Sn, and Ti-V-Al alloys form during quenching from the beta field at high temperature. While Cr and V act as beta stabilizers, Sn and Al are considered as elements to suppress the athermal omega phase produced during quenching. The athermal omega phase degrades the properties of super-elasticity and Young’s modulus. Although Al and Sn as single elements are considered as an alpha stabilizer and neutral, respectively, Sn and Al acted also as beta stabilizers when added simultaneously with beta stabilized element of Cr or V in this experiment. The quenched microstructure of Ti-Cr-Sn, Ti-Cr-Al, Ti-V-Sn, and Ti-V-Al alloys shifts from martensitic structure to beta single-phase structure with increasing Cr or V. The Young’s modulus of Ti-Cr-Sn, Ti-Cr-Al, Ti-V-Sn, and Ti-V-Al alloys decreased and then increased with increasing Cr or V, each showing its own minimum value of Young's modulus respectively. The composition of the alloy with the minimum Young’s modulus is a near border composition where the quenched microstructure shifts from martensite to beta. The border composition of Ti-Cr-Sn and Ti-V-Sn alloys required only less amount of each beta stabilizer, Cr or V, than Ti-Cr-Al and Ti-V-Al alloys. This indicates that the effect of Sn as a beta stabilizer is stronger than Al. Sn and Al influenced the competitive relation between stress-induced martensitic transformation and slip deformation. Thus, super-elastic properties of metastable beta Ti-Cr-Sn, Ti-Cr-Al, Ti-V-Sn, and Ti-V-Al alloys varied depending on the alloyed element, Sn or Al.

Keywords: metastable beta Ti alloy, super-elasticity, low Young’s modulus, stress-induced martensitic transformation, beta stabilized element

Procedia PDF Downloads 138