Search results for: national security strategy
8620 Slavery Transcending Borders: An Analysis of Human Trafficking in Europe and the EU’s Impact on the Issue
Authors: Santiago Martínez Hernández
Abstract:
The establishment of the European Union signified the culmination of the supra-national power addressing economic, political, legal and humanitarian matters within and above a national territory. Human rights have taken a protagonist role as one of the pressing concerns that the EU addresses, and one of the most critical problems is that of human trafficking. This multi-billion dollar criminal business represents $31.6 per year made out of 2.5 million trafficked persons worldwide, making it one of the most crucial human rights problems in the world to address. The EU has developed strategies to tackle this issue through supra-national governance, however, how have they fared? What is the impact of its development on the issue? This paper will address the direct and indirect impact of the formation of the European Union as a supranational political and economic entity on the illicit industry of human trafficking in Europe. It attempts to analyse first, the situation of human trafficking in Europe, as an attempt to understand its importance in the region, addressing its root causes and the role of the states addressed. Second, the paper will examine the impact of the EU on human breaking down its policy-making at a supranational level, the role of the economic integration of the region, and the change of migration patterns since its inception.Keywords: human trafficking, human rights, European union, criminal business
Procedia PDF Downloads 3598619 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations
Authors: Adel Atta Youssef Rezkalla
Abstract:
Russia's invasion of Ukraine tested the international community and prompted not only states but also non-state actors to take deterrent measures in response. In fact, international sports federations, notably FIFA and UEFA, have managed to shift the power dynamic quite effectively by imposing a blanket ban on Russian national teams and clubs. The purpose of this article is to examine the human rights consequences of such actions by international sports organizations. First, the article moves away from assessing the legal status of FIFA and UEFA under international law and examines the question of how a legal connection can be established with their human rights obligations. Secondly, the human rights aspects of the controversial FIFA and UEFA measures against Russian athletes are examined and these are analyzed in more detail using the proportionality test than the principle of non-discrimination under international human rights law. Finally, the main avenues for redress for possible human rights violations related to the actions taken by these organizations are identified and the challenges of arbitration and litigation in Switzerland are highlighted.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 778618 Supersized Pricing and Anticipated Consumption Guilt: The Moderating Role of Product Type and Health Claims
Authors: Asim Shabir, Ruqia Shaikh
Abstract:
Supersized pricing is an effective strategy often used by marketers to make consumers buy more. However, such a strategy also results in more purchases and consumption, especially of hedonic food products. This study brings interesting insights about supersized pricing as it provides value-based justification to consumers; as a result, the guilt associated with the purchase and consumption of hedonic products diminishes, which mediates the impact between supersized pricing and size choice. Interestingly, there is a three-way interaction between pricing, product type, and health goal prime. Health prime diminishes the impact of supersized pricing in the case of more hedonic products (unhealthy) compared to less hedonic (perceived as healthy) products.Keywords: supersized pricing, anticipated consumption guilt, health claim, product type
Procedia PDF Downloads 1098617 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh
Abstract:
Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability
Procedia PDF Downloads 2938616 Local People’s Livelihoods and Coping Strategies in the Wake of a Co-management System in the Campo Ma'an National Park, Cameroon
Authors: Nchanji Yvonne Kiki, Mala William Armand, Nchanji Eileen Bogweh, Ramcilovik-Suominen Sabaheta, Kotilainen Juha
Abstract:
The Campo Ma'an National Park was created as part of an environmental and biodiversity compensation for the Chad-Cameroon Oil Pipeline Project, which was meant to help alleviate poverty and boost the livelihood of rural communities around the area. This paper examines different strategies and coping mechanisms employed by the indigenous people and local communities to deal with the national and internationally driven conservation policies and initiatives in the case of the Campo Ma'an National Park. While most literature on park management/co-management/nature conservation has focused on the negative implications for local peoples’ livelihoods, fewer studies have investigated the strategies of local people to respond to these policies and renegotiate their position in a way that enables them to continue their traditional livelihoods using the existing local knowledge systems. This study contributes to the current literature by zooming into not only the impacts of nature conservation policies but also the local individual and collective strategies and responses to such policies and initiatives. We employ a qualitative research approach using ethnomethodology and a convivial lens to analyze data collected from October to November 2018. We find that conservation policies have worsened some existing livelihoods on the one hand and constrained livelihood improvement of indigenous people and local communities (IPLC) on the other hand. Nonetheless, the IPLC has devised individual and collective coping mechanisms to deal with these conservation interventions and the negative effects they have caused. Upon exploring these mechanisms and their effectiveness, this study proposes a management approach to conservation centered on both people and nature, based on indigenous and local people's knowledge and practices, promoting nature for and by humans and strengthening both livelihood and conservation. We take inspiration from the convivial conservation approach and thinking by Bucher and Fletcher.Keywords: conservation policies, national park management, indigenous and local people’s experiences, livelihoods, local knowledge, coping strategies, conviviality
Procedia PDF Downloads 1838615 Design Exploration on Mixed-Use Development of Island House: Take the Southeast Coastal Area of Chinese as an Example
Authors: Fu Jiayan, Wang Zhu, Sun Jiaojiao
Abstract:
Mixed-use development is one of the most important trends in new island house transformation along southeast coastal area in China. Unique island geographical environment and profound fishing village culture coexist for a long time in this. With artistic creation for the purpose of the "live-work" houses are in a large number of emergence, however, still lack of systematic strategy. Based on space effect from marine resources to regional human settlements, this article teases out the evolution regularity of island settlement context and architectural form, then, puts forward the formation mechanism and construction model of art island houses. Thereby, to further explore space design method and site creation strategy of mixed-use development.Keywords: mixed-use, island house, art creation, Southeast Coastal Area of Chinese
Procedia PDF Downloads 4458614 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 678613 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol
Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang
Abstract:
NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism
Procedia PDF Downloads 4518612 The EU’s Role in Exporting Digital Privacy and Security Standards: A Legal Framework for Global Normative Diffusion
Authors: Yuval Reinfeld
Abstract:
This paper explores the European Union’s expanding influence as a global regulatory power, particularly in the realms of legal, security, and privacy challenges within the digital landscape. As digital regulation becomes increasingly vital, the EU has positioned itself as a leading exporter of privacy and cybersecurity standards through landmark frameworks like the General Data Protection Regulation (GDPR), the Artificial Intelligence Act (AIA), and the Digital Services Act (DSA). These regulations have set global benchmarks, extending their influence well beyond Europe’s borders by shaping legal frameworks in third countries and guiding the development of global digital governance. Central to this regulatory diffusion is the European Court of Justice (CJEU), whose rulings consistently reinforce and extend the reach of EU standards on an international scale. Through mechanisms such as trade agreements, adequacy decisions, and multilateral cooperation, the EU has constructed a regulatory ecosystem that other jurisdictions increasingly adopt. This paper investigates key CJEU cases to illustrate how the EU’s legal instruments in privacy, security, and AI contribute to its role as a global standard-setter. By examining the intersection of digital governance, international law, and normative power, this research provides a thorough analysis of the EU’s regulatory impact on global privacy, cybersecurity, and AI frameworks.Keywords: digital privacy, cybersecurity, GDPR, European Union Law, artificial intelligence, global normative power
Procedia PDF Downloads 248611 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia
Authors: Rina Arum Prastyanti
Abstract:
Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.Keywords: mobile commerce, legal protection, consumer, effectiveness
Procedia PDF Downloads 3648610 Populism and National Unity: A Discourse Analysis of Poverty Eradication Strategies of Three Malaysian Prime Ministers
Authors: Khairil Ahmad, Jenny Gryzelius, Mohd Helmi Mohd Sobri
Abstract:
With the waning support for centrist ‘third-way’ politics across the Western world, there has been an increase in political parties and individual candidates relying on populist political discourse and rhetoric in order to capitalize on the sense of frustration apparent within the electorate. What is of note is the divergence in the discourses employed. On the one hand, there is a polarization between a growing wave of populist right-wing parties and politicians, employing a mixture of economic populism with divisive nationalistic ideals such as restricted immigration, for example, the UK’s UKIP and Donald Trump in the US. On the other hand, there are resurgent, often grassroots-led, left-wing movements and politicians, such as Podemos in Spain and Jeremy Corbyn in the UK, focusing on anti-austerity measures and inclusive policies. In general, the concept of populism is often ascribed in a pejorative way. This is despite the success of populist left-wing governments across Latin America in recent times, especially in terms of reducing poverty. Nonetheless, recently, scholars such as Ernesto Laclau have tried to rethink populism as a social scientific concept which is essential in helping us make sense of contemporary political articulations. Using Laclau’s framework, this paper seeks to analyze poverty reduction policies in different iterations in the context of the tenures of three Prime Ministers of Malaysia. The first is Abdul Razak Hussein’s New Economic Policy, which focused on uplifting the economic position of Malaysia’s majority Malay population. The second is Mahathir Mohamad’s state-led neo-liberalization of the Malaysian economy, which focused on the creation of a core group of crony elites in order to spearhead economic development. The third is current Prime Minister Najib Razak’s targeted poverty eradication strategy through a focused program which directly provides benefits to recipients such as through direct cash transfers. The paper employs a discursive approach to trace elements of populism in these cases and highlight instances of how their strategies are articulated in ways that seek to appeal towards particular visions of national unity.Keywords: discourse analysis, Malaysia, populism, poverty eradication
Procedia PDF Downloads 3218609 A User Identification Technique to Access Big Data Using Cloud Services
Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy
Abstract:
Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.Keywords: design, implementation algorithms, performance, biometric approach
Procedia PDF Downloads 4768608 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy
Authors: F. Pagliara, F. Mauriello
Abstract:
The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.Keywords: tourists, overnights, high speed rail, attractions, security
Procedia PDF Downloads 1558607 A Comparative Study of Corporate Cultural Values in Mergers and Acquisitions
Authors: Renzhong Peng, Weiping Wu
Abstract:
Based on the framework of Hofstede’s cultural dimension, this study conducted a comparative study on the similarities and differences between national cultures and corporate cultural values, analyzed and interpreted the reasons why Chinese overseas Mergers and Acquisitions (M&A) cultural integration results in the success or failure. The findings of this study indicate that in the process of M&A, the corporate cultural values from Chinese and western corporations are proved to be quite different as a result of their diversities of national cultures, and the strategies for the integration of cultural corporate values are of vital importance and can determine the effects of the M&A, which can be referential to managers who intend to have the idea of M&A and those who have cultural integration in the process of M&A.Keywords: comparative study, cultural integration, corporate cultural values, Mergers and Acquisitions
Procedia PDF Downloads 3928606 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks
Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos
Abstract:
Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.Keywords: in-house networks, fiber optics, security risk, money
Procedia PDF Downloads 4208605 Identifying the Goals of a Multicultural Curriculum for the Primary Education Course
Authors: Fatemeh Havas Beigi
Abstract:
The purpose of this study is to identify the objectives of a multicultural curriculum for the primary education period from the perspective of ethnic teachers and education experts and cultural professionals. The research paradigm is interpretive, the research approach is qualitative, the research strategy is content analysis, the sampling method is purposeful and it is a snowball, and the sample of informants in the research for Iranian ethnic teachers and experts until the theoretical saturation was estimated to be 67 people. The data collection tools used were based on semi-structured interviews and individual interviews and focal interviews were used to collect information. The data format was also in audio format and the first period coding and the second coding were used to analyze the data. Based on data analysis 11 Objective: Paying attention to ethnic equality, expanding educational opportunities and justice, peaceful coexistence, anti-ethnic and racial discrimination education, paying attention to human value and dignity, accepting religious diversity, getting to know ethnicities and cultures, promoting teaching-learning, fostering self-confidence, building national unity, and developing cultural commonalities for a multicultural curriculum were identified.Keywords: objective, multicultural curriculum, connect, elementary education period
Procedia PDF Downloads 948604 The Moderating Effect of Intellectual Capital on the Relationship of Innovation Practices in SME’s Performance
Authors: Hussen Nasir, Mohd Fitri Mansor, Noor Hidayah Abu
Abstract:
Liberation of the SME market led to a dynamic competitive business environment. SMEs are considered as an engine for economic growth of most nations. SMEs must be willing to adopt the latest technology and incorporate innovation as part of their business strategies. The aim of this study is to examine the innovation practices (innovation strategy and innovation culture) towards sustaining SME’s performance and the moderating effect of intellectual capital on the relationship of innovation practices on SME’s performance. The study will identify the strongest variables that influence the SMEs performance and proposed several hypothesis toward innovation and intellectual capital. Finally, the study will propose a theoretical framework. The current study will contribute to the knowledge of important on the element of intellectual capital as well as innovation practices in the SMEs performance.Keywords: intellectual capital, innovation practices, SMEs, performance, innovation strategy, innovation culture
Procedia PDF Downloads 4718603 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon
Authors: Forbah Julius Ajamah
Abstract:
The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.Keywords: justice, security, human rights abuses, conflicts, crisis
Procedia PDF Downloads 858602 Modalmetric Fiber Sensor and Its Applications
Authors: M. Zyczkowski, P. Markowski, M. Karol
Abstract:
The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing
Procedia PDF Downloads 6198601 Ill-Defined and Ill-Equipped: Understanding the Limits of the Concept of Truth in South Africa’S Truth and Reconciliation Commission
Authors: Keo Mbebe
Abstract:
The South African Truth and Reconciliation Commission (TRC) is widely regarded as a blueprint for countries seeking to transcend the atrocities of their past and create a new human rights-based administration. The aim of these societies is to establish historical truth. Within the TRC, the aspects of truth-finding and truth-telling were considered to be catalysts for national unity and reconciliation. Truth-seeking, in addition, was mandated in the Promotion of National Unity and Reconciliation Act (TRC Act), which is the legislation behind the TRC. However, there is an incongruency between the conception of truth outlined in the Act, and the conception of truth explained in the Report of the TRC proceedings. The aim of this paper is to delineate these two kinds of “truth” and to critically analyze them. Doing so, it will then be evident in the discussion that there is a need for substantial clarity in the conception of truth used in transitional justice settings based on truth-finding and truth-seeking, and the paper will present ways in which such clarity may be achieved. The paper will begin with a philosophical engagement on the notion of historical truth used by the TRC legislation. Thereafter, the historical background to the political context in which the TRC Act was mandated will be provided. The next section would then be a sketch of the conceptions of historical truth and historical injustice in the Act, as well as its supporting documents. Lastly, it will be argued that the subversion of the TRC’s mandate to promote reconciliation and national unity by bringing to light past human rights violations during apartheid is betrayed by its amorphous conception of historical truth.Keywords: historical truth, human rights, transitional justice, truth commission
Procedia PDF Downloads 1858600 Effect of Question Answer Relationship (QARs) in Science Reading on the Academic Achievement of Students in Biology
Authors: Helen Ngozi Ibe, Chimmuanya Ezere
Abstract:
The study investigated the effect of Question Answer Relationships (QARs) in science reading on secondary school students’ achievement in Biology in Owerri Education Zone II of Imo State. The study adopted a quasi-experimental design and was guided by two research questions and two hypotheses. The sample comprised of 67 SS2 Biology students. The sample was drawn using random sampling technique. One researcher made instrument titled: Biology Achievement Test (BAT) was used for collecting the data of the study. The reliability of the instrument was established using Kuder Richardson formula (KR-20) which yielded a reliability index of 0.85 and Cronbach alpha for the BSIRS with an index of 0.71. Research questions were answered using mean and standard deviation. T-test statistics was used to test the hypotheses at 0.05 level of significance. The major findings are that students exposed to QARs strategy in science reading had higher achievement mean scores in biology than students in the control group; there is no significant difference between the achievement mean scores of male and female students exposed to QARs. The researchers recommended that science teachers should teach students the Question Answer Relationship reading strategy and that science students should endeavour to use the question - answer relationship reading strategy in classroom and individual science reading in order to enhance high academic achievement in the subjects being read.Keywords: academic achievement, biology, science reading, question-answer relationship
Procedia PDF Downloads 1248599 Image Steganography Using Least Significant Bit Technique
Authors: Preeti Kumari, Ridhi Kapoor
Abstract:
In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.Keywords: steganography, LSB, encoding, information hiding, color image
Procedia PDF Downloads 4748598 Regionalism or Ladder-Up: A Theoretical Perspective of Association of Southeast Asian Nations’ Reactions to Belt and Road Initiative
Authors: Yunqi Wang
Abstract:
As a vital region to the Chinese Belt and Road Initiative (BRI), members of the Association of Southeast Asian Nations (ASEAN) have responded to the grand strategy differently. Some expressed fervent support, while others played the 'hedging' card between great powers. This paper explores the underlying rationale behind such complexity by proposing two theoretical explanations: a Regionalism Hypothesis, where countries respond with hedging, balancing, and bandwagoning behaviours in line with national interests and norm-based 'ASEAN-Way'; and a Ladder-up Hypothesis, where countries consider the initiative as an incentive to remove bottlenecks of climbing up the economic ladder in Rostow's stage of the growth model. By analysing reactions from Myanmar, Laos, Indonesia, and Singapore, two patterns are observed. On an empirical note, the more developed economies are more inclined to the Regionalist explanation. On a theoretical note, there has been a gradual convergence between the two explanations, given the impact of economic globalisation on ASEAN. This paper will contribute to the current theoretical vacancy in the study of ASEAN and BRI by capturing the particular norms shared by this regional entity.Keywords: ASEAN, belt and road initiative, hedging, Rostow's stages of growth, regionalism
Procedia PDF Downloads 1178597 Socioeconomic Inequality in Physical Activity: The CASPIAN-V Study
Authors: Roya Kelishadi, Mostafa Amini-Rarani, Mostafa Qorbani
Abstract:
Introduction: As a health-related behavior, physical activity (PA) has an unequal distribution relating to individual's socioeconomic status. This study aimed to assess socioeconomic inequality in PA among Iranian students and their parents at national level and according to socioeconomic status (SES) of the living regions. Method: This study was conducted as part of a national surveillance program conducted among 14400 Iranian students and their parents. Non-linear principal component analysis was used to construct the households' socioeconomic status, and the concentration index approach was applied to measure inequality in father, mother, and student’s PA. Results: The data of 13313 students and their parents were complete for the current study. At national level and SES regions, students had more PA than their parents (except in the lowest SES region), and fathers have more PA than mothers. The lowest means of mother and student's PA were find in the highest SES region. At national level, the concentration indices of father and mother’s PA were -0.050 (95 % CI: -0.067 ~ -0.030) and -0.028 (95% CI: -0.044 ~ -0.012), respectively; indicating pro-poor inequality and, the CI value of student PA was nearly equal to zero (P > 0.05). At SES regions, father and mother's PA were more concentrated in the poor, except for lower middle region. Regional concentration indices for students reveal that inequality not statistically significant at all regions. Conclusion: This study suggests that reliable evidence that comparing different aspects of inequality of PA, based on socioeconomic status and residence areas of students and their parents, could be used for better planning for health promotion programs. Moreover, given the average of mother's and student’s PA in the richer regions were low, it can be suggested that richer focused-PA planning may further increase the level of PA across higher SES and, consequently, reduce inequality in PA. These findings can be applied in the health system services.Keywords: concentration index, health system services, physical activity, socioeconomic inequality
Procedia PDF Downloads 1618596 Visitor Management in the National Parks: Recreational Carrying Capacity Assessment of Çıralı Coast, Turkey
Authors: Tendü H. Göktuğ, Gönül T. İçemer, Bülent Deniz
Abstract:
National parks, which are rich in natural and cultural resources values are protected in the context of the idea to develop sustainability, are among the most important recreated areas demanding with each passing day. Increasing recreational use or unplanned use forms negatively affect the resource values and visitor satisfaction. The intent of national parks management is to protect the natural and cultural resource values and to provide the visitors with a quality of recreational experience, as well. In this context, the current studies to improve the appropriate tourism and recreation planning and visitor management, approach have focused on recreational carrying capacity analysis. The aim of this study is to analyze recreational carrying capacity of Çıralı Coast in the Bey Mountains Coastal National Park to compare the analyze results with the current usage format and to develop alternative management strategies. In the first phase of the study, the annual and daily visitations, geographic, bio-physical, and managerial characteristics of the park and the type of recreational usage and the recreational areas were analyzed. In addition to these, ecological observations were carried out in order to determine recreational-based pressures on the ecosystems. On-site questionnaires were administrated to a sample of 284 respondents in the August 2015 - 2016 to collect data concerning the demographics and visit characteristics. The second phase of the study, the coastal area separated into four different usage zones and the methodology proposed by Cifuentes (1992) was used for capacity analyses. This method supplies the calculation of physical, real and effective carrying capacities by using environmental, ecological, climatic and managerial parameters in a formulation. Expected numbers which estimated three levels of carrying capacities were compared to current numbers of national parks’ visitors. In the study, it was determined that the current recreational uses in the north of the beach were caused by ecological pressures, and the current numbers in the south of beach much more than estimated numbers of visitors. Based on these results management strategies were defined and the appropriate management tools were developed in accordance with these strategies. The authors are grateful for the financial support of this project by The Scientific and Technological Research Council of Turkey (No: 114O344)Keywords: Çıralı Coast, national parks, recreational carrying capacity, visitor management
Procedia PDF Downloads 2748595 Modification of Newton Method in Two Point Block Backward Differentiation Formulas
Authors: Khairil I. Othman, Nur N. Kamal, Zarina B. Ibrahim
Abstract:
In this paper, we present modified Newton method as a new strategy for improving the efficiency of Two Point Block Backward Differentiation Formulas (BBDF) when solving stiff systems of ordinary differential equations (ODEs). These methods are constructed to produce two approximate solutions simultaneously at each iteration The detailed implementation of the predictor corrector BBDF with PE(CE)2 with modified Newton are discussed. The proposed modification of BBDF is validated through numerical results on some standard problems found in the literature and comparisons are made with the existing Block Backward Differentiation Formula. Numerical results show the advantage of using the new strategy for solving stiff ODEs in improving the accuracy of the solution.Keywords: newton method, two point, block, accuracy
Procedia PDF Downloads 3578594 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia
Authors: Logan Carmichael
Abstract:
As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis
Procedia PDF Downloads 1128593 Migration and Displacement: A Study on the Impact of Bangladeshi and Nepali Migration to North-Eastern India
Authors: Sri Mahan Borah
Abstract:
The issue of migration and displacement is considered so sensitive that states have often linked it with their sovereignty, independence and even existence. Therefor, even in the era of globalisation no nation-state is ready to compromise with its territorial boundaries. The problem of migration and displacement has generated a range of socio-political, economic, ethnic, and communal tensions in India in general and northeastern States in particular. In such situation it becomes unpreventable to look over the issue so that a viable elucidation may emerge. The present paper is an attempt to understand the impact of Bangladeshi and Nepali migration to North-Eastern states of India through historical and analytical methods. In this course it will look into the emergence of the migration and displacement problem, its causes, impacts on security and other issues of national interest especially when the migration is illegal and poses multi-layered challenges to the Indian state. The nature of migration from these countries to India has been dissimilar. This is because of their different historical backgrounds, geographical variants, ethno-religious affinities, political systems and bilateral arrangements with India. It concludes inter alia that, India’s borders with Bangladesh and Nepal must be regulated and that resident migrants need to be strategically dealt with, keeping in mind age-old relationships with these countries and, more importantly, the nature and construct of our geography.Keywords: migration, displacement, North-East, India
Procedia PDF Downloads 4068592 Low Pricing Strategy of Forest Products in Community Forestry Program: Subsidy to the Forest Users or Loss of Economy?
Authors: Laxuman Thakuri
Abstract:
Community-based forest management is often glorified as one of the best forest management alternatives in the developing countries like Nepal. It is also believed that the transfer of forest management authorities to local communities is decisive to take efficient decisions, maximize the forest benefits and improve the people’s livelihood. The community forestry of Nepal also aims to maximize the forest benefits; share them among the user households and improve their livelihood. However, how the local communities fix the price of forest products and local pricing made by the forest user groups affects to equitable forest benefits-sharing among the user households and their livelihood improvement objectives, the answer is largely silent among the researchers and policy-makers alike. This study examines local pricing system of forest products in the lowland community forestry and its effects on equitable benefit-sharing and livelihood improvement objectives. The study discovered that forest user groups fixed the price of forest products based on three criteria: i) costs incur in harvesting, ii) office operation costs, and iii) livelihood improvement costs through community development and income generating activities. Since user households have heterogeneous socio-economic conditions, the forest user groups have been applied low pricing strategy even for high-value forest products that the access of socio-economically worse-off households can be increased. However, the results of forest products distribution showed that as a result of low pricing strategy the access of socio-economically better-off households has been increasing at higher rate than worse-off and an inequality situation has been created. Similarly, the low pricing strategy is also found defective to livelihood improvement objectives. The study suggests for revising the forest products pricing system in community forest management and reforming the community forestry policy as well.Keywords: community forestry, forest products pricing, equitable benefit-sharing, livelihood improvement, Nepal
Procedia PDF Downloads 2998591 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand
Authors: Pichamon Chansuchai
Abstract:
The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.Keywords: audit, best practice, internet, payment
Procedia PDF Downloads 500