Search results for: national security hazards
5814 Search for Alternative Strategy to Enhancing Food Security at Household Level: Hybrid Urban Agriculture as a Strategy
Authors: Nyumbaiza Tambwe
Abstract:
The purpose of this paper is to demonstrate that hybrid urban agriculture as the most practiced type of urban agriculture in the majority of cities in sub-Saharan Africa can be taken as an alternative strategy in fighting food insecurity. The practice not only provides food, generates income and fights against unemployment; it constitutes a true back-up for households during crisis linked to the nature of capitalism system. African cities are mostly characterized by rapid population growth, rampant poverty, and high level of unemployment and food insecurity. Those factors and many others are at the origin of the emergence of urban agriculture in many African cities. Based particularly on results of research undertaken in the Democratic Republic of Congo (DRC), but also in comparison with those realized in other parts of the African continent, the paper is a case study. Therefore, the paper firstly describes the situation of food in Africa, secondly, presents hybrid urban agriculture as a household strategy in fighting food insecurity and finally shows possibilities and limits of this practice.Keywords: alternative strategy, food security, household strategy, hybrid urban agriculture
Procedia PDF Downloads 3255813 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks
Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner
Abstract:
Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.Keywords: USB, device, cyber security, attack, detection
Procedia PDF Downloads 3965812 Toward a Characteristic Optimal Power Flow Model for Temporal Constraints
Authors: Zongjie Wang, Zhizhong Guo
Abstract:
While the regular optimal power flow model focuses on a single time scan, the optimization of power systems is typically intended for a time duration with respect to a desired objective function. In this paper, a temporal optimal power flow model for a time period is proposed. To reduce the computation burden needed for calculating temporal optimal power flow, a characteristic optimal power flow model is proposed, which employs different characteristic load patterns to represent the objective function and security constraints. A numerical method based on the interior point method is also proposed for solving the characteristic optimal power flow model. Both the temporal optimal power flow model and characteristic optimal power flow model can improve the systems’ desired objective function for the entire time period. Numerical studies are conducted on the IEEE 14 and 118-bus test systems to demonstrate the effectiveness of the proposed characteristic optimal power flow model.Keywords: optimal power flow, time period, security, economy
Procedia PDF Downloads 4495811 Modelling Insider Attacks in Public Cloud
Authors: Roman Kulikov, Svetlana Kolesnikova
Abstract:
Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.Keywords: insider attack, public cloud, cloud computing, hypervisor
Procedia PDF Downloads 3615810 Banking and Accounting Analysis Researches Effect on Environment and Income
Authors: Gerges Samaan Henin Abdalla
Abstract:
New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 555809 Navigating the Cacophony of Human Rights Claims and Chains of Fraud in Nigeria: The Anti-Corruption War Perspective
Authors: Mike Omilusi
Abstract:
Since the Buhari administration came to power, it has gained the people’s confidence with its anti-corruption efforts. Making culprits account for their past unlawful deeds, in a very determined and aggressive manner ever witnessed in the nation’s political history, generates different reactions among Nigerians. However, some questions remain pertinent to this study: Are Nigerians really advocating persecution or prosecution in respect of the graft suspects? Do they want conviction without being convinced? Is their outburst propelled by emotions and revengeful anticipation of having suspected looters of the nation’s commonwealth behind bars? Can the war be successfully fought without resorting to impunity? Relying extensively on secondary sources with the aid of descriptive and narrative tools, this study seeks to interrogate the claim of fundamental human rights in the face of wanton looting of the nation’s resources. If, as opined by President Buhari, corruption is a crime against humanity, then it is argued that those who commit such crime should be subjected to penalties prescribed by law. Such crime -as corruption in this study- deprives the citizens of welfare, social amenities and good things of life. In this instance, it also poses threats to national security, having misappropriated funds meant for the war against the Boko Haram terrorism as revealed by the anti-corruption agency in the country. A theoretically-driven investigation, this essay raises some expectations within the context of good governance-propelled anti-corruption crusade, making modest recommendations as to how corruption should be prevented and combated within the confine of rule of law.Keywords: corruption, rule of law, human rights, prosecution, commonwealth
Procedia PDF Downloads 2025808 Optimizing Load Shedding Schedule Problem Based on Harmony Search
Authors: Almahd Alshereef, Ahmed Alkilany, Hammad Said, Azuraliza Abu Bakar
Abstract:
From time to time, electrical power grid is directed by the National Electricity Operator to conduct load shedding, which involves hours' power outages on the area of this study, Southern Electrical Grid of Libya (SEGL). Load shedding is conducted in order to alleviate pressure on the National Electricity Grid at times of peak demand. This approach has chosen a set of categories to study load-shedding problem considering the effect of the demand priorities on the operation of the power system during emergencies. Classification of category region for load shedding problem is solved by a new algorithm (the harmony algorithm) based on the "random generation list of category region", which is a possible solution with a proximity degree to the optimum. The obtained results prove additional enhancements compared to other heuristic approaches. The case studies are carried out on SEGL.Keywords: optimization, harmony algorithm, load shedding, classification
Procedia PDF Downloads 3945807 Specific Emitter Identification Based on Refined Composite Multiscale Dispersion Entropy
Authors: Shaoying Guo, Yanyun Xu, Meng Zhang, Weiqing Huang
Abstract:
The wireless communication network is developing rapidly, thus the wireless security becomes more and more important. Specific emitter identification (SEI) is an vital part of wireless communication security as a technique to identify the unique transmitters. In this paper, a SEI method based on multiscale dispersion entropy (MDE) and refined composite multiscale dispersion entropy (RCMDE) is proposed. The algorithms of MDE and RCMDE are used to extract features for identification of five wireless devices and cross-validation support vector machine (CV-SVM) is used as the classifier. The experimental results show that the total identification accuracy is 99.3%, even at low signal-to-noise ratio(SNR) of 5dB, which proves that MDE and RCMDE can describe the communication signal series well. In addition, compared with other methods, the proposed method is effective and provides better accuracy and stability for SEI.Keywords: cross-validation support vector machine, refined com- posite multiscale dispersion entropy, specific emitter identification, transient signal, wireless communication device
Procedia PDF Downloads 1285806 Web-Based Paperless Campus: An Approach to Reduce the Cost and Complexity of Education Administration
Authors: Yekini N. Asafe, Haastrup A. Victor, Lawal N. Olawale, Okikiola F. Mercy
Abstract:
Recent increase in access to personal computer and networking systems have made it feasible to perform much of cumbersome and costly paper-based administration in all organization. Desktop computers, networking systems, high capacity storage devices and telecommunications system is currently allowing the transfer of various format of data to be processed, stored and dissemination for the purpose of decision making. Going paperless is more of benefits compare to full paper-based office. This paper proposed a model for design and implementation of e-administration system (paperless campus) for an institution of learning. If this model is design and implemented it will reduced cost and complexity of educational administration also eliminate menaces and environmental hazards attributed to paper-based administration within schools and colleges.Keywords: e-administration, educational administration, paperless campus, paper-based administration
Procedia PDF Downloads 3745805 Productive Safety Net Program and Rural Livelihood in Ethiopia
Authors: Desta Brhanu Gebrehiwot
Abstract:
The purpose of this review was to analyze the overall or combined effect of scholarly studies conducted on the impacts of Food for work (FFW) and Productive Safety Net Program (PSNP) on farm households’ livelihood (agricultural investment on the adoption of fertilizer, food security, livestock holding, nutrition and its’ disincentive effect) in Ethiopia. In addition, to make a critical assessment of the internal and external validity of the existing studies, the review also indicates the possibility to redesign the program. The method of selecting eligible studies for review was PICOS (Participants, Intervention, Comparison, Outcomes, and Settings) framework. The method of analysis was the fixed effects model under Meta-Analysis. The findings of this systematic review confirm the overall or combined positive significant impact of PSNP on fertilizer adoption (combined point estimate=0.015, standard error=0.005, variance=0.000, lower limit 0.004 up to the upper limit=0.026, z-value=2.726, and p-value=0.006). And the program had a significant positive impact on the child nutrition of rural households and had no significant disincentive effect. However, the program had no significant impact on livestock holdings. Thus, PSNP is important for households whose livelihood depends on rain-fed agriculture and are exposed to rainfall shocks. Thus, better to integrate the program into the national agricultural policy. In addition, most of the studies suggested that PSNP needs more attention to the design and targeting issued in order to be effective and efficient in social protection.Keywords: meta-analysis, fixed effect model, PSNP, rural-livelihood, Ethiopia
Procedia PDF Downloads 685804 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation
Authors: Natalia Kalinowska
Abstract:
The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach
Procedia PDF Downloads 2515803 Eco-Literacy and Pedagogical Praxis in the Multidisciplinary University Greenhouse toward the Food Security Strengthening
Authors: Citlali Aguilera Lira, David Lynch Steinicke, Andrea León García
Abstract:
One of the challenges that higher education faces is to find how to approach the sustainability in an inclusive way to the student within all the different academic areas, how to move the sustainable development from the abstract field to the operational field. This research comes from the ecoliteracy and the pedagogical praxis as tools for rebuilding the teaching processes inside of universities. The purpose is to determine and describe which are the factors involved in the process of learning particularly in the Greenhouse-School Siembra UV. In the Greenhouse-School Siembra UV, of the University of Veracruz, are cultivated vegetables, medicinal plants and small cornfields under the usage of eco-technologies such as hydroponics, Wickingbed and Hugelkultur, which main purpose is the saving of space, labor and natural resources, as well as function as agricultural production alternatives in the urban and periurban zones. The sample was formed with students from different academic areas and who are actively involved in the greenhouse, as well as institutes from the University of Veracruz and governmental and non-governmental departments. This project comes from a pedagogic praxis approach, from filling the needs that the different professional profiles of the university students have. All this with the purpose of generate a pragmatic dialogue with the sustainability. It also comes from the necessity to understand the factors that intervene in the students’ praxis. In this manner is how the students are the fundamental unit in the sphere of sustainability. As a result, it is observed that those University of Veracruz students who are involved in the Greenhouse-school, Siembra UV, have enriched in different levels the sense of urban and periurban agriculture because of the diverse academic approaches they have and the interaction between them. It is concluded that the eco-technologies act as fundamental tools for ecoliteracy in society, where it is strengthen the nutritional and food security from a sustainable development approach.Keywords: farming eco-technologies, food security, multidisciplinary, pedagogical praxis
Procedia PDF Downloads 3165802 Diversity of Large Mammals in Awash National Park and its Ecosystem Role and Biodiversity Conservation, Ethiopia
Authors: Sintayehu W. Dejene
Abstract:
An ecological and biodiversity conservation study on species composition, population status and habitat association of large mammals and the impact of human interference on their distribution was carried out in Awash National Park, Ethiopia during October, 2012 to July, 2013. A total of 25 species of large mammals were recorded from the study area. Representative sample sites were taken from each habitat type and surveyed using random line transect method. For medium and large mammal survey, indirect methods (foot print and dung) and direct observations were used. Twenty three species of medium to large-sized mammals were identified and recorded from ANP. A total of 25 species of median and large size mammals were recorded from the study area. Out of this, 20 species were rodents of three families and five species were insectivores of two families. Beisa Oryx (Oryx beisa beisa),Soemmerings gazelle (Gazella soemmeringi),Defassa waterbuck (Kobus defassa), Lesser Kudu (Strepsiceros imberbis), Greater Kudu (Strepsiceros strepsiceros), Warthog (Phacochoerus aethiopicus), Baboon (Papio anubis baboon) and Salt's dikdik (Madoqua saltiana) were the most common seen median and large mammals in the study area. Beisa Oryx (Oryx beisa beisa) and Sommering Gazelles (Gazella soemmeringi) are commonly found in the open areas, where as Greater Kudus (Strepsiceros strepsiceros) and Lesser Kudus (Strepsiceros imberbis) was seen in the bushed areas. Defarsa waterbuck (Kobus defassa) was observed in the bushy river area in Northern part of the Park. Anubis baboon (Papio anubis baboon) was seen near to the river side. Hamadryas baboon founded in semi-desert areas of Awash National Park, particularly in Filwoha area. The area is one of a key biodiversity conservation and provide pure water, air, food, grazing land and storage of carbon.Keywords: awash national park, biodiversity, ecosystem value, habitat association, large mammals, population status, species composition
Procedia PDF Downloads 3805801 Conflict and Hunger Revisit: Evidences from Global Surveys, 1989-2020
Authors: Manasse Elusma, Thung-Hong Lin, Chun-yin Lee
Abstract:
The relationship between hunger and war or conflict remains to be discussed. Do wars or conflicts cause hunger and food scarcity, or is the reverse relationship is true? As the world becomes more peaceful and wealthier, some countries are still suffered from hunger and food shortage. So, eradicating hunger calls for a more comprehensive understanding of the relationship between conflict and hunger. Several studies are carried out to detect the importance of conflict or war on food security. Most of these studies, however, perform only descriptive analysis and largely use food security indicators instead of the global hunger index. Few studies have employed cross-country panel data to explicitly analyze the association between conflict and chronic hunger, including hidden hunger. Herein, this study addresses this issue and the knowledge gap. We combine global datasets to build a new panel dataset including 143 countries from 1989 to 2020. This study examines the effect of conflict on hunger with fixed effect models, and the results show that the increase of conflict frequency deteriorates hunger. Peacebuilding efforts and war prevention initiative are required to eradicate global hunger.Keywords: armed conflict, food scarcity, hidden hunger, hunger, malnutrition
Procedia PDF Downloads 1715800 Nutrition Environments and the Development of Taste Preferences: A Cross-Sectional Study of Primary School Children in Trinidad and Tobago
Authors: Fareena Alladin
Abstract:
In the Caribbean, issues of food security, health and taste are intricately linked, seen most clearly in the increasing incidence of lifestyle diseases among children coupled with a taste for high calorie and Westernized diets. In order to fully appreciate this link, the role of nutrition environments must be examined. To this end, the present study incorporates tenets of Bourdieu’s social constructivist theory with the Community Nutrition Environment Model. The aim of this study was to examine the relationships between availability of and access to healthy/unhealthy foods within nutrition environments, namely the household and school, and the development of taste preferences for healthy/unhealthy foods among primary school children in a selected educational district in Trinidad and Tobago. A cross-sectional survey of 400 children between the ages of 9 and 11 years was conducted. Data analysis was conducted using SPSS 24. Results indicated that availability of healthy food at home was positively correlated with preference for vegetables, and negatively correlated with preference for salty snacks and fast food. The availability of unhealthy food within the home was found to be negatively correlated with preference for vegetables and positively correlated with preference for salty snacks. Access to unhealthy foods at school had a positive correlation with preference for fast food. These findings highlight the role of the food environment in shaping taste preferences, and point to the need for interrogating the centrality of food security concerns in emerging health concerns of Caribbean countries. Such interrogations are a necessary part of the development of research agendas, and policy formulation and implementation.Keywords: food security, nutrition environment, taste preference, Trinidad and Tobago
Procedia PDF Downloads 1345799 Structured Tariff Calculation to Promote Geothermal for Energy Security
Authors: Siti Mariani, Arwin DW Sumari, Retno Gumilang Dewi
Abstract:
This paper analyzes the necessity of a structured tariff calculation for geothermal electricity in Indonesia. Indonesia is blessed with abundant natural resources and a choices of energy resources to generate electricity among other are coal, gas, biomass, hydro to geothermal, creating a fierce competition in electricity tariffs. While geothermal is inline with energy security principle and green growth initiative, it requires a huge capital funding. Geothermal electricity development consists of phases of project with each having its own financial characteristics. The Indonesian government has set a support in the form of ceiling price of geothermal electricity tariff by 11 U.S cents / kWh. However, the government did not set a levelized cost of geothermal, as an indication of lower limit capacity class, to which support is given. The government should establish a levelized cost of geothermal energy to reflect its financial capability in supporting geothermal development. Aside of that, the government is also need to establish a structured tariff calculation to reflect a fair and transparent business cooperation.Keywords: load fator, levelized cost of geothermal, geothermal power plant, structured tariff calculation
Procedia PDF Downloads 4385798 The Political Economy of Fiscal and Monetary Interactions in Brazil
Authors: Marcos Centurion-Vicencio
Abstract:
This study discusses the idea of ‘dominance’ in economic policy and its practical influence over monetary decisions. The discretionary use of repurchase agreements in Brazil over the period 2006-2016 and its effects on the overall price level are the specific issues we will be focusing on. The set of in-depth interviews carried out with public servants at the Brazilian central bank and national treasury, alongside data collected from the National Institution of Statistics (IBGE), suggest that monetary and fiscal dominance do not differ in nature once the assumption of depoliticized central bankers is relaxed. In both regimes, the pursuit of private gains via public institutions affects price stability. While short-sighted politicians in the latter are at the origin of poor monetary decisions, the action of short-sighted financial interest groups is likely to generate a similar outcome in the former. This study then contributes to rethinking monetary policy theory as well as the nature of public borrowing.Keywords: fiscal and monetary interactions, interest groups, monetary capture, public borrowing
Procedia PDF Downloads 1335797 Cybersecurity Protective Behavior in Industrial Revolution 4.0 Era: A Conceptual Framework
Authors: Saif Hussein Abdallah Alghazo, Norshima Humaidi
Abstract:
Adopting cybersecurity protective behaviour among the employees is seriously considered in the organization, especially when the Internet of Things (IoT) is widely used in Industrial Revolution 4.0 (IR 4.0) era. Cybersecurity issues arise due to weaknesses of employees’ behaviour such as carelessness and failure to adopt good practices of information security behaviour. Therefore, this study aims to explore the dimensions that might influence employees’ behaviour to adopt good cybersecurity practices and to develop a new holistic model related to this concept. The study proposed this by reviewing the existing works of literature related to this field extensively, especially by focusing on the existing theory such as Protection Motivation Theory (PMT). Moreover, this study has also explored the role of cybersecurity competency among the security manager in the organization since this construct is essential to enhance the protective behaviour towards cybersecurity among the employees in the organization. The proposed research model is important to be quantitatively tested in the future as the findings will serve as the input to the act that will enhance employee’s cybersecurity protective behaviour in the IR 4.0 environment.Keywords: cybersecurity protective behaviour, protection motivation theory, IR 4.0, cybersecurity competency
Procedia PDF Downloads 1515796 Irbid National University Students’ Beliefs about English Language Learning
Authors: Khaleel Bader Bataineh
Abstract:
Past studies have maintained that the Arab learners' beliefs about language learning hold vital effects on their performance. Thus, this study was carried out to investigate the language learning beliefs of Irbid National University students. It aimed at identifying the language learning beliefs according to gender. This study is a descriptive design that employed survey questionnaire of Language Learning Beliefs Inventory (BALLI). The data were elicited from 83 English major students during the class sessions. The data were analyzed using an SPSS program in which frequency analysis and t-test were performed to examine the students’ responses. Thus, the major findings of this research indicated that there is a variation in responses with regards to the subjects’ beliefs about English learning. Also, the findings show significant differences in four questionnaire items according to gender. It is hoped that the findings provide valuable insights to educators about the learners’ beliefs which assist them to develop the teaching and learning English language process in Jordan universities.Keywords: foreign language, students’ beliefs, language learning, Arab students
Procedia PDF Downloads 4865795 Environment and Social Management Strategy at Kuwait Integrated Petroleum Industries Company
Authors: Hannan Al-Qanai, Haitham Mustafa, Rajeswaran Sivasankar
Abstract:
Kuwait Integrated Petroleum Industries Company (KIPIC, Company), established in 2016 as a subsidiary to Kuwait Petroleum Corporation (KPC), is responsible for operating and managing the largest grassroots integrated complex for refining, petrochemicals manufacture businesses, and liquefied natural gas import facilities at Al-Zour, Kuwait. KIPIC and its Contractors/sub-contractors employ over 69,000 staff in its current projects at Al-Zour during peak construction activity. KIPIC holds a unique responsibility to the society, which includes all stakeholders, and demonstrates its social commitment in developing an integrated environment & social management system (ESMS) and ensuring sustainability. This paper mainly demonstrates the knowledge on corporate branding from a corporate social responsibility (CSR) perspective and presents the achievements and best practices of KIPIC in the field of CSR and the challenges faced in handling social issues. Moreover, the study is based on qualitative data abstracted from KIPIC Health, Safety, Security & Environment Management System (HSSE MS) procedures, audit reports, the outcome of counseling sessions, national and international laws and regulations, and International Guidelines on Environment and Social Management System (ESMS). KIPIC has committed to caring for the environmental concerns and acting on social as they do on profits and economic growth. The main findings of this paper are that the successful implementation and operationalization of CSR within an organization depends on a simple but stringent process with both top-down and bottom-up commitment.Keywords: welfare, corporate social responsibility, social management, sustainability
Procedia PDF Downloads 2095794 Self-Government Health Policy Programs as a Form of Implementation of Public Health Tasks in Poland
Authors: T. Holecki, J. Wozniak-Holecka, K. Sobczyk
Abstract:
Development, implementation, and evaluation of the effects of health policy programs, resulting from the identified health needs and health status of residents, is the own task of all local government units in Poland. This is due to the obligation to provide access to healthcare services to all residents and the implementation of tasks in the field of health promotion based on specific legal acts. Until the end of 2016 local governments financed health policy programs only with their own funds. Currently, there are additional resources available from the public health insurance subsidising up to 80% of health policy programs costs in cities with a population under 5 thousand people and up to 40% in bigger cities. Changes in legal provisions do not translate automatically to increased involvement of local government units in the implementation of public health tasks. The main objective of the study was to assess the actual impact of the new legal regulation on financing local health policy programs on the engagement of local administration in this area of public health activity. To achieve this aim, we analyzed difference in the number of local governments developing and implementing health policy programs before and after the new law came into force. The aim of the study was also to estimate the level of expenditures incurred by self-government units and the National Health Fund to cover the costs of health policy programs. In the first stage of the project, legal acts concerning the subject of research and financial data published by the National Health Fund were analyzed. The material for the second, main stage of the study was the detailed financial data obtained from the National Health Fund and data obtained from local government units. The results present the situation in Poland in territorial terms, divided into 16 voivodships.Keywords: health care system, health policy programs, local self-governments, public health
Procedia PDF Downloads 1565793 An Assessment of Housing Affordability and Safety Measures in the Varied Residential Area of Lagos, A Case Study of the Amuwo-Odofin Local Government Area in Lagos State
Authors: Jubril Olatunbosun Akinde
Abstract:
Unplanned population growth are mostly attributed to a lack of infrastructural facilities and poor economic condition in the rural dwellings and the incidence of rural-urban migration, which has resulted in severe housing deficiency in the urban centre, with a resultant pressure on housing delivery in the cities. Affordable housing does not only encompass environmental factors that make living acceptable and comfortable, which include good access routes, ventilation, sanitation and access to other basic human needs, which include water and safety. The research assessed the housing affordability and safety measures in the varied residential area of lagos by examining the demographic and socioeconomic attributes of residents; examining the existing residential safety measures; by examining the residential quality in terms of safety; the researcher therefore examined if relationship between housing affordability and safety in the varied residential areas. The research adopted the bartlett, kotrlik and higgins (2001) method of t-test to determine the sample size which specifies different populations at different levels of significance (α). The researcher adopted primary data which was sourced from a field survey where the sample population was simply randomly selected to give a member of the population an equal chance of being selected, therefore, the sample size for the field survey was two hundred (200) respondents, and subjected to necessary testing. The research come to conclusion that housing safety and security is the responsibility of every resident, the landlords/landladies possess a better sense of security in their neighbourhood than renters in the community, therefore they need to be aware of their responsibility of ensuring the safety of lives and property.Keywords: housing, housing affordability, housing security, residential, residential quality
Procedia PDF Downloads 1105792 Development of National Scale Hydropower Resource Assessment Scheme Using SWAT and Geospatial Techniques
Authors: Rowane May A. Fesalbon, Greyland C. Agno, Jodel L. Cuasay, Dindo A. Malonzo, Ma. Rosario Concepcion O. Ang
Abstract:
The Department of Energy of the Republic of the Philippines estimates that the country’s energy reserves for 2015 are dwindling– observed in the rotating power outages in several localities. To aid in the energy crisis, a national hydropower resource assessment scheme is developed. Hydropower is a resource that is derived from flowing water and difference in elevation. It is a renewable energy resource that is deemed abundant in the Philippines – being an archipelagic country that is rich in bodies of water and water resources. The objectives of this study is to develop a methodology for a national hydropower resource assessment using hydrologic modeling and geospatial techniques in order to generate resource maps for future reference and use of the government and other stakeholders. The methodology developed for this purpose is focused on two models – the implementation of the Soil and Water Assessment Tool (SWAT) for the river discharge and the use of geospatial techniques to analyze the topography and obtain the head, and generate the theoretical hydropower potential sites. The methodology is highly coupled with Geographic Information Systems to maximize the use of geodatabases and the spatial significance of the determined sites. The hydrologic model used in this workflow is SWAT integrated in the GIS software ArcGIS. The head is determined by a developed algorithm that utilizes a Synthetic Aperture Radar (SAR)-derived digital elevation model (DEM) which has a resolution of 10-meters. The initial results of the developed workflow indicate hydropower potential in the river reaches ranging from pico (less than 5 kW) to mini (1-3 MW) theoretical potential.Keywords: ArcSWAT, renewable energy, hydrologic model, hydropower, GIS
Procedia PDF Downloads 3115791 Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios
Authors: Davi Marinho de Araujo Falcão, Ronaldo Moreira Salles, Paulo Henrique Maranhão
Abstract:
Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol.Keywords: DTN, discriminant function, epidemic protocol, security, tactical messages, warship scenario
Procedia PDF Downloads 1915790 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction
Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui
Abstract:
Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.Keywords: BIM, cybersecurity, digital twins, IoT, urban cities
Procedia PDF Downloads 1675789 Digital Geography and Geographic Information System in Schools: Towards a Hierarchical Geospatial Approach
Authors: Mary Fargher
Abstract:
This paper examines the opportunities of using a more hierarchical approach to geospatial enquiry in using GIS in school geography. A case is made that it is not just the lack of teacher technological knowledge that is stopping some teachers from using GIS in the classroom but that there is a gap in their understanding of how to link GIS use more specifically to the pedagogy of teaching geography with GIS. Using a hierarchical approach to geospatial enquiry as a theoretical framework, the analysis shows clearly how concepts of spatial distribution, interaction, relation, comparison, and temporal relationships can be used by teachers more explicitly to capitalise on the analytical power of GIS and to construct what can be interpreted as powerful geographical knowledge. An exemplar illustrating this approach on the topic of geo-hazards is then presented for critical analysis and discussion. Recommendations are then made for a model of progression for geography teacher education with GIS through hierarchical geospatial enquiry that takes into account beginner, intermediate, and more advanced users.Keywords: digital geography, GIS, education, hierarchical geospatial enquiry, powerful geographical knowledge
Procedia PDF Downloads 1505788 Eco-Parcel As a Semi-Qualitative Approach to Support Environmental Impacts Assessments in Nature-Based Tourism Destinations
Authors: Halima Kilungu, Pantaleo, K. T. Munishi
Abstract:
Climate and land-cover change affect nature-based tourism (NBT) due to its attractions' close connection to natural environments and climate. Thus, knowledge of how each attraction reacts to the changing environments and devising simple yet science based approaches to respond to these changes from a tourism perspective in space and time is timely. Nevertheless, no specific approaches exist to address the knowledge gap. The eco-parcel approach is devised to address the gap and operationalized in Serengeti and Kilimanjaro National Parks: the most climate-sensitive NBT destinations in Africa. The approach is partly descriptive and has three simple steps: (1) to identify and define tourist attractions (i.e. biotic and abiotic attractions). This creates an important database of the most poorly kept information on attractions' types in NBT destinations. (2) To create a spatial and temporal link of each attraction and describe its characteristic environments (e.g. vegetation, soil, water and rock outcrops). This is the most limited attractions' information yet important as a proxy of changes in attractions. (3) To assess the importance of individual attractions for tourism based on tourists' preferences. This information enables an accurate assessment of the value of individual attractions for tourism. The importance of the eco-parcel approach is that it describes how each attraction emerges from and is connected to specific environments, which define its attractiveness in space and time. This information allows accurate assessment of the likely losses or gains of individual attractions when climate or environment changes in specific destinations and equips tourism stakeholders with informed responses.Keywords: climate change, environmental change, nature-based tourism, Serengeti National Park, Kilimanjaro National Park
Procedia PDF Downloads 1195787 The Use Support Vector Machine and Back Propagation Neural Network for Prediction of Daily Tidal Levels Along The Jeddah Coast, Saudi Arabia
Authors: E. A. Mlybari, M. S. Elbisy, A. H. Alshahri, O. M. Albarakati
Abstract:
Sea level rise threatens to increase the impact of future storms and hurricanes on coastal communities. Accurate sea level change prediction and supplement is an important task in determining constructions and human activities in coastal and oceanic areas. In this study, support vector machines (SVM) is proposed to predict daily tidal levels along the Jeddah Coast, Saudi Arabia. The optimal parameter values of kernel function are determined using a genetic algorithm. The SVM results are compared with the field data and with back propagation (BP). Among the models, the SVM is superior to BPNN and has better generalization performance.Keywords: tides, prediction, support vector machines, genetic algorithm, back-propagation neural network, risk, hazards
Procedia PDF Downloads 4665786 Food Insecurity and Its Implication for Poverty Alleviation in Nigeria
Authors: Peter Okpamen
Abstract:
Food security concentrates on the collective efforts of all nations to produce enough food to feed their people. Recently, though the emphasis shifted from food availability to accessibility constraints, which entails the difficulties undernourished people face in gaining access to food even when it is available. Broadly speaking, access to food depends on an individual’s access to resources, markets and food transfers. The opportunities to obtain food through these channels are entitlements, which when denied constitute food insecurity. Evidence shows that a significant percentage of Nigerians are undernourished with adverse implications for the fight against poverty. The greatest danger or consequence of food insecurity is malnutrition. Food insecurity as both an agent and consequence of poverty also increases the economic, political and social tensions in the country. The undernourished in Nigeria are marginalised in several ways to the extent that they are often ill; and because of illness, their work capacity is reduced with attendant reduction in their income. Without adequate income, they cannot save nor invest enough resources to take care of their basic needs. In this paper therefore, we used the political economy approach and statistical analysis to demonstrate that poverty alleviation in Nigeria would be a mirage if food security problems are not adequately resolved.Keywords: alleviation, demographic, food insecurity, undernourished
Procedia PDF Downloads 4285785 Revising the Student Experiment Materials and Practices at the National University of Laos
Authors: Syhalath Xaphakdy, Toshio Nagata, Saykham Phommathat, Pavy Souwannavong, Vilayvanh Srithilat, Phoxay Sengdala, Bounaom Phetarnousone, Boualay Siharath, Xaya Chemcheng
Abstract:
The National University of Laos (NUOL) invited a group of volunteers from the Japan International Cooperation Agency (JICA) to revise the physics experiments to utilize the materials that were already available to students. The intension was to review and revise the materials regularly utilized in physics class. The project had access to limited materials and a small budget for the class in the unit; however, by developing experimental textbooks related to mechanics, electricity, and wave and vibration, the group found a way to apply them in the classroom and enhance the students teaching activities. The aim was to introduce a way to incorporate the materials and practices in the classroom to enhance the students learning and teaching skills, particularly when they graduate and begin working as high school teachers.Keywords: NUOL, JICA, physics experiment materials, small budget, mechanics, electricity
Procedia PDF Downloads 235