Search results for: identity threat
1154 Bring Your Own Device Security Model in a Financial Institution of South Africa
Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren
Abstract:
This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis
Procedia PDF Downloads 311153 Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study
Authors: Innocent Uzougbo Onwuegbuzie, Siene Elizabeth Eke
Abstract:
This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management.Keywords: cybersecurity challenges, cyber threat mitigation, federal polytechnic Ado-Ekiti, ICT management
Procedia PDF Downloads 401152 Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population
Authors: Colette Faucher
Abstract:
In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population.Keywords: military psychological operations, social identity, social network, emotion propagation
Procedia PDF Downloads 4091151 Development of DNA Fingerprints in Selected Medicinal Plants of India
Abstract:
Conventionally, morphological descriptors are routinely used for establishing the identity of varieties. But these morphological descriptors suffer from many drawbacks such as influence of environment on trait expression, epistatic interactions, pleiotrophic effects etc. Furthermore, the paucity of a sufficient number of these descriptors for unequivocal identification of increasing number of reference collection varieties enforces to look for alternatives. Therefore, DNA based finger-print based techniques were selected to define the systematic position of the selected medicinal plants like Plumbago zeylanica, Desmodium gangeticum, Uraria picta. DNA fingerprinting of herbal plants can be useful in authenticating the various claims of medical uses related to the plants, in germplasm characterization and conservation. In plants it has not only helped in identifying species but also in defining a new realm in plant genomics, plant breeding and in conserving the biodiversity. With world paving way for developments in biotechnology, DNA fingerprinting promises a very powerful tool in our future endeavors. Data will be presented on the development of microsatellite markers (SSR) used to fingerprint, characterize, and assess genetic diversity among 12 accessions of both Plumbago zeylanica, 4 accessions of Desmodium gengaticum, 4 accessions of Uraria Picta.Keywords: Plumbago zeylanica, Desmodium gangeticum, Uraria picta, microsaetllite markers
Procedia PDF Downloads 2161150 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union
Authors: María Elena Menéndez Ibáñez
Abstract:
After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.Keywords: border control, immigration, international cooperation, national security
Procedia PDF Downloads 1381149 Social Inclusion of Rural Elderly Left Behind by Internal Labor Migration: A Case Study in a Chinese Rural Village in Anhui Province
Authors: Lei Liu
Abstract:
Since the famous opening up and reform strategy of China, lots of migrants have flowed from rural areas to urban areas. In this paper, the author investigates the rural elderly left behind, which are defined aged people left alone at home while their adult children have to migrant outside. This phenomenon is a quite general and serious social problem that cannot be ignored, accompanied by the process of urbanization and regional transferring of rural labor. The Chinese internal migration not only exerts great influence to China’s economy and urbanization but also obviously reduces the labor and care to rural aged people. Contrary to assumptions in some migration and aging studies, which show the inevitable negative effects of migration upon the old age care, the author highlights unique features in their daily strategies of house holding to integrate into society with the analysis of the conception of social inclusion. Through life history interviews with elderly left behind in one rural village, this article sheds light on three different factors of social inclusion, namely, economic inclusion, social identity and political inclusion and shows its necessaries to fully understand the status of the social wellbeing of rural elderly left behind.Keywords: labor migration, elderly left behind, social inclusion, rural China
Procedia PDF Downloads 3031148 Drivers of Deforestation in the Colombian Amazon: An Empirical Causal Loop Diagram of Food Security and Land-Use Change
Authors: Jesica López, Deniz Koca, Asaf Tzachor
Abstract:
In 2016 the historic peace accord between the Colombian government and the Revolutionary Armed Forces of Colombia (FARC) had no strong mechanism for managing changes to land use and the environment. Since the end of a 60-year conflict in Colombia, large areas of forest in the Amazon region have been rapidly converted to agricultural uses, most recently by cattle ranching. This suggests that the peace agreement presents a threat to the conservation of the country's rainforest. We analyze the effects of cattle ranching as a driver and accelerator of deforestation from a systemic perspective, focusing on two key leverage points the legal and illegal activities involved in the cattle ranching practices. We map and understand the inherent dynamic complexity of deforestation, including factors such as land policy instruments, national strategy to tackle deforestation, land use nexus with Amazonian food systems, and loss of biodiversity. Our results show that deforestation inside Colombian Protected Areas (PAs) in the Amazon region and the surrounding buffer areas has accelerated with the onset of peace. By using a systems analysis approach, we contextualized the competition of land between cattle ranching and the need to protect tropical forests and their biodiversity loss. We elaborate on future recommendations for land use management decisions making suggest the inclusion of an Amazonian food system, interconnecting and visualizing the synergies between sustainable development goals, climate action (SDG 13) and life on land (SDG 15).Keywords: tropical rainforest, deforestation, sustainable land use, food security, Colombian Amazon
Procedia PDF Downloads 971147 Sociolinguistic Analysis of Campus Slang: The Case of Akwa Ibom State College of Education, Afaha Nsit, Nigeria
Authors: Charles Okon Effiong
Abstract:
This paper is a sociolinguistic analysis of the semantics of students’ slang in Akwa Ibom State College of Education, Afaha Nsit, Nigeria. The descriptive survey design was deployed for the study and data were collected from one hundred and fifty (150) students through a series of instruments such as questionnaire, interviews and observations. The questionnaire was administered randomly to levels 200, 300 and Extra Time students only. Interviews and observations were also conducted on the students. These categories of students were selected because they had spent a longer time in the college and were thought to be familiar with campus slang. A total of ninety two (92) slang expressions were taken from the questionnaire and out of this number, twenty six (26) slang expressions were peculiar to the college while sixty six (66) were those slang terms also used in the society. The study proves the notion that every speaker handles a variety of registers and tends to choose among them in accordance with the social situation in which he finds himself. The study shows campus slang as a sociolect which facilitates communication among the students in a different sense. The slang expressions are fully intelligible to the students and this unique and elaborate lexicon serves to achieve group identity among other social implications.Keywords: communication, slang, social relationship, sociolinguistics
Procedia PDF Downloads 4541146 Shades of Memory, Echoes of Despair: Exploring Melancholy in Modern Amharic Novels
Authors: Dawit Dibekulu, Tesfaye Dagnew, Tesfamaryam G. Meskel
Abstract:
Echoing with memories of loss and whispers of despair, this study delves into the poignant world of melancholy in Sisay Nigusu's contemporary Amharic novel, ‘Yäqənat Zār’ (‘Zār of Jealousy’). Employing a psychoanalytic lens focused on Freud and Klein's theories of mourning and melancholia, we explore the psychological depths of characters ravaged by grief. Through an interpretive paradigm and descriptive research design, we unpack the intricate tapestry of the novel, revealing how love's ashes morph into melancholic despair. The loss of loved ones, be it sudden death or betrayal, casts long shadows on the characters' souls, distorting their behavior and twisting their narratives. Altered thoughts, self-blame, and paralyzing yearning become their companions, weaving a tragic dance of longing and despair. ‘Yäqənat Zār’ serves as a powerful testament to the transformative power of storytelling, allowing us to navigate the labyrinthine paths of melancholia and gain a glimpse into the Ethiopian soul grappling with loss. This study not only sheds light on the individual's struggle with sadness but also illuminates the cultural fabric of grief and melancholia intricately woven into Ethiopian society.Keywords: melancholy, loss, psychoanalysis, grief, identity
Procedia PDF Downloads 641145 Beyond ‘Mother India’ and ‘New Indian Woman’: Indian Educated Middle-Class Women in Partition Novels
Authors: Yan Ziwei
Abstract:
This article attempts to restore the subjectivity of Indian-educated middle-class women during the partition period through three partition novels: Anita Desai’s Clear Light of Day (1980), Amitav Ghosh’s The Shadow Lines (1988), and Vikram Seth’s A Suitable Boy (1993). Despite extensive research on women in partition, there is little focus on the group of educated middle-class women. In mainstream historical and political discourse, these women have consistently been constructed within the official discourse dominated by males. They are either ‘Mother India’, or the ‘new woman’ to meet the requirements of India’s changing political atmosphere. However, by delving into the particular historical context and personal experience of the educated middle-class women in the three novels, the article argues that they continuously subvert the essentialized identities imposed upon them by different versions of official discourse. As the embodiment of Shakti, they are distinct from the archetypes of ‘Mother India’ and the ‘new woman’. Instead, they create their ideal family spaces based on their personal cognition and transcend the homogeneous gender discourse to reflect the fluid and complex nature of female identity.Keywords: Indian educated middle-class women, subjectivity, partition novels, Mother India, new woman, Shakti
Procedia PDF Downloads 431144 Production of Insulin Analogue SCI-57 by Transient Expression in Nicotiana benthamiana
Authors: Adriana Muñoz-Talavera, Ana Rosa Rincón-Sánchez, Abraham Escobedo-Moratilla, María Cristina Islas-Carbajal, Miguel Ángel Gómez-Lim
Abstract:
The highest rates of diabetes incidence and prevalence worldwide will increase the number of diabetic patients requiring insulin or insulin analogues. Then, current production systems would not be sufficient to meet the future market demands. Therefore, developing efficient expression systems for insulin and insulin analogues are needed. In addition, insulin analogues with better pharmacokinetics and pharmacodynamics properties and without mitogenic potential will be required. SCI-57 (single chain insulin-57) is an insulin analogue having 10 times greater affinity to the insulin receptor, higher resistance to thermal degradation than insulin, native mitogenicity and biological effect. Plants as expression platforms have been used to produce recombinant proteins because of their advantages such as cost-effectiveness, posttranslational modifications, absence of human pathogens and high quality. Immunoglobulin production with a yield of 50% has been achieved by transient expression in Nicotiana benthamiana (Nb). The aim of this study is to produce SCI-57 by transient expression in Nb. Methodology: DNA sequence encoding SCI-57 was cloned in pICH31070. This construction was introduced into Agrobacterium tumefaciens by electroporation. The resulting strain was used to infiltrate leaves of Nb. In order to isolate SCI-57, leaves from transformed plants were incubated 3 hours with the extraction buffer therefore filtrated to remove solid material. The resultant protein solution was subjected to anion exchange chromatography on an FPLC system and ultrafiltration to purify SCI-57. Detection of SCI-57 was made by electrophoresis pattern (SDS-PAGE). Protein band was digested with trypsin and the peptides were analyzed by Liquid chromatography tandem-mass spectrometry (LC-MS/MS). A purified protein sample (20µM) was analyzed by ESI-Q-TOF-MS to obtain the ionization pattern and the exact molecular weight determination. Chromatography pattern and impurities detection were performed using RP-HPLC using recombinant insulin as standard. The identity of the SCI-57 was confirmed by anti-insulin ELISA. The total soluble protein concentration was quantified by Bradford assay. Results: The expression cassette was verified by restriction mapping (5393 bp fragment). The SDS-PAGE of crude leaf extract (CLE) of transformed plants, revealed a protein of about 6.4 kDa, non-present in CLE of untransformed plants. The LC-MS/MS results displayed one peptide with a high score that matches SCI-57 amino acid sequence in the sample, confirming the identity of SCI-57. From the purified SCI-57 sample (PSCI-57) the most intense charge state was 1069 m/z (+6) on the displayed ionization pattern corresponding to the molecular weight of SCI-57 (6412.6554 Da). The RP-HPLC of the PSCI-57 shows the presence of a peak with similar retention time (rt) and UV spectroscopic profile to the insulin standard (SCI-57 rt=12.96 and insulin rt=12.70 min). The collected SCI-57 peak had ELISA signal. The total protein amount in CLE from transformed plants was higher compared to untransformed plants. Conclusions: Our results suggest the feasibility to produce insulin analogue SCI-57 by transient expression in Nicotiana benthamiana. Further work is being undertaken to evaluate the biological activity by glucose uptake by insulin-sensitive and insulin-resistant murine and human cultured adipocytes.Keywords: insulin analogue, mass spectrometry, Nicotiana benthamiana, transient expression
Procedia PDF Downloads 3481143 Triticum Aestivum Yield Enhanced with Irrigation Scheduling Strategy under Salinity
Authors: Taramani Yadav, Gajender Kumar, R. K. Yadav, H. S. Jat
Abstract:
Soil Salinity and irrigation water salinity is critical threat to enhance agricultural food production to full fill the demand of billion plus people worldwide. Salt affected soils covers 6.73 Mha in India and ~1000 Mha area around the world. Irrigation scheduling of saline water is the way to ensure food security in salt affected areas. Research experiment was conducted at ICAR-Central Soil Salinity Research Institute, Experimental Farm, Nain, Haryana, India with 36 treatment combinations in double split plot design. Three sets of treatments consisted of (i) three regimes of irrigation viz., 60, 80 and 100% (I1, I2 and I3, respectively) of crop ETc (crop evapotranspiration at identified respective stages) in main plot; (ii) four levels of irrigation water salinity (sub plot treatments) viz., 2, 4, 8 and 12 dS m-1 (iii) applications of two PBRs along with control (without PBRs) i.e. salicylic acid (G1; 1 mM) and thiourea (G2; 500 ppm) as sub-sub plot treatments. Grain yield of wheat (Triticum aestivum) was increased with less amount of high salt loaded irrigation water at the same level of salinity (2 dS m-1), the trend was I3>I2>I1 at 2 dS m-1 with 8.10 and 17.07% increase at 80 and 100% ETc, respectively compared to 60% ETc. But contrary results were obtained by increasing amount of irrigation water at same level of highest salinity (12 dS m-1) showing following trend; I1>I2>I3 at 12 dS m-1 with 9.35 and 12.26% increase at 80 and 60% ETc compared to 100% ETc. Enhancement in grain yield of wheat (Triticum aestivum) is not need to increase amount of irrigation water under saline condition, with salty irrigation water less amount of irrigation water gave the maximum wheat (Triticum aestivum) grain yield.Keywords: Irrigation Scheduling, Saline Environment, Triticum aestivum, Yield
Procedia PDF Downloads 1441142 Early Evaluation of Long-Span Suspension Bridges Using Smartphone Accelerometers
Authors: Ekin Ozer, Maria Q. Feng, Rupa Purasinghe
Abstract:
Structural deterioration of bridge systems possesses an ongoing threat to the transportation networks. Besides, landmark bridges’ integrity and safety are more than sole functionality, since they provide a strong presence for the society and nations. Therefore, an innovative and sustainable method to inspect landmark bridges is essential to ensure their resiliency in the long run. In this paper, a recently introduced concept, smartphone-based modal frequency estimation is addressed, and this paper targets to authenticate the fidelity of smartphone-based vibration measurements gathered from three landmark suspension bridges. Firstly, smartphones located at the bridge mid-span are adopted as portable and standalone vibration measurement devices. Then, their embedded accelerometers are utilized to gather vibration response under operational loads, and eventually frequency domain characteristics are deduced. The preliminary analysis results are compared with the reference publications and high-quality monitoring data to validate the usability of smartphones on long-span landmark suspension bridges. If the technical challenges such as high period of vibration, low amplitude excitation, embedded smartphone sensor features, sampling, and citizen engagement are tackled, smartphones can provide a novel and cost-free crowdsourcing tool for maintenance of these landmark structures. This study presents the early phase findings from three signature structures located in the United States.Keywords: smart and mobile sensing, structural health monitoring, suspension bridges, vibration analysis
Procedia PDF Downloads 2921141 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation
Authors: Aditi Chauhan, Neethu S. Mohan
Abstract:
In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.Keywords: documents, identity, computational system, suspect
Procedia PDF Downloads 1761140 A Comparative Study of Adjustment Problems of Freshmen and Senior Year Students
Authors: Shimony Agrawal
Abstract:
In this continually evolving world, change is the most imperative component of our identity. The term alteration alludes to degree by which an individual adapts to inward strains, needs, clashes and can bring coordination between his internal requests and those forced by the external world. Adjustment is a way of managing various demands of life. . Entering school is a defining moment for school first year recruits in their adulthood. The progress from school to school can be rationally and in addition physically troubling. Students deal with a unique amount of stressors when they enter college. Introductory months of school are loaded with apprehension and attempting to fit in the new condition. Colleges and schools should ensure their understudies are balanced in the new condition by giving help at whatever point vital.. The main objective of the study was a comparative analysis of adjustment level with respect to overall adjustment level, gender and living environment. This research has been conducted using Adjustment Inventory for College Students (AICS). The total population is comprised of 240 college-going students. The data majority of the population scored poorly on Emotional Adjustment. Also, female students faced more adjustment problems as compared to male students. However, no significant change was noticed in living environment of the students.Keywords: adjustment, college students, freshmen year, senior year
Procedia PDF Downloads 2601139 Post Liberal Perspective on Minorities Visibility in Contemporary Visual Culture: The Case of Mizrahi Jews
Authors: Merav Alush Levron, Sivan Rajuan Shtang
Abstract:
From as early as their emergence in Europe and the US, postmodern and post-colonial paradigm have formed the backbone of the visual culture field of study. The self-representation project of political minorities is studied, described and explained within the premises and perspectives drawn from these paradigms, addressing the key issues they had raised: modernism’s crisis of representation. The struggle for self-representation, agency and multicultural visibility sought to challenge the liberal pretense of universality and equality, hitting at its different blind spots, on issues such as class, gender, race, sex, and nationality. This struggle yielded subversive identity and hybrid performances, including reclaiming, mimicry and masquerading. These performances sought to defy the uniform, universal self, which forms the basis for the liberal, rational, enlightened subject. The argument of this research runs that this politics of representation itself is confined within liberal thought. Alongside post-colonialism and multiculturalism’s contribution in undermining oppressive structures of power, generating diversity in cultural visibility, and exposing the failure of liberal colorblindness, this subversion is constituted in the visual field by way of confrontation, flying in the face of the universal law and relying on its ongoing comparison and attribution to this law. Relying on Deleuze and Guattari, this research set out to draw theoretic and empiric attention to an alternative, post-liberal occurrence which has been taking place in the visual field in parallel to the contra-hegemonic phase and as a product of political reality in the aftermath of the crisis of representation. It is no longer a counter-representation; rather, it is a motion of organic minor desire, progressing in the form of flows and generating what Deleuze and Guattari termed deterritorialization of social structures. This discussion shall have its focus on current post-liberal performances of ‘Mizrahim’ (Jewish Israelis of Arab and Muslim extraction) in the visual field in Israel. In television, video art and photography, these performances challenge the issue of representation and generate concrete peripheral Mizrahiness, realized in the visual organization of the photographic frame. Mizrahiness then transforms from ‘confrontational’ representation into a 'presence', flooding the visual sphere in our plain sight, in a process of 'becoming'. The Mizrahi desire is exerted on the plains of sound, spoken language, the body and the space where they appear. It removes from these plains the coding and stratification engendered by European dominance and rational, liberal enlightenment. This stratification, adhering to the hegemonic surface, is flooded not by way of resisting false consciousness or employing hybridity, but by way of the Mizrahi identity’s own productive, material immanent yearning. The Mizrahi desire reverberates with Mizrahi peripheral 'worlds of meaning', where post-colonial interpretation almost invariably identifies a product of internalized oppression, and a recurrence thereof, rather than a source in itself - an ‘offshoot, never a wellspring’, as Nissim Mizrachi clarifies in his recent pioneering work. The peripheral Mizrahi performance ‘unhook itself’, in Deleuze and Guattari words, from the point of subjectification and interpretation and does not correspond with the partialness, absence, and split that mark post-colonial identities.Keywords: desire, minority, Mizrahi Jews, post-colonialism, post-liberalism, visibility, Deleuze and Guattari
Procedia PDF Downloads 3241138 Heritage Impact Assessment Policy within Western Balkans, Albania
Authors: Anisa Duraj
Abstract:
As usually acknowledged, cultural heritage is the weakest component in EIA studies. The role of heritage impact assessment (HIA) in development projects is not often accounted for, and in those cases where it is, HIA is considered as a reactive response and not as a solutions provider. Because of continuous development projects, in most cases, heritage is unconsidered and often put under threat. Cultural protection and development challenges ask for prudent legal regulation and appropriate policy implementation. The challenges become even more peculiar in underdeveloped countries or endangered areas, which are generally characterized by numerous legal constraints. Therefore, the need for strategic proposals for HIA is of high importance. In order to trigger HIA as a proactive operation in the IA process and make sure to cover cultural heritage in the whole EIA framework, an appropriate system of evaluation of impacts should be provided. To obtain the required results for HIA, this last must be part of a regional policy, which will address and guide development projects toward a proper evaluation of their impacts affecting heritage. In order to get a clearer picture of existing gabs but also new possibilities for HIA, this paper will focus on the Western Balkans region and the undergoing changes that it faces. Concerning continuous development pressure in the region and within the aspiration of the Western Balkans countries to join the European Union (EU) as member states, attention should be paid to new development policies under the EU directives for conducting EIAs, and accurate support is required for the restructuration of existing policies as well as for the implementation of the UN Agenda for SDGs. In the framework of new emerging needs, if HIA is taken into account, the outcome would be an inclusive regional program that would help to overcome marginality issues of spaces and people.Keywords: cultural heritage, impact assessment, SDGs, urban development, western Balkans, regional policy, HIA, EIA
Procedia PDF Downloads 1141137 Securing Online Voting With Blockchain and Smart Contracts
Authors: Anant Mehrotra, Krish Phagwani
Abstract:
Democratic voting is vital for any country, but current methods like ballot papers or EVMs have drawbacks, including transparency issues, low voter turnout, and security concerns. Blockchain technology offers a potential solution by providing a secure, decentralized, and transparent platform for e-voting. With features like immutability, security, and anonymity, blockchain combined with smart contracts can enhance trust and prevent vote tampering. This paper explores an Ethereum-based e-voting application using Solidity, showcasing a web app that prevents duplicate voting through a token-based system, while also discussing the advantages and limitations of blockchain in digital voting. Voting is a crucial component of democratic decision-making, yet current methods, like paper ballots, remain outdated and inefficient. This paper reviews blockchain-based voting systems, highlighting strategies and guidelines to create a comprehensive electronic voting system that leverages cryptographic techniques, such as zero-knowledge proofs, to enhance privacy. It addresses limitations of existing e-voting solutions, including cost, identity management, and scalability, and provides key insights for organizations looking to design their own blockchain-based voting systems.Keywords: electronic voting, smart contracts, blockchain nased voting, security
Procedia PDF Downloads 91136 Physics of Black Holes. A Closed Cycle of Transformation of Matter in the Universe
Authors: Igor V. Kuzminov
Abstract:
The proposed article is a development of the topics of gravity, the inverse temperature dependence of gravity, the action of the inverse temperature dependence of gravity, and the second law of thermodynamics, dark matter, the identity of gravity, inertial forces, and centrifugal forces. All interaction schemes are built on the basis of Newton's laws of classical mechanics and Rutherford's planetary model of the structure of the atom. The basis of all constructions is the gyroscopic effect of rotation of all particles of the atomic structure. In this case, interatomic and intermolecular bonds are accepted as the static part of the gyroscope, and the rotation of an electron in an atom is accepted as the dynamic part. The structure of the planet Earth is accepted as a model of the structure of the Black Hole. Namely, gravitational and thermodynamic phenomena in the structure of the planet Earth are accepted as a model. Based on this model, assumptions are made about the processes inside the Black Hole. Moreover, a version is put forward, a scheme of a closed cycle of transformation of matter in the Universe.Keywords: black hole, gravity, inverse temperature dependence of gravitational forces, second law of thermodynamics, gyroscopic effect, dark matter
Procedia PDF Downloads 251135 Alexandrium pacificum Cysts Distribution in One North African Lagoon Ecosystem
Authors: M. Fertouna Bellakhal, M. Bellakhal, A. Dhib, A. Fathalli, S. Turki, L. Aleya
Abstract:
Study of dinoflagellate cysts is a precious tool to get information about environment and water quality in many aquatic ecosystems. The distribution of Alexandrium pacificum cysts, in Bizerta lagoon located in North of Tunisia, was made based on sediment samples analysis from 123 equidistant stations delimiting 125 km² surfaces. Sediment characteristics such as percentage of water, organic matter, and particle size were analyzed to determine the factors that influence the distribution of this dinoflagellate. In addition, morphological examination and ribotyping of vegetative forms from microalgal cultures made from cyst germination confirmed the identity of the species attributed to A. pacificum. A correlation between the abundance of A. pacificum cysts and the percentage of water and sediment organic matter was recorded. In addition, the sedimentary fraction < 63μm was found to be potentially favorable for the installation and initiation of the Alexandrium pacificum efflorescence at the Bizerte lagoon. The mapping of cysts in this aquatic ecosystem has also allowed us to define distinct areas with specific abundance with closed relationship with shellfish aquaculture stations located within the lagoon.Keywords: Alexandrium pacificum, cysts, Dinoflagellate, microalgal culture
Procedia PDF Downloads 1491134 Representation of How Patriarchy Affects Mental Health in Qala and Black Swan
Authors: Mokshida Bhat
Abstract:
This paper examines the representation of patriarchy in the movies 'Qala' and 'Black Swan' and how it affects the mental health of women. Both movies portray female characters who are subject to patriarchal attitudes and structures that limit their choices and opportunities and contribute to negative mental health outcomes. In 'Qala' the central character Qala confronts the patriarchal attitudes of her family and community, which contribute to feelings of frustration and despair. In 'Black Swan' the main character Nina is subject to the demands and expectations of a patriarchal system that leads to anxiety, paranoia, and disconnection from her own body and emotions. Both movies highlight the harmful impact of patriarchal attitudes on women's mental health, including feelings of disempowerment, objectification, and self-doubt. The paper suggests that these negative outcomes can be addressed through a rejection of patriarchal norms and an assertion of one's own agency and identity. Overall, this paper demonstrates the importance of recognizing the role of patriarchy in contributing to mental health struggles for women and the need for more diverse and empowering representations of women in media.Keywords: patriarchy, mental health, depression, PTSD, mental health in Indian cinema, patriarchy in Indian cinema, feminism and patriarchy, sexism
Procedia PDF Downloads 551133 Narrative Psychology and Its Role in Illuminating the Experience of Suffering
Authors: Maureen Gibney
Abstract:
The examination of narrative in psychology has a long tradition, starting with psychoanalytic theory and embracing over time cognitive, social, and personality psychology, among others. Narrative use has been richly detailed as well in medicine, nursing, and social service. One aspect of narrative that has ready utility in higher education and in clinical work is the exploration of suffering and its meaning. Because it is such a densely examined topic, suffering provides a window into identity, sense of purpose, and views of humanity and of the divine. Storytelling analysis permits an exploration of a host of specific manifestations of suffering such as pain and illness, moral injury, and the impact of prolonged suffering on love and relationships. This presentation will review the origins and current understandings of narrative theory in general, and will draw from psychology, medicine, ethics, nursing, and social service in exploring the topic of suffering in particular. It is suggested that the use of narrative themes such as meaning making, agency and communion, generativity, and loss and redemption allows for a finely grained analysis of common and more atypical sources of suffering, their resolution, and the acceptance of their continuation when resolution is not possible. Such analysis, used in professional work and in higher education, can enrich one’s empathy and one’s sense of both the fragility and strength of everyday life.Keywords: meaning making, narrative theory, suffering, teaching
Procedia PDF Downloads 2651132 Erotic Subversions: Male Masochism, Power, and the Politics of Desire in Hong Kong’s BDSM Landscape
Authors: Maari Sugawara
Abstract:
This research critically engages with the erotic and political entanglements of male clientele of Dominatrices who identify as submissives (hereafter referred to as submissives) within Hong Kong's BDSM scene. Employing masochism as an analytical framework, it interrogates the intersections of capitalism, heteropatriarchy, postcolonialism, and commodified desire. BDSM (Bondage and Discipline, Dominance and Submission, Sadism and Masochism) encompasses practices that explore power, control, and subordination through both physical and psychological role-play, predicated on consent, negotiation, and boundary delineation. This makes BDSM a fertile site for examining how dominance and submission are mobilized, challenged, and reiterated. This study focuses on the dynamics between thirty male submissives and three professional Dominatrices active in Hong Kong since 2019. The predominance of male interviewees reflects the demographic reality that most clients engaging with professional Dominatrices are male. These submissives—men who willfully relinquish control—offer a critical lens for exploring how BDSM, as both practice and market, mirrors and destabilizes dominant power structures. BDSM relationships occasionally replicate the hierarchical logics of heterosexual marriage, particularly in the expectation that submissives engage exclusively with a single Dominatrix, reflecting a dynamic of devotion and fidelity akin to traditional marital structures. However, these relationships also function as counter-normative spaces where care and control are reconfigured, enabling the negotiation of alternative power configurations. By centering BDSM work rather than broader kink practices, this study foregrounds the commodification of intimacy as a key site where suppressed desires, economic forces, and political tensions converge. The submissives in this study are predominantly affluent, cisgender men, underscoring the socio-economic asymmetries in the BDSM market. Furthermore, the research examines how Hong Kong’s political turbulence—particularly the 2019 Yellow Umbrella Movement and the COVID-19 pandemic—has reverberated through the BDSM scene, reshaping the contours of desire, trust, and power in these intimate transactions. The increasing tensions with mainland China, alongside the erosion of public trust in state institutions, form a critical backdrop to this evolving landscape. Grounded in gender and sexuality theories, this research interrogates how the desires of male submissives are constructed within and resist heteronormative frameworks. BDSM practices, far from existing outside capitalist and colonial logics, often act as both a mirror and critique of these systems, revealing complex ways in which power is commodified, enacted, and contested. In their pursuit of emotional care and alternative forms of control, male submissives navigate a paradoxical terrain where their masochistic desires both subvert and perpetuate the socio-political status quo. By examining the intersections of desire, commodification, and the shifting socio-political landscape, this research provides a nuanced understanding of how BDSM functions as a site of negotiation for those navigating the turbulent crosscurrents of capitalist and colonial legacies. Ultimately, it uncovers the complex interplay between erotic practices and the structures of power and identity in a city undergoing profound transformation.Keywords: masochism, Hong Kong, identity, BDSM, dominatrix, masculinity, gender studies
Procedia PDF Downloads 201131 Revitalization of Sign Language through Deaf Theatre: A Linguistic Analysis of an Art Form Which Combines Physical Theatre, Poetry, and Sign Language
Authors: Gal Belsitzman, Rose Stamp, Atay Citron, Wendy Sandler
Abstract:
Sign languages are considered endangered. The vitality of sign languages is compromised by its unique sociolinguistic situation, in which hearing parents that give birth to deaf children usually decide to cochlear implant their child. Therefore, these children don’t acquire their natural language – Sign Language. Despite this, many sign languages, such as Israeli Sign Language (ISL) are thriving. The continued survival of similar languages under threat has been associated with the remarkable resilience of the language community. In particular, deaf literary traditions are central in reminding the community of the importance of the language. One example of a deaf literary tradition which has received increased popularity in recent years is deaf theatre. The Ebisu Sign Language Theatre Laboratory, developed as part of the multidisciplinary Grammar of the Body Research Project, is the first deaf theatre company in Israel. Ebisu Theatre combines physical theatre and sign language research, to allow for a natural laboratory to analyze the creative use of the body. In this presentation, we focus on the recent theatre production called ‘Their language’ which tells of the struggle faced by the deaf community to use their own natural language in the education system. A thorough analysis unravels how linguistic properties are integrated with the use of poetic devices and physical theatre techniques in this performance, enabling wider access by both deaf and hearing audiences, without interpretation. Interviews with the audience illustrate the significance of this art form which serves a dual purpose, both as empowering for the deaf community and educational for the hearing and deaf audiences, by raising awareness of community-related issues.Keywords: deaf theatre, empowerment, language revitalization, sign language
Procedia PDF Downloads 1671130 Development of Building Information Modeling for Cultural Heritage: The Case of West Theater in Gadara (Umm Qais), Jordan
Authors: Amal Alatar
Abstract:
The architectural legacy is considered a significant factor, which left its features on the shape of buildings and historical and archaeological sites all over the world. In this framework, this paper focuses on Umm Qais town, located in Northern Jordan, which includes archaeological remains of the ancient Decapolis city of Gadara, still the witness of the originality and architectural identity of the city. 3D modeling is a public asset and a valuable resource for cultural heritage. This technique allows the possibility to make accurate representations of objects, structures, and surfaces. Hence, these representations increase valuable assets when thinking about cultural heritage. The Heritage Building Information Modeling (HBIM) is considered an effective tool to represent information on Cultural Heritage (CH) which can be used for documentation, restoration, conservation, presentation, and research purposes. Therefore, this paper focus on the interdisciplinary project of the virtualization of the West Theater in Gadara (Umm Qais) for 3D documentation and structural studies. The derived 3D model of the cultural heritage is the basis for further archaeological studies; the challenges of the work stay in the acquisition, processing, and integration of the multi-resolution data as well as their interactive visualization.Keywords: archaeology, 3D modeling, Umm Qais, culture heritage, Jordan
Procedia PDF Downloads 1011129 Survey and Identification of Coinfecting Botryosphaeriales Causing Stem Canker Diseases of Eucalyptus camaldulensis in Ethiopia
Authors: Wendu Admasu, Assefa Sintayehu, Alemu Gezahgne, Zewdu Terefework
Abstract:
Eucalyptus is the most widely planted forest tree species in the world. In Ethiopia, pathogenic fungi pose an increasing threat to Eucalyptus species. Due to limited research, there is insufficient information on the associated diseases and pathogens. This study investigated Eucalyptus diseases, the extent of their damage, and the causal fungal pathogens. A Eucalyptus disease survey was conducted in the Eucalyptus forestry areas of Ethiopia during the growth years 2019/20 and 2020/21. Disease assessment and sampling were carried out in eighteen plantations at nine locations. E. camaldulensis was the most dominant species planted in the surveyed areas. The field study shows a high incidence and severity of canker diseases. Diseased stem and branch samples were collected, cultured on malt extract agar media and studied. The results of morphological and ITS sequence analysis confirmed that the fungal species Neofusicoccum parvum, Lasiodiplodia theobromae, and Aplosporella hesperidica caused the observed canker symptoms. This is the first report of Lasiodiplodia theobromae and Aplosporella hesperidica causing diseases in Eucalyptus plants in Ethiopia. Changes in global climate and environmental factors, such as altitude, are believed to have a strong impact on the susceptibility of Eucalyptus plants to diseases. Strict quarantine practices and continuous monitoring of pathogenic and endophytic fungal species associated with Eucalyptus trees are issued to be prioritized to effectively control and manage the disease.Keywords: Neofusicoccum, Lasiodiplodia, Aplosporella, pathogenicity, phylogeny, severity
Procedia PDF Downloads 691128 “It Just Feels Risky”: Intuition vs Evidence in Child Sexual Abuse Cases. Proposing an Empirically Derived Risk and Protection Protocol
Authors: Christian Perrin, Nicholas Blagden, Louise Allen, Sarah Impey
Abstract:
Social workers in the UK and professionals globally are faced with a particular challenge when dealing with allegations of child sexual abuse (CSA) in the community. In the absence of a conviction or incontestable evidence, staff can often find themselves unable to take decisive action to remove a child from harm, even though there may be a credible threat to their welfare. Conversely, practitioners may over-calculate risk through fear of being accountable for harm. This is, in part, due to the absence of a structured and evidence-based risk assessment tool which can predict the likelihood of a person committing child sexual abuse. Such assessments are often conducted by forensic professionals who utilise offence-specific data and personal history information to calculate risk. In situations where only allegations underpin a case, this mode of assessment is not viable. There are further ethical issues surrounding the assessment of risk in this area which require expert consideration and sensitive planning. This paper explores this entangled problem extant in the wider call to prevent sexual and child sexual abuse in the community. To this end, 32 qualitative interviews were undertaken with social workers dealing with CSA cases. Results were analysed using thematic analysis and operationalised to formulate a risk and protection protocol for use in case management. This paper reports on the early findings associated with the initial indications of protocol reliability. Implications for further research and practice are discussed.Keywords: sexual offending, child sexual offence, offender rehabilitation, risk assessment, offence prevention
Procedia PDF Downloads 1091127 Modeling of Sediment Yield and Streamflow of Watershed Basin in the Philippines Using the Soil Water Assessment Tool Model for Watershed Sustainability
Authors: Warda L. Panondi, Norihiro Izumi
Abstract:
Sedimentation is a significant threat to the sustainability of reservoirs and their watershed. In the Philippines, the Pulangi watershed experienced a high sediment loss mainly due to land conversions and plantations that showed critical erosion rates beyond the tolerable limit of -10 ton/ha/yr in all of its sub-basin. From this event, the prediction of runoff volume and sediment yield is essential to examine using the country's soil conservation techniques realistically. In this research, the Pulangi watershed was modeled using the soil water assessment tool (SWAT) to predict its watershed basin's annual runoff and sediment yield. For the calibration and validation of the model, the SWAT-CUP was utilized. The model was calibrated with monthly discharge data for 1990-1993 and validated for 1994-1997. Simultaneously, the sediment yield was calibrated in 2014 and validated in 2015 because of limited observed datasets. Uncertainty analysis and calculation of efficiency indexes were accomplished through the SUFI-2 algorithm. According to the coefficient of determination (R2), Nash Sutcliffe efficiency (NSE), King-Gupta efficiency (KGE), and PBIAS, the calculation of streamflow indicates a good performance for both calibration and validation periods while the sediment yield resulted in a satisfactory performance for both calibration and validation. Therefore, this study was able to identify the most critical sub-basin and severe needs of soil conservation. Furthermore, this study will provide baseline information to prevent floods and landslides and serve as a useful reference for land-use policies and watershed management and sustainability in the Pulangi watershed.Keywords: Pulangi watershed, sediment yield, streamflow, SWAT model
Procedia PDF Downloads 2091126 Botulism Clinical Experience and Update
Authors: Kevin Yeo, Christine Hall, Babinchak Tim
Abstract:
BAT® [Botulism Antitoxin Heptavalent (A,B,C,D,E,F,G)-(Equine)] anti-toxin is a mixture of equine immune globulin fragments indicated for the treatment of symptomatic botulism in adult and pediatric patients. The effectiveness of BAT anti-toxin is based on efficacy studies conducted in animal models. A general explanation of the pivotal animal studies, post market surveillance and outcomes of an observational patient registry for patients treated with BAT product distributed in the USA is briefly discussed. Overall it took 20 animal studies for two well-designed and appropriately powered pivotal efficacy studies – one in which the effectiveness of BAT was assessed against all 7 serotypes in the guinea pig, and the other where efficacy is confirmed in the Rhesus macaque using Serotype A. Clinical Experience for BAT to date involves approximately 600 adult and pediatric patients with suspected botulism. In pre-licensure, patient data was recorded under the US CDC expanded access program (259 adult and pediatric patients between 10 days to 88 years of age). In post licensure, greater than 350 patients to date have received BAT and been followed up by enhanced expanded access program. The analysis of the post market surveillance data provided a unique opportunity to demonstrate clinical benefit in the field study required by the animal rule. While the animal rule is applied because human efficacy studies are not ethical or feasible, a post-marketing requirement is to conduct a study to evaluate safety and clinical benefit when circumstances arise and demonstrate the favourable benefit-risk profile that supported licensure.Keywords: botulism, threat, clinical benefit, observational patient registry
Procedia PDF Downloads 1791125 Use of the Gas Chromatography Method for Hydrocarbons' Quality Evaluation in the Offshore Fields of the Baltic Sea
Authors: Pavel Shcherban, Vlad Golovanov
Abstract:
Currently, there is an active geological exploration and development of the subsoil shelf of the Kaliningrad region. To carry out a comprehensive and accurate assessment of the volumes and degree of extraction of hydrocarbons from open deposits, it is necessary to establish not only a number of geological and lithological characteristics of the structures under study, but also to determine the oil quality, its viscosity, density, fractional composition as accurately as possible. In terms of considered works, gas chromatography is one of the most capacious methods that allow the rapid formation of a significant amount of initial data. The aspects of the application of the gas chromatography method for determining the chemical characteristics of the hydrocarbons of the Kaliningrad shelf fields are observed in the article, as well as the correlation-regression analysis of these parameters in comparison with the previously obtained chemical characteristics of hydrocarbon deposits located on the land of the region. In the process of research, a number of methods of mathematical statistics and computer processing of large data sets have been applied, which makes it possible to evaluate the identity of the deposits, to specify the amount of reserves and to make a number of assumptions about the genesis of the hydrocarbons under analysis.Keywords: computer processing of large databases, correlation-regression analysis, hydrocarbon deposits, method of gas chromatography
Procedia PDF Downloads 157