Search results for: national security hazards
5874 Food Security in Germany: Inclusion of the Private Sector through Law Reform Faces Challenges
Authors: Agnetha Schuchardt, Jennifer Hartmann, Laura Schulte, Roman Peperhove, Lars Gerhold
Abstract:
If critical infrastructures fail, even for a short period of time, it can have significant negative consequences for the affected population. This is especially true for the food sector that is strongly interlinked with other sectors like the power supply. A blackout could lead to several cities being without food supply for numerous days, simply because cash register systems do no longer work properly. Following the public opinion, securing the food supply in emergencies is considered a task of the state, however, in the German context, the key players are private enterprises and private households. Both are not aware of their responsibility and both cannot be forced to take any preventive measures prior to an emergency. This problem became evident to officials and politicians so that the law covering food security was revised in order to include private stakeholders into mitigation processes. The paper will present a scientific review of governmental and regulatory literature. The focus is the inclusion of the food industry through a law reform and the challenges that still exist. Together with legal experts, an analysis of regulations will be presented that explains the development of the law reform concerning food security and emergency storage in Germany. The main findings are that the existing public food emergency storage is out-dated, insufficient and too expensive. The state is required to protect food as a critical infrastructure but does not have the capacities to live up to this role. Through a law reform in 2017, new structures should to established. The innovation was to include the private sector into the civil defense concept since it has the required knowledge and experience. But the food industry is still reluctant. Preventive measures do not serve economic purposes – on the contrary, they cost money. The paper will discuss respective examples like equipping supermarkets with emergency power supply or self-sufficient cash register systems and why the state is not willing to cover the costs of these measures, but neither is the economy. The biggest problem with the new law is that private enterprises can only be forced to support food security if the state of emergency has occurred already and not one minute earlier. The paper will cover two main results: the literature review and an expert workshop that will be conducted in summer 2018 with stakeholders from different parts of the food supply chain as well as officials of the public food emergency concept. The results from this participative process will be presented and recommendations will be offered that show how the private economy could be better included into a modern food emergency concept (e. g. tax reductions for stockpiling).Keywords: critical infrastructure, disaster control, emergency food storage, food security, private economy, resilience
Procedia PDF Downloads 1855873 PUF-Based Lightweight Iot Secure Authentication Chip Design
Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He
Abstract:
This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.Keywords: PUF, IoT, authentication, secure communication, encryption, XOR
Procedia PDF Downloads 1405872 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy
Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi
Abstract:
Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.Keywords: terrorism, economy, Boko Haram, Nigeria
Procedia PDF Downloads 2585871 Accessibility of Social Justice through Social Security in Indian Organisations: Analysis Based on Workforce
Authors: Neelima Rashmi Lakra
Abstract:
India was among one of the highly developed economy up to 1850 due to its cottage industries. During the end of the 18th century, modern industrial enterprises began with the first cotton mill in Bombay, the jute mill near Calcutta and the coal mine in Raniganj. This was counted as the real beginning of industry in 1854 in India. Prior to this period people concentrated only to agriculture, menial service or handicraft, and the introduction of industries exposed them to the disciplines of factory which was very tedious for them. With increasing number of factories been setup adding on to mining and introduction of railway, World War Period (1914-19), Second World War Period (1939-45) and the Great Depression (1929-33) there were visible change in the nature of work for the people, which resulted in outburst of strike for various reasons in these factories. Here, with India’s independence there was emergence of public sector industries and labour legislations were introduced. Meanwhile, trade unions came to notice to the rescue of the oppressed but failed to continue till long. Soon after, with the New Economic Policy organisations came across to face challenges to perform their best, where social justice for the workmen was in question. On these backdrops, studies were found discussing the central human capabilities which could be addressed through Social Security schemes. Therefore, this study was taken up to look at the reforms and legislations mainly meant for the welfare of the labour. This paper will contribute to the large number of Indian population who are serving in public sectors in India since the introduction of industries and will complement the issue of social justice through social security measures among this huge crowd serving the nation. The objectives of the study include; to find out what labour Legislations have already been existing in India, the role of Trade Union Movement, to look at the effects of New Economic Policy on these reforms and its effects and measures taken for the workforce employed in the public sectors and finally, if these measures fulfil the social justice aspects for the larger society on whole. The methodology followed collection of data from books, journal articles, reports, company reports and manuals focusing mainly on Indian studies and the data was analysed following content analysis method. The findings showed the measures taken for Social Security, but there were also reflections of very few particular additions or amendments to these Acts and provisions with the onset of New Liberalisation Policy. Therefore, the study concluded examining the social justice aspects in the context of a developing economy and discussing the recommendations.Keywords: public sectors, social justice, social security schemes, trade union movement
Procedia PDF Downloads 4505870 Prevalence of the Musculoskeletal Disorder amongst School Teachers
Authors: Nirav Vaghela, Sanket Parekh
Abstract:
Objective: Musculoskeletal disorders (MSD) represent one of the most common and important occupational health problems in working populations, being responsible for a substantial impact on quality of life and incurring a major economic burden in compensation cost and lost wages. School teachers represent an occupational group among which there appears to be a high prevalence of MSD. Design: Three hundred and fourteen teachers were enrolled in this study. Teachers were interview with the Modified Nordic Questionnaire. Result: In current study total 314 participants have been recruited in that minimum age of participants is 22 and maximum age is 59 with mean 40.5± 9.88. Total prevalence of the MSD is 71.95% among the teachers. In that Female were more affected with 72% than the males with 28%. Conclusion: The teachers here in reported a high prevalence of musculoskeletal pain in the shoulder, knee and back.Keywords: repetitive stress injury, pain, occupational hazards, disability, abneetism, physical health, quality of life
Procedia PDF Downloads 2905869 Using ANN in Emergency Reconstruction Projects Post Disaster
Authors: Rasha Waheeb, Bjorn Andersen, Rafa Shakir
Abstract:
Purpose The purpose of this study is to avoid delays that occur in emergency reconstruction projects especially in post disaster circumstances whether if they were natural or manmade due to their particular national and humanitarian importance. We presented a theoretical and practical concepts for projects management in the field of construction industry that deal with a range of global and local trails. This study aimed to identify the factors of effective delay in construction projects in Iraq that affect the time and the specific quality cost, and find the best solutions to address delays and solve the problem by setting parameters to restore balance in this study. 30 projects were selected in different areas of construction were selected as a sample for this study. Design/methodology/approach This study discusses the reconstruction strategies and delay in time and cost caused by different delay factors in some selected projects in Iraq (Baghdad as a case study).A case study approach was adopted, with thirty construction projects selected from the Baghdad region, of different types and sizes. Project participants from the case projects provided data about the projects through a data collection instrument distributed through a survey. Mixed approach and methods were applied in this study. Mathematical data analysis was used to construct models to predict delay in time and cost of projects before they started. The artificial neural networks analysis was selected as a mathematical approach. These models were mainly to help decision makers in construction project to find solutions to these delays before they cause any inefficiency in the project being implemented and to strike the obstacles thoroughly to develop this industry in Iraq. This approach was practiced using the data collected through survey and questionnaire data collection as information form. Findings The most important delay factors identified leading to schedule overruns were contractor failure, redesigning of designs/plans and change orders, security issues, selection of low-price bids, weather factors, and owner failures. Some of these are quite in line with findings from similar studies in other countries/regions, but some are unique to the Iraqi project sample, such as security issues and low-price bid selection. Originality/value we selected ANN’s analysis first because ANN’s was rarely used in project management , and never been used in Iraq to finding solutions for problems in construction industry. Also, this methodology can be used in complicated problems when there is no interpretation or solution for a problem. In some cases statistical analysis was conducted and in some cases the problem is not following a linear equation or there was a weak correlation, thus we suggested using the ANN’s because it is used for nonlinear problems to find the relationship between input and output data and that was really supportive.Keywords: construction projects, delay factors, emergency reconstruction, innovation ANN, post disasters, project management
Procedia PDF Downloads 1655868 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1105867 Quality of Life Responses of Students with Intellectual Disabilities Entering an Inclusive, Residential Post-Secondary Program
Authors: Mary A. Lindell
Abstract:
Adults with intellectual disabilities (ID) are increasingly attending postsecondary institutions, including inclusive residential programs at four-year universities. The legislation, national organizations, and researchers support developing postsecondary education (PSE) options for this historically underserved population. Simultaneously, researchers are assessing the quality of life indicators (QOL) for people with ID. This study explores the quality of life characteristics for individuals with ID entering a two-year PSE program. A survey aligned with the PSE program was developed and administered to participants before they began their college program (in future studies, the same survey will be administered 6 months and 1 year after graduating). Employment, income, and housing are frequently cited QOL measures. People with disabilities, and especially people with ID, are more likely to experience unemployment and low wages than people without disabilities. PSE improves adult outcomes (e.g., employment, income, housing) for people with and without disabilities. Similarly, adults with ID who attend PSE are more likely to be employed than their peers who do not attend PSE; however, adults with ID are least likely among their typical peers and other students with disabilities to attend PSE. There is increased attention to providing individuals with ID access to PSE and more research is needed regarding the characteristics of students attending PSE. This study focuses on the participants of a fully residential two-year program for individuals with ID. Students earn an Applied Skills Certificate while focusing on five benchmarks: self-care, home care, relationships, academics, and employment. To create a QOL measure, the goals of the PSE program were identified, and possible assessment items were initially selected from the National Core Indicators (NCI) and the National Transition Longitudinal Survey 2 (NTLS2) that aligned with the five program goals. Program staff and advisory committee members offered input on potential item alignment with program goals and expected value to students with ID in the program. National experts in researching QOL outcomes of people with ID were consulted and concurred that the items selected would be useful in measuring the outcomes of postsecondary students with ID. The measure was piloted, modified, and administered to incoming students with ID. Research questions: (1) In what ways are students with ID entering a two-year PSE program similar to individuals with ID who complete the NCI and NTLS2 surveys? (2) In what ways are students with ID entering a two-year PSE program different than individuals with ID who completed the NCI and NTLS2 surveys? The process of developing a QOL measure specific to a PSE program for individuals with ID revealed that many of the items in comprehensive national QOL measures are not relevant to stake-holders of this two-year residential inclusive PSE program. Specific responses of students with ID entering an inclusive PSE program will be presented as well as a comparison to similar items on national QOL measures. This study explores the characteristics of students with ID entering a residential, inclusive PSE program. This information is valuable for, researchers, educators, and policy makers as PSE programs become more accessible for individuals with ID.Keywords: intellectual disabilities, inclusion, post-secondary education, quality of life
Procedia PDF Downloads 985866 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 135865 Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team
Procedia PDF Downloads 1545864 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking
Authors: Haowei Chen, Kaiqi Xiong
Abstract:
This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis
Procedia PDF Downloads 985863 Factors Affecting Sense of Community in Residential Communities Case Study: Residential Communities in Tehran, Iran
Authors: Parvin Foroughifar
Abstract:
The concept of sense of community refers to residents’ sense of attachment and commitment to the other residents in a residential community. It is implicitly indicative of the mental image of a physical environment in which the residents enjoy strong social ties. Sense of community, a crucial factor in improving quality of life and social welfare, leads to life satisfaction in a residential community. Despite the important functions of such a notion, few empirical studies, to the best of the authors' knowledge, have been so far carried out in Iran to investigate the effective factors in sharpening the sense of community in residential communities. This survey research examined sense of community in 360 above 20-year old residents of three residential communities in Tehran, Iran using cluster sampling and questionnaire. The study yielded the result that variables of local social ties, social control and trust, sense of security, length of residence, use of public spaces, and mixed land use have a significant relationship with sense of community.Keywords: sense of community, local social ties, sense of security, public space, residential community, Tehran
Procedia PDF Downloads 1875862 Birth Path and the Vitality of Caring Models in the Continuity of Midwifery
Authors: Elnaz Lalezari, Ramin Ghasemi Shaya
Abstract:
The birth way is influenced by a fracture within the quiet care handle, making a brokenness of this final one. The pregnant lady has got to interface with numerous experts, both amid the pregnancy, the childbirth, and the puerperium. Be that as it may, amid the final ten a long time, there has been an expanding of the pregnancy care worked by the midwife, who is considered to be the administrator with the correct competences, who can beware of each pregnancy and may profit herself of other professionals' commitments in arrange to make strides the results of maternal and neonatal health. To confirm whether there are proofs of viability that bolster the caseload birthing assistance care show, and in case it is conceivable to apply this show within the birth way in Italy. A amendment of writing has been done utilizing a few look motor (Google, Bing) and particular databases (MEDLINE, CINAHL, Embase, Domestic - ClinicalTrials.gov). There has, too, been a discussion of the Italian directions, the national rules, and the proposals of WHO. Results: The look string, legitimately adjusted to the three databases, has given the taking after comes about: MEDLINE 64 articles, CINAHL 94 articles, Embase 88 articles. From this choice, 14 articles have been extricated: 1 orderly survey, 3 controlled arbitrary trial, 7 observational ponders, 3 subjective studies. The caseload maternity care appears to be an successful and dependable organisational/caring strategy. It reacts to the criterions of quality and security, to the requirements of ladies not as it were amid the pregnancy but moreover amid the post-partum stage. For these reasons, it appears exceptionally valuable also for the birth way within the Italian reality.Keywords: midwifery, care, caseload, maternity
Procedia PDF Downloads 1295861 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria
Authors: Adebisi A. Sunday, Babajide Adeokin
Abstract:
The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer
Procedia PDF Downloads 1445860 Resilience Compendium: Strategies to Reduce Communities' Risk to Disasters
Authors: Caroline Spencer, Suzanne Cross, Dudley McArdle, Frank Archer
Abstract:
Objectives: The evolution of the Victorian Compendium of Community-Based Resilience Building Case Studies and its capacity to help communities implement activities that encourage adaptation to disaster risk reduction and promote community resilience in rural and urban locations provide this paper's objectives. Background: Between 2012 and 2019, community groups presented at the Monash University Disaster Resilience Initiative (MUDRI) 'Advancing Community Resilience Annual Forums', provided opportunities for communities to impart local resilience activities, how to solve challenges and share unforeseen learning and be considered for inclusion in the Compendium. A key tenet of the Compendium encourages compiling and sharing of grass-roots resilience building activities to help communities before, during, and after unexpected emergencies. The online Compendium provides free access for anyone wanting to help communities build expertise, reduce program duplication, and save valuable community resources. Identifying case study features across the emergency phases and analyzing critical success factors helps communities understand what worked and what did not work to achieve success and avoid known barriers. International exemplars inform the Compendium, which represents an Australian first and enhances Victorian community resilience initiatives. Emergency Management Victoria provided seed funding for the Compendium. MUDRI matched this support and continues to fund the project. A joint Steering Committee with broad-based user input and Human ethics approval guides its continued growth. Methods: A thematic analysis of the Compendium identified case study features, including critical success factors. Results: The Compendium comprises 38 case studies, representing all eight Victorian regions. Case studies addressed emergency phases, before (29), during (7), and after (17) events. Case studies addressed all hazards (23), bushfires (11), heat (2), fire safety (1), and house fires (1). Twenty case studies used a framework. Thirty received funding, of which nine received less than $20,000 and five received more than $100,000. Twenty-nine addressed a whole of community perspective. Case studies revealed unique and valuable learning in diverse settings. Critical success factors included strong governance; board support, leadership, and trust; partnerships; commitment, adaptability, and stamina; community-led initiatives. Other success factors included a paid facilitator and local government support; external funding, and celebrating success. Anecdotally, we are aware that community groups reference Compendium and that its value adds to community resilience planning. Discussion: The Compendium offers an innovative contribution to resilience research and practice. It augments the seven resilience characteristics to strengthen and encourage communities as outlined in the Statewide Community Resilience Framework for Emergency Management; brings together people from across sectors to deliver distinct, yet connected actions to strengthen resilience as a part of the Rockefeller funded Resilient Melbourne Strategy, and supports communities and economies to be resilient when a shock occurs as identified in the recently published Australian National Disaster Risk Reduction Framework. Each case study offers learning about connecting with community and how to increase their resilience to disaster risks and to keep their community safe from unexpected emergencies. Conclusion: The Compendium enables diverse communities to adopt or adapt proven resilience activities, thereby preserving valuable community resources and offers the opportunity to extend to a national or international Compendium.Keywords: case study, community, compendium, disaster risk reduction, resilience
Procedia PDF Downloads 1205859 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 1625858 Providing a Proposed Framework for the Copyright of Library Resources in Iran: A Comparative Study of the Copyright Laws of Iran, Australia and U.S.
Authors: Zeinab Papi
Abstract:
This study was aimed at analyzing the copyright laws of Iran, Australia, the U.S., and library portals, thereby providing a proposed framework for the copyright of library resources for the NLAI and other Iranian libraries while considering the current situation and the internal Iranian laws. This is an applied study falling in the category of qualitative approach research. Documentary analysis method and comparative method were used to resolve the problem and answer the questions of the research. The two National Library of Australia (NLA) and Library of Congress (LC), together with the NLAI formed the research community. In addition, the Iranian Law for the Protection of Authors, Composers and Artists Rights (1970); the Australian Copyright Act (1968), and the U.S. Copyright Law (1976) were purposefully selected as three main resources among other documents and resources. Findings revealed that the dimensions of fair and non-profit use, duration of copyright, license, and agreement, copyright policy, moral rights, economic rights, and infringement of copyright were the main dimensions that, along with 49 main components, formed the proposed framework for the copyright of information resources for the NLAI and other Iranian libraries. It should be acknowledged that there are some differences in different copyright fields between countries' laws, and each country takes into account its internal conditions to compile and revise the laws. By following the laws of other countries, it is possible to effectively improve and develop copyright laws. The researcher hopes that this research can have its effects in creating awareness and ability among librarians, formulating a copyright policy in Iranian libraries, and helping legislators in revising copyright laws regarding library exceptions and exemptions.Keywords: copyright, library resources, National Library and Archives of the I.R. of Iran, National Library of Australia, Library of Congress, copyright law
Procedia PDF Downloads 745857 Understanding the Issue of Reproductive Matters among Urban Women: A Study of Four Cities in India from National Family Health Survey-4
Authors: Priyanka Dixit
Abstract:
Reproductive health problem is an important public health issue in most of the developing countries like India. It is a common problem in India for women in the reproductive age group to suffer from reproductive illnesses and not seek care. Existing literatures tell us very little about the several dimensions of reproductive morbidity. In addition the general perception says, metros have better medical infrastructure, so its residents should lead a healthier life. However some of the studies reveal a very different picture. Therefore, the present study is conducted with the specific objectives to find out the prevalence of reproductive health problem and treatment seeking behavior of currently married women in four metro cities in India namely; Mumbai, Delhi, Chennai and Kolkata. In addition, this paper also examines the effect of socio-economic and demographic factors on self-reported reproductive health problems. Bi-variate and multivariate regression have been applied to achieve the proposed objectives. Study is based on National Family Health Survey 2015-16 data. The analysis shows that the prevalence of any reproductive health problem among women is the highest in Mumbai followed by Delhi, Chennai, and Kolkata. A bulk of women in all four metro cities has reported abdominal pain, itching and burning sensation as the major problems while urinating. However, in spite of the high prevalence of reproductive health problems, a huge proportion of such women in all these cities do not seek any advice or treatment for these problems. This study also investigates determinants that affect the prevalence of reproductive health problem to policy makers plan for proper interventions for improving women’s reproductive health.Keywords: reproductive health, India, national family health survey-4, city
Procedia PDF Downloads 2105856 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 1385855 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks
Authors: C. N. Vanitha, M. Usha
Abstract:
In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.Keywords: neural networks, pattern learning, security, wireless sensor networks
Procedia PDF Downloads 4045854 Perception of Consumer Behavior on Mobile Banking Offered by the National and Multinational Banks in UAE with Special Reference to Emirates NBD and Citibank
Authors: Aarohi Surya
Abstract:
The number of mobile banking users continues to climb across the world due to its increasing popularity, and UAE is no exception. This type of banking is part of the core strategy of most of the financial institutions that allows its customers to conduct a range of financial transactions through mobile apps to cash in the high demand from the bankers. This study aims at evaluating service quality of online banking in Dubai, one of the swiftly growing cities of Middle East. The paper mainly compares online banking services of Multinational bank and National Bank with special reference to Citibank and Emirates NBD. A structured questionnaire survey is conducted among various target groups. The research has been focused on mainly 4 significant areas of online banking, i.e. Privacy, Responsiveness, Reliability, and Efficiency of customer data. Information was analyzed statistically on SPSS to investigate the service quality of e-banking.Keywords: customer satisfaction, service quality, responsiveness, online banking
Procedia PDF Downloads 2705853 Training the Competences for the 'Expert Teacher': A Framework of Skills for Teachers
Authors: Sofia Cramerotti, Angela Cattoni, Laura Biancato, Dario Ianes
Abstract:
The recognition of specific standards for new professionals, within the teaching profile, is a necessary process in order to foster an innovative school vision in accordance with the change that school is experiencing. In line with the reform of the national education and training system and with the National Training Plan for teachers, our Research and Development department developed a training project based on a framework (Syllabus) of skills that each 'Expert Teacher' should master in order to fulfill what the different specific profiles request. The syllabus is a fundamental tool for a training process consistent with the teaching profiles, both to guide the to-become teachers entering in service and to provide the in-service teachers with a system of evaluation and improvement of their skills. According to the national and international literature about professional standards for teachers, we aggregated the skills of the syllabus in three macro areas: (1) Area of professional skills related to the teacher profile and their continuous training; (2) area of teaching skills related to the school innovation; (3) area of organizing skills related to school participation for its improvement. The syllabus is a framework that identifies and describes the skills of the expert teacher in all of their roles. However, the various skills take on different importance in the different profiles involved in the school; some of those skills are determining a role, others could be secondary. Therefore, the characterization of the different profiles is represented by suitably weighted skills sets. In this way, the same skill could differently characterize each profile. In the future, we hope that the skills development and training for the teacher could evolve in a skills development and training for the whole school staff ('Expert Team'). In this perspective, the school will, therefore, benefit from a solid team, in which the skills of the various profiles are all properly developed and well represented.Keywords: framework, skills, teachers, training
Procedia PDF Downloads 1775852 Increasing National Health Insurance Scheme Enrolment in Ghana: Pro-Rata Insurance Premium Payment with Mobile Phone as the Answer
Authors: Joseph Marfo Boaheng, Daniel Ansong, Eugenia Amporfo
Abstract:
Health Insurance is proposed to provide financial protection against catastrophic health care cost arising from disease. Ghana has had a National Health Insurance Scheme (NHIS) since 2003 with the current enrolment/retention rate of 36%. The main goal of the scheme is to provide equity in the health sector as well as ensuring affordable health care for the poor. However, the current payment system is not flexible to attract significant proportion of the poor informal sector onto the scheme. Looking at the extensive use of mobiles in the Ghana where about 29,220,602.00 registered mobile phone lines are actively in used as of June 2014, paying health insurance premium through mobile phone could be feasible to attract larger proportion of the informal sector onto the scheme. Methodology: The quantitative cross-sectional survey was used to solicit the required information from 877 respondents living in Kumasi, the second capital city of Ghana. The magnitude of the effect of Pro-rata system (flexible payment terms) on NHIS enrollment rate was estimated with binary logistic regression model. Results: The odds for an individual to enroll onto NHIS with mobile phone increases about 2 times more when payment of insurance premium is on pro-rata basis ie. flexible payment terms (p=0.008, CI=1.212-3.565). Conclusion: The study advocates the National Health Insurance Authority consider this alternative payment system that has the potential of attracting a greater proportion of the informal sector to be enrolled or retained onto the scheme.Keywords: enrollment, health insurance, mobile phone, pro-rata
Procedia PDF Downloads 3935851 Enhancing National Integrity through Teaching Secular Perspectives in Medieval Indian History Curricula: A Secular Paradigms
Authors: Deepak Deshpande, Vikas Minchekar
Abstract:
Day by day in modern India communal forces became stronger and stronger. Each and every caste group trying to show their strength through massive marches. Such kind of marches or ralliesruinous national integrity in India. To test this assumption present investigation has been carried out. This research was undertaken by using survey techniques. The study has been carried out in two phases. In the first stage, the students’ attitudes were collected while in the second phase the views of the members of the historical association were collected. The social dominance orientation scale and sources of social dominance inventory have been administered on 200 college students belonging to Maratha caste. Analyzed data revealed ahigh level of social dominance in Maratha caste students. Approximately, 80 percent students have reported that they have learned such dominance from the medieval history. The other sources disappear very less prominent. These results and present Indian social situation have been communicated with the members of the historical association of India. The majority members of this association agreed with this reality. The consensus also received on that Maratha caste person experiencing dominance due to the misinterpretation of the King Shivaji Empire; synchronize by politicians. The survey monkey app was used through electronic mail to collect the views on ‘The attitude towards the modification of curricula questionnaire’. The maximum number of members of the historical association agreed to employ to teach the medieval Indian history accordingly the secular perspectives.Keywords: social dominance orientation, secular perceptive, national integrity, Maratha caste and medieval Indian history
Procedia PDF Downloads 2555850 Harmonization of State Law and Local Laws in Coastal and Marine Areas Management
Authors: N. S. B. Ambarini, Tito Sofyan, Edra Satmaidi
Abstract:
Coastal and marine are two potential natural resource one of the pillars of the national economy. The Indonesian archipelago has marine and coastal which is quite spacious. Various important natural resources such as fisheries, mining and so on are in coastal areas and the sea, so that this region is a unique area with a variety of interests to exploit it. Therefore, to preserve a sustainable manner need good management and comprehensive. To the national and local level legal regulations have been published relating to the management of coastal and marine areas. However, in practice it has not been able to function optimally. Substantially has not touched the problems of the region, especially concerning the interests of local communities (local). This study is a legal non-doctrinal approach to socio-legal studies. Based on the results of research in some coastal and marine areas in Bengkulu province - Indonesia, there is a fact that the system of customary law and local wisdom began to weaken implementation. Therefore harmonization needs to be done in implementing laws and regulations that apply to the values of indigenous and local knowledge that exists in the community.Keywords: coastal and marine, harmonization, law, local
Procedia PDF Downloads 3445849 Enhancement of Building Sustainability by Using Environment-Friendly Material
Authors: Rina Yadav, Meng-Ting Tsai
Abstract:
In the present scenario, sustainable buildings are in high demand. The essential decision for building sustainability is made during the design and preconstruction stages. Main objective of this study is reduction of unfavorable environmental impacts, which is a major cause of global warming. Based on this problem, to diminish the environmental hazards, present research study is applied to provide a guideline to designer that will be useful for material selection stage of designing. This can be achieved by using local available materials such as wood, mud, bamboos instead of cement, steel, concrete by reducing carbon dioxide emission. Energy simulation will be analyzed by software to get the comparable result. It will be encouraging and motivational for designer while using ecofriendly material to achieve points in Leadership in energy and environmental design (LEED) in green rating system.Keywords: sustainability design, lead rating, LEED, building performance analyses
Procedia PDF Downloads 4885848 Sustainable Reconstruction: Towards Guidelines of Post-Disaster Vulnerability Reduction for Permanent Informal Housing in Malaysia Due to Flooding
Authors: Ruhizal Roosli, Julaihi Wahid, Abu Hassan Abu Bakar, Faizal Baharum
Abstract:
This paper reports on the progress of a study on the reconstruction project after the ‘Yellow Flood’ disaster in Kelantan, Malaysia. Malaysia still does not have guidelines to build housing after a disaster especially in disaster-prone areas. At the international level, many guidelines have been prepared that is found suitable for post-disaster housing. Which guidelines can be adapted that best describes the situation in Malaysia? It was reported that the houses should be built on stilts, which can withstand certain level of impact during flooding. Unfortunately, until today no specific guideline was available to assist homeowners to rebuild their homes after disaster. In addition, there is also no clear operational procedure to monitor the progress of this construction work. This research is an effort to promoting resilient housing; safety and security; and secure tenure in a prone area. At the end of this study, key lessons will be emerged from the review process and data analysis. These inputs will then have influenced to the content that will be developed and presented as guidelines. An overall objective is to support humanitarian responses to disaster and conflicts for resilience house construction to flood prone area. Interviews with the field based staff were from recent post-disaster housing workforce (disaster management mechanism in Malaysia especially in Kelantan). The respondents were selected based on their experiences in disaster response particularly related to housing provision. These key lessons are perhaps the best practical (operational and technical) guidelines comparing to other International cases to be adapted to the national situations.Keywords: disaster, guideline, housing, Malaysia, reconstruction
Procedia PDF Downloads 5205847 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks
Authors: Afnan Al-Romi, Iman Al-Momani
Abstract:
The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN
Procedia PDF Downloads 3225846 A Software Engineering Methodology for Developing Secure Obfuscated Software
Authors: Carlos Gonzalez, Ernesto Linan
Abstract:
We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.Keywords: development methodology, obfuscated software, secure software development, software engineering
Procedia PDF Downloads 2485845 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services
Authors: A. Al Drees, A. Alahmari, R. Almuwayshir
Abstract:
The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.Keywords: e-banking, account aggregation, security, enterprise development
Procedia PDF Downloads 324