Search results for: financial security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5341

Search results for: financial security

3481 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions

Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li

Abstract:

The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.

Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA

Procedia PDF Downloads 50
3480 Migration, Labour Market, Capital Formation, and Social Security: A Study of Livelihoods of the Urban Poor in Two Different Cities of West Bengal in India

Authors: Arup Pramanik

Abstract:

Most of the cities in the developing countries like Siliguri Municipal Corporation Area (SMCA) and Raiganj Municipality (RM) in West Bengal, India are changing typically in terms of demographic, economic and social relationship due to rapid pace of urbanization. The mushrooming growth of slums in SMCA and RM is the direct consequence of urbanization and migration due to regional imbalance, unbalanced growth process which is posing a serious threat to sustainable development of the country. Almost all the slums happen to be a breeding ground for poverty, negligence, and disease. Unpredictable growth of slums and poverty alleviation has now become a serious challenge to the global and national policy makers for the development of the slum dwellers. The ethical dimension of the poor in the cities like SMCA and RM stands on equal opportunities, inclusive and harmonious living without discrimination of any kind. But, the migrant slum dwellers in SMCA and RM do not possess high skill or education to enable them to find well paid employment in the formal sector and the surplus urban labour force is compelled to generate its own means of employment and survival in the informal sector. The survey data of the households has been analysedin terms of percentage, descriptive statistics which includes mean, Standard Deviation (SD), ANOVA (Mean Difference) etc., to analyse the socio economic variables of the households. The study shows that the migrant labour forces living in the slums are derived from the social security measures in both the municipal areas of SMCA and RM. The urban poor in the cities of SMCA and RM rely heavily on social capital amongst all the capital assets to help them ‘get by’ and ‘get ahead’. Despite, the slum dwellers in the study areas are vulnerable with respect to other determinants of capital assets. It is noteworthy that Indian plans of anti-poverty programmes was in a proper place even after the neo-liberal regime, where the basic idea behind the massive shift of various welfare and service oriented strategy to poverty reduction strategy for the benefit of the urban poor with the trickle down effects. But, the overall impact of the trickledown effect was unsatisfactory. The objective of the Paper is to assess the magnitude of migration and absorption in the urban labour market. Issues relating to capital formation, social security measures and the support of the Welfare State in order to meet 'Sustainable Development Goals'. This study also highlights the quality of life of urban poor migrants in terms of capital formation and livelihoods.

Keywords: migration, slums, labour market, capital formation, social security

Procedia PDF Downloads 105
3479 Banking and Accounting Analysis Researches Effect on Environment and Income

Authors: Gerges Samaan Henin Abdalla

Abstract:

Ultra-secured methods of banking services have been introduced to the customer, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. Consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 31
3478 Influence of Different Ripening Agents on the Shelf-Life and Microbial Load of Organic and Inorganic Musaceae, during the Ripening Process, and the Health Implication for Food Security

Authors: Wisdom Robert Duruji

Abstract:

Local farmers and fruit processors in developing countries of West Africa use different ripening agents to accelerate the ripening process of plantain and banana. This study reports on the influence of different ripening agents on the shelf-life and microbial load of organic and inorganic plantain (Musa paradisiaca) and banana (Musa sapientum) during ripening process and the health implication for food security in Nigeria. The experiment consisted of four treatments, namely: Calcium carbide, Irvingia gabonensis fruits, Newbouldia laevis leaves and a control, where no ripening agent was applied to the fingers of plantain and banana. The unripe and ripened plantain and banana were subjected to microbial analysis by isolating their micro flora (Bacteria, Yeast and Mould) using pour plate method. Microbes present in the samples were enumerated, characterized and classified to genera and species. The result indicated that the microbial load of inorganic plantain from (Urban day) open market in Ile-Ife increased from 8.00 for unripe to 12.11 cfu/g for ripened; and the microbial load of organic plantain from Obafemi Awolowo University Teaching and Research Farm (OAUTRF) increased from 6.00 for unripe to 11.60 cfu/g for ripened. Also, the microbial load of inorganic banana from (Urban day) open market in Ile-Ife increased from 8.00 for unripe to 11.50 cfu/g for ripened; while the microbial load of organic banana from OAUTRF increased from 6.50 for unripe to 9.40 cfu/g for ripened. The microbial effects of the ripening agents increased from 10.00 for control to 16.00 cfu/g for treated (ripened) organic and inorganic plantain; while that of organic and inorganic banana increased from 7.50 for control to 14.50 cfu/g for ripened. Visual observation for the presence of fungal colonies and deterioration rates were monitored till seven days after the plantain and banana fingers have fully ripened. Inorganic plantain and banana from (Urban day) open market in Ile-Ife are more contaminated than organic plantain and banana fingers from OAUTRF. The ripening accelerators reduced the shelf life, increased senescence, and microbial load of plantain and banana. This study concluded that organic Agriculture is better and microbial friendlier than inorganic farming.

Keywords: organic agriculture, food security, Musaceae, calcium carbide, Irvingia gabonensis, Newbouldia laevis

Procedia PDF Downloads 546
3477 Potential of Tourism Logistic Service Business in the Border Areas of Chong Anma, Chong Sa-Ngam, and Chong Jom Checkpoints in Thailand to Increase Competitive Efficiency among the ASEAN Community

Authors: Pariwat Somnuek

Abstract:

This study focused on tourism logistic services in the border areas of Thailand by an analysis and comparison of the opinions of tourists, villagers, and entrepreneurs of these services. Sample representatives of this study were a total of 600 villagers and 15 entrepreneurs in the three border areas consisting of Chong Anma, Chong Sa-Ngam, and Chong Jom checkpoints. For methodology, survey questionnaires, situation analysis, TOWS matrix, and focus group discussions were used for data collection, as well as descriptive analysis and statistics such as arithmetic means and standard deviations, were employed for data analysis. The findings revealed that business potential was at the medium level and entrepreneurs were satisfied with their turnovers. However, perspectives of transportation and tourism services provided for tourists need to be immediately improved. Recommendations for the potential development included promotion of border tourism destinations and foreign investments into accommodation, restaurants, and transport, as well as the establishment of business networks between Thailand and Cambodia, along with the introduction of new tourism destinations by co-operation between entrepreneurs in both countries. These initiatives may lead to increased visitors, collaboration of security offices, and an improved image of tourism security.

Keywords: business potential, potential development, tourism logistics, services

Procedia PDF Downloads 298
3476 Criminal Attitude vs Transparency in the Arab World

Authors: Keroles Akram Saed Ghatas

Abstract:

The political violence that characterized 1992 continued into 1993, creating a major security crisis for President Hosni Mubarak's government as the death toll and human rights abuses soared. Increasingly sensitive to criticism of 's human rights activities, the government established human rights departments in key ministries, beginning with the Foreign Office in February. Similar offices have been set up in the Justice and Agriculture Ministries, and plans to set up an office in the Home Office have been announced. It turned out that the main task of the law unit was to overturn the conclusions of international human rights organizations.President Mubarak was elected in a national referendum on October 4 for a third six-year term after being appointed on July 21 by the People's Assembly, an elected parliament overwhelmingly dominated by the in-power National Democratic Party will Mr. Mubarak ran unhindered. The Interior Ministry announced that nearly 16 million people cast their votes (84% of eligible voters), of which 96.28%. voted for presidential re-election.In 1993, armed Islamic extremists escalated their attacks on Christian citizens, government officials, police officers and senior security officials, resulting in casualties among the intended victims and bystanders. Sporadic attacks on buses, boats and tourist attractions also occurred throughout the year. From March 1992 to October 28, 1993, a total of 222 people lost their lives in the riots: 36 Coptic Christians and 38 other citizens; If one is a foreigner; sixty-six members of the Security Forces; and seventy-six known or suspected activists who were killed while resisting arrest. The latter was killed in airstrikes and firefights with security forces and at the site of planned attacks. On March 9-10, a series of airstrikes in Cairo, Giza, Qalyubiya province north of the capital and Aswan killed fifteen suspected militants and five members of the security forces.One of the airstrikes in Giza, part of Greater Cairo, killed the wife and son of Khalifa Mahmoud Ramadan, a suspected militant who was himself killed. The government agency Middle East News Agency reported on March 10 that the raids were part of a "broad confrontational plan aimed at ofterrorist elements"The state of emergency declared in October 1981 after the assassination of President Anwar el-Sadat was still in force in Egypt. The law, previously in effect continuously from June 1967 to May 1980, continued to grant the executive branch unique legal powers that effectively overrode the human rights guarantees of the Egyptian constitution. These provisions included wide discretionary powers in arresting and detaining individuals, as well as the ability to try civilians in military courts. The Cairo-based Independent Organization for Human Rights said so in a document sent to the United Nations in July 1993The human rights committee said the continued imposition of the state of emergency had resulted in "another constitution for the country" and "led to widespread misconduct by the security apparatus".

Keywords: constitution, human rights, legal power, president, anwar, el-sadat, assassination, state of emergency, middle east, news, agency, confrontational, arresting, fugitive, leaders, terrorist, elements, armed islamic extremists.

Procedia PDF Downloads 22
3475 The Readiness of Bodies Corporate in South Africa for Third Generation Sectional Title Legislation: An Accountancy Perspective

Authors: Leandi Steenkamp

Abstract:

After being in effect since the late 1970s, first generation sectional title legislation in South Africa was completely overhauled in recent years into what is now commonly referred to as third generation sectional title legislation. The original Sectional Titles Act was split into three separate statutes, namely the Sectional Titles Schemes Management Act No. 8 of 2011, the Sectional Titles Amendment Act No. 33 of 2013 and the Community Schemes Ombud Service Act No. 9 of 2011, with various Regulations detailing how the different acts should be applied in practice. Even though some of the changes effected by the new legislation is simply technical adjustments and replications of the original first generation legislation, the new acts introduce a number of significant changes that will have an effect on accountancy and financial management aspects of sectional title schemes in future. No academic research has been undertaken on third generation sectional title legislation in South Africa from an accountancy and financial management perspective as yet. The aim of this paper is threefold: Firstly, to discuss the findings of a literature review on the new third generation sectional title legislation, with specific reference to accountancy-related aspects. Secondly, the empirical findings of accountancy-related aspects from the results of a quantitative study on a sample of bodies corporate will be discussed. The sample of bodies corporate was selected from four different municipal areas in South Africa. Specific reference will be made to the readiness of bodies corporate regarding the provisions of the new legislation. Thirdly, practical recommendations will be made on how bodies corporate can prepare for the new legislative aspects, and further research opportunities in this regard will be discussed.

Keywords: accountancy, body corporate, sectional title, third generation sectional title legislation

Procedia PDF Downloads 294
3474 Side Effects of COVID-19 Vaccine Investigated by Radiology

Authors: Mahdi Farajzadeh Ajirlou

Abstract:

The detailed serious adverse effects raised the stresses around the safety of individuals who have gotten COVID-19 vaccines. Numerous verification referrers that disease with COV-19 causes neurological dysfunction in a significant proportion of influenced patients, where these side effects show up seriously amid the disease, and still less is known approximately the potential long-term results for the brain, where the loss of olfaction could be a neurological sign and simple indications of COVID-19. Since publishing effective clinical trial results of mRNA coronavirus disease 2019 (COVID-19) and injecting it to the volunteers in 2020, numerous reports have emerged approximately about cardiovascular complications followed by the mRNA vaccination. Vaccination-associated adenopathy could be a constant imaging finding after the organization of COVID-19 antibodies that will lead to a symptomatic problem in patients with shown or suspected cancer, in whom it may be vague from dangerous nodal inclusion. In spite of all the benefits and viability of the coronavirus infection 2019 (COVID-19) antibodies specified in later clinical trials, a few other post-vaccination side impacts, such as lymphadenopathy (LAP), were observed. Also, numerous variables, including financial conditions, have played a critical part in expanding the number of people with COVID-19 infection and also much more side effects in that country. Amid the Coronavirus widespread, Iran has been experiencing extreme sanctions, which has faced this nation with an extreme financial crisis. Additionally, with COVID-19 widespread, there was a developing concern around the abuse of imaging exams extraordinarily within the pediatric populace, which highlights the issues pointed out by this review.

Keywords: radiology, vaccines, COVID-19, side effect

Procedia PDF Downloads 55
3473 A Qualitative Study of Unmet Needs of Families of Children with Cerebral Palsy in Bangladesh

Authors: Reshma Parvin Nuri, Heather Michelle Aldersey, Setareh Ghahari

Abstract:

Objectives: Worldwide, it is well known that taking care of children with disabilities (CWD) can have a significant impact on the entire family unit. Over the last few decades, an increased number of studies have been conducted on families of CWD in higher income countries, and much of this research has identified family needs and strategies to meet those needs. However, family needs are incredibly under-studied in developing countries. Therefore, the aims of this study were to: (a) explore the needs of families of children with cerebral palsy (CP) in Bangladesh; (b) investigate how some of the family needs have been met and (c) identify the sources of supports that might help the families to meet their needs in the future. Methods: A face to face, semi-structured in-depth interview was conducted with 20 family members (12 mothers, 4 fathers, 1 sister, 2 grandmothers, and 1 aunt) who visited the Centre for the Rehabilitation of the Paralysed (CRP), Bangladesh between June and August 2016. Constant comparison method of grounded theory approach within the broader spectrum of qualitative study was used to analyze the data. Results: Participants identified five categories of needs: (a) financial needs, (b) access to disability-related services, (c) family and community cohesion, (d) informational needs, and (e) emotional needs. Participants overwhelmingly reported that financial need is their greatest family need. Participants noted that families encountered additional financial expenses for a child with CP, beyond what they would typically pay for their other children. Participants were seeing education as their non-primary need as they had no hope that their children would be physically able to go to school. Some participants also shared their needs for social inclusion and participation and receiving emotional support. Participants further expressed needs to receive information related to the child’s health condition and availability/accessibility of governmental support programs. Besides unmet needs, participants also highlighted that some of their needs have been met through formal and informal support systems. Formal support systems were mainly institution-based and run by non-governmental organizations, whereas participants identified informal support coming from family, friends and community members. Participants overwhelmingly reported that they receive little to no support from the government. However, participants identified the government as the key stakeholder who can play vital role in meeting their unmet needs. Conclusions: In the next phase of this research, the plan is to understand how the Government of the People’s Republic of Bangladesh is working to meet the needs of families of CWD. There is also need for further study on needs of families of children with conditions other than CP and those who live in the community and do not have access to the CRP Services. There is clear need to investigate ways to enable children with CP have better access to education in Bangladesh.

Keywords: Bangladesh, children with cerebral palsy, family needs, support

Procedia PDF Downloads 363
3472 Comparing Hotels' Official Websites with Their Pages on Booking Sites: An Exploratory Study

Authors: Iman Shawky

Abstract:

Hotel websites frequently aim at encouraging visitors to become potential guests by completing their booking procedures, and accordingly, they have been proved to be attractive and appealing. That might be due to the consideration of them as one of the direct efficacious tools to promote and sell hotels' facilities, besides building strong communication with guests to create unforgettable brand images. This study tried to find out a step for five-star and four-star hotels to develop their websites to meet their visitors' or guests' requirements for an effective site. In addition, it aimed at exploring to what extent hotels' official websites compared with their pages on hotel booking sites still influence visitors' or guests' desires to book. Besides, it also aimed at investigating to what extent visitors or guests widely trust and use those sites to accomplish their booking. Furthermore, it tried to explore to what extent visitors' or guests' preferences of those sites can influence on hotels' financial performance. To achieve these objectives, the researcher conducted an exploratory study by surfing both hotels' official websites and their pages on booking sites of such hotels in Alexandria city in Egypt to make a comparison between them. Moreover, another separate comparison was made on Arab and foreign guests' views conducted by using a questionnaire during the past seven months to investigate the effectiveness of hotels' official websites against their pages on booking sites to trust and motive them to book. The results indicated that hotels' pages on booking sites represented widely trusted and used sites compared with their official websites for achieving visitors' or guests' booking process, while a few other visitors or guests still trusted official hotel websites for completing their booking.

Keywords: five-star and four-star hotels, hotel booking sites, hotels' financial performance, hotels' official websites

Procedia PDF Downloads 131
3471 The Study of Cost Accounting in S Company Based on TDABC

Authors: Heng Ma

Abstract:

Third-party warehousing logistics has an important role in the development of external logistics. At present, the third-party logistics in our country is still a new industry, the accounting system has not yet been established, the current financial accounting system of third-party warehousing logistics is mainly in the traditional way of thinking, and only able to provide the total cost information of the entire enterprise during the accounting period, unable to reflect operating indirect cost information. In order to solve the problem of third-party logistics industry cost information distortion, improve the level of logistics cost management, the paper combines theoretical research and case analysis method to reflect cost allocation by building third-party logistics costing model using Time-Driven Activity-Based Costing(TDABC), and takes S company as an example to account and control the warehousing logistics cost. Based on the idea of “Products consume activities and activities consume resources”, TDABC put time into the main cost driver and use time-consuming equation resources assigned to cost objects. In S company, the objects focuses on three warehouse, engaged with warehousing and transportation (the second warehouse, transport point) service. These three warehouse respectively including five departments, Business Unit, Production Unit, Settlement Center, Security Department and Equipment Division, the activities in these departments are classified by in-out of storage forecast, in-out of storage or transit and safekeeping work. By computing capacity cost rate, building the time-consuming equation, the paper calculates the final operation cost so as to reveal the real cost. The numerical analysis results show that the TDABC can accurately reflect the cost allocation of service customers and reveal the spare capacity cost of resource center, verifies the feasibility and validity of TDABC in third-party logistics industry cost accounting. It inspires enterprises focus on customer relationship management and reduces idle cost to strengthen the cost management of third-party logistics enterprises.

Keywords: third-party logistics enterprises, TDABC, cost management, S company

Procedia PDF Downloads 347
3470 Using Customer Satisfaction to Help Achieve Sustainable Development Goals in the Islamic Economy: A Quantitative Case Study from Amman, Jordan

Authors: Sarah A. Tobin

Abstract:

Social justice outcomes, derived from customer satisfaction, serve as a main pathway and conduit for achieving Sustainable Development Goals (SDGs) because they prompt democratizing and socially-inclusive effects that are consistent with Islamic economic values. This paper argues that achieving higher levels of social justice and the SGDs is possible only through the realization of Islamic banking and finance customer satisfaction that aligns with Islamic values in the tradition of the Shari`a (or Islamic law). Through this key manifestation of Shari`a in the banks, social justice aims of achieving SDGs become possible. This paper utilizes a case study of a large-scale survey (N=127) comparing customer satisfaction between a conventional and an Islamic bank in Amman, Jordan. Based on a series of linear regressions, the statistically-significant findings suggest that when overall customer satisfaction is high, customers are more likely to become empowered citizens demanding inclusive, quality services and corruption-free management, as well as attribute their experiences to the Islamic nature of the financial endeavors. Social justice interests and expectations increase (and SDGs are more likely met) when a customer has high levels of satisfaction. The paper concludes with policy recommendations for Islamic financial institutions that enhance customer service experiences for better achieving the social justice aims of the Islamic economy and SDGs, including transparency in transactions, exemplary customer service and follow up, and attending to Islamic values in the aesthetics of bank.

Keywords: customer satisfaction, Islamic economy, social justice, sustainable development goals

Procedia PDF Downloads 325
3469 The Security Challenges of Urbanization and Environmental Degradation in the Niger-Delta Area of Nigeria

Authors: Gloria Ogungbade, Ogaba Oche, Moses Duruji, Chris Ehiobuche, Lady Ajayi

Abstract:

Human’s continued sustenance on earth and the quality of living are heavily dependent on the environment. The major components of the environment being air, water and land are the supporting pillars of the human existence, which they depend on directly or indirectly for survival and well-being. Unfortunately, due to some of the human activities on the environment, there seems to be a war between humans and the environment, which is evident in his over-exploitation and inadequate management of the basic components of the environment. Since the discovery of crude oil in the Niger Delta, the region has experienced various forms of degradation caused by pollution from oil spillage, gas flaring and other forms of environmental pollution, as a result of reckless way and manner with which oil is being exploited by the International Oil Corporations (IOCs) operating within the region. The Nigerian government on the other, not having strong regulations guiding the activities of the operations of these IOCs, has done almost nothing to curtail the activities of these IOCs because of the revenue generated the IOCs, as such the region is deprived of the basic social amenities and infrastructures. The degree of environmental pollution suffered within the region affects their major sources of livelihood – being fishing and farming, and has also left the region in poverty, which has led to a large number of people migrating to the urban areas to escape poverty. This paper investigates how environment degradation impact urbanization and security in the region.

Keywords: environmental degradation, environmental pollution, gas flaring, oil spillage, urbanization

Procedia PDF Downloads 272
3468 Evaluation of Deformable Boundary Condition Using Finite Element Method and Impact Test for Steel Tubes

Authors: Abed Ahmed, Mehrdad Asadi, Jennifer Martay

Abstract:

Stainless steel pipelines are crucial components to transportation and storage in the oil and gas industry. However, the rise of random attacks and vandalism on these pipes for their valuable transport has led to more security and protection for incoming surface impacts. These surface impacts can lead to large global deformations of the pipe and place the pipe under strain, causing the eventual failure of the pipeline. Therefore, understanding how these surface impact loads affect the pipes is vital to improving the pipes’ security and protection. In this study, experimental test and finite element analysis (FEA) have been carried out on EN3B stainless steel specimens to study the impact behaviour. Low velocity impact tests at 9 m/s with 16 kg dome impactor was used to simulate for high momentum impact for localised failure. FEA models of clamped and deformable boundaries were modelled to study the effect of the boundaries on the pipes impact behaviour on its impact resistance, using experimental and FEA approach. Comparison of experimental and FE simulation shows good correlation to the deformable boundaries in order to validate the robustness of the FE model to be implemented in pipe models with complex anisotropic structure.

Keywords: dynamic impact, deformable boundary conditions, finite element modelling, LS-DYNA, stainless steel pipe

Procedia PDF Downloads 139
3467 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 249
3466 Climate Change and Its Impact on Water Security and Health in Coastal Community: A Gender Outlook

Authors: Soorya Vennila

Abstract:

The present study answers the questions; how does climate change affect the water security in drought prone Ramanathapuram district? and what has water insecurity done to the health of the coastal community? The study area chosen is Devipattinam in Ramanathapuram district. Climate change evidentially wreaked havoc on the community with saltwater intrusion, water quality degradation, water scarcity and its eventual economic, social like power inequality within family and community and health hazards. The climatological data such as rainfall, minimum temperature and maximum temperature were statistically analyzed for trend using Mann-Kendall test. The test was conducted for 14 years (1989-2002) of rainfall data, maximum and minimum temperature and the data were statistically analyzed. At the outset, the water quality samples were collected from Devipattinam to test its physical and chemical parameters and their spatial variation. The results were derived as shown in ARC GIS. Using the water quality test water quality index were framed. And finally, key Informant interview, questionnaire were conducted to capture the gender perception and problem. The data collected were thereafter interpreted using SPSS software for recommendations and suggestions to overcome water scarcity and health problems.

Keywords: health, watersecurity, water quality, climate change

Procedia PDF Downloads 63
3465 Closing down the Loop Holes: How North Korea and Other Bad Actors Manipulate Global Trade in Their Favor

Authors: Leo Byrne, Neil Watts

Abstract:

In the complex and evolving landscape of global trade, maritime sanctions emerge as a critical tool wielded by the international community to curb illegal activities and alter the behavior of non-compliant states and entities. These sanctions, designed to restrict or prohibit trade by sea with sanctioned jurisdictions, entities, or individuals, face continuous challenges due to the sophisticated evasion tactics employed by countries like North Korea. As the Democratic People's Republic of Korea (DPRK) diverts significant resources to circumvent these measures, understanding the nuances of their methodologies becomes imperative for maintaining the integrity of global trade systems. The DPRK, one of the most sanctioned nations globally, has developed an intricate network to facilitate its trade in illicit goods, ensuring the flow of revenue from designated activities continues unabated. Given its geographic and economic conditions, North Korea predominantly relies on maritime routes, utilizing foreign ports to route its illicit trade. This reliance on the sea is exploited through various sophisticated methods, including the use of front companies, falsification of documentation, commingling of bulk cargos, and physical alterations to vessels. These tactics enable the DPRK to navigate through the gaps in regulatory frameworks and lax oversight, effectively undermining international sanctions regimes Maritime sanctions carry significant implications for global trade, imposing heightened risks in the maritime domain. The deceptive practices employed not only by the DPRK but also by other high-risk jurisdictions, necessitate a comprehensive understanding of UN targeted sanctions. For stakeholders in the maritime sector—including maritime authorities, vessel owners, shipping companies, flag registries, and financial institutions serving the shipping industry—awareness and compliance are paramount. Violations can lead to severe consequences, including reputational damage, sanctions, hefty fines, and even imprisonment. To mitigate risks associated with these deceptive practices, it is crucial for maritime sector stakeholders to employ rigorous due diligence and regulatory compliance screening measures. Effective sanctions compliance serves as a protective shield against legal, financial, and reputational risks, preventing exploitation by international bad actors. This requires not only a deep understanding of the sanctions landscape but also the capability to identify and manage risks through informed decision-making and proactive risk management practices. As the DPRK and other sanctioned entities continue to evolve their sanctions evasion tactics, the international community must enhance its collective efforts to demystify and counter these practices. By leveraging more stringent compliance measures, stakeholders can safeguard against the illicit use of the maritime domain, reinforcing the effectiveness of maritime sanctions as a tool for global security. This paper seeks to dissect North Korea's adaptive strategies in the face of maritime sanctions. By examining up-to-date, geographically, and temporally relevant case studies, it aims to shed light on the primary nodes through which Pyongyang evades sanctions and smuggles goods via third-party ports. The goal is to propose multi-level interaction strategies, ranging from governmental interventions to localized enforcement mechanisms, to counteract these evasion tactics.

Keywords: maritime, maritime sanctions, international sanctions, compliance, risk

Procedia PDF Downloads 54
3464 Factors Affecting Internet Behavior and Life Satisfaction of Older Adult Learners with Use of Smartphone

Authors: Horng-Ji Lai

Abstract:

The intuitive design features and friendly interface of smartphone attract older adults. In Taiwan, many senior education institutes offer smartphone training courses for older adult learners who are interested in learning this innovative technology. It is expected that the training courses can help them to enjoy the benefits of using smartphone and increase their life satisfaction. Therefore, it is important to investigate the factors that influence older adults’ behavior of using smartphone. The purpose of the research was to develop and test a research model that investigates the factors (self-efficacy, social connection, the need to seek health information, and the need to seek financial information) affecting older adult learners’ Internet behaviour and their life satisfaction with use of smartphone. Also, this research sought to identify the relationship between the proposed variables. Survey method was used to collect research data. A Structural Equation Modeling was performed using Partial Least Squares (PLS) regression for data exploration and model estimation. The participants were 394 older adult learners from smartphone training courses in active aging learning centers located in central Taiwan. The research results revealed that self-efficacy significantly affected older adult learner’ social connection, the need to seek health information, and the need to seek financial information. The construct of social connection yielded a positive influence in respondents’ life satisfaction. The implications of these results for practice and future research are also discussed.

Keywords: older adults, smartphone, internet behaviour, life satisfaction

Procedia PDF Downloads 177
3463 An Assessment of Financial Viability and Sustainability of Hydroponics Using Reclaimed Water Using LCA and LCC

Authors: Muhammad Abdullah, Muhammad Atiq Ur Rehman Tariq, Faraz Ul Haq

Abstract:

In developed countries, sustainability measures are widely accepted and acknowledged as crucial for addressing environmental concerns. Hydroponics, a soilless cultivation technique, has emerged as a potentially sustainable solution as it can reduce water consumption, land use, and environmental impacts. However, hydroponics may not be economically viable, especially when using reclaimed water, which may entail additional costs and risks. This study aims to address the critical question of whether hydroponics using reclaimed water can achieve a balance between sustainability and financial viability. Life Cycle Assessment (LCA) and Life Cycle Cost (LCC) will be integrated to assess the potential of hydroponics whether it is environmentally sustainable and economically viable. Life cycle assessment, or LCA, is a methodology for assessing environmental impacts associated with all the stages of the life cycle of a commercial product, process, or service. While Life Cycle Cost (LCC) is an approach that assesses the total cost of an asset over its life cycle, including initial capital costs and maintenance costs. The expected benefits of this study include supporting evidence-based decision-making for policymakers, farmers, and stakeholders involved in agriculture. By quantifying environmental impacts and economic costs, this research will facilitate informed choices regarding the adoption of hydroponics with reclaimed water. It is believed that the outcomes of this research work will help to achieve a sustainable approach to agricultural production, aligning with sustainability goals while considering economic factors by adopting hydroponic technique.

Keywords: hydroponic, life cycle assessment, life cycle cost, sustainability

Procedia PDF Downloads 61
3462 Household Earthquake Absorptive Capacity Impact on Food Security: A Case Study in Rural Costa Rica

Authors: Laura Rodríguez Amaya

Abstract:

The impact of natural disasters on food security can be devastating, especially in rural settings where livelihoods are closely tied to their productive assets. In hazards studies, absorptive capacity is seen as a threshold that impacts the degree of people’s recovery after a natural disaster. Increasing our understanding of households’ capacity to absorb natural disaster shocks can provide the international community with viable measurements for assessing at-risk communities’ resilience to food insecurities. The purpose of this study is to identify the most important factors in determining a household’s capacity to absorb the impact of a natural disaster. This is an empirical study conducted in six communities in Costa Rica affected by earthquakes. The Earthquake Impact Index was developed for the selection of the communities in this study. The households coded as total loss in the selected communities constituted the sampling frame from which the sample population was drawn. Because of the study area geographically dispersion over a large surface, the stratified clustered sampling hybrid technique was selected. Of the 302 households identified as total loss in the six communities, a total of 126 households were surveyed, constituting 42 percent of the sampling frame. A list of indicators compiled based on theoretical and exploratory grounds for the absorptive capacity construct served to guide the survey development. These indicators were included in the following variables: (1) use of informal safety nets, (2) Coping Strategy, (3) Physical Connectivity, and (4) Infrastructure Damage. A multivariate data analysis was conducted using Statistical Package for Social Sciences (SPSS). The results show that informal safety nets such as family and friends assistance exerted the greatest influence on the ability of households to absorb the impact of earthquakes. In conclusion, communities that experienced the highest environmental impact and human loss got disconnected from the social networks needed to absorb the shock’s impact. This resulted in higher levels of household food insecurity.

Keywords: absorptive capacity, earthquake, food security, rural

Procedia PDF Downloads 241
3461 Convertible Lease, Risky Debt and Financial Structure with Growth Option

Authors: Ons Triki, Fathi Abid

Abstract:

The basic objective of this paper is twofold. It resides in designing a model for a contingent convertible lease contract that can ensure the financial stability of a company and recover the losses of the parties to the lease in the event of default. It also aims to compare the convertible lease contract on inefficiencies resulting from the debt-overhang problem and asset substitution with other financing policies. From this perspective, this paper highlights the interaction between investments and financing policies in a dynamic model with existing assets and a growth option where the investment cost is financed by a contingent convertible lease and equity. We explore the impact of the contingent convertible lease on the capital structure. We also check the reliability and effectiveness of the use of the convertible lease contract as a means of financing. Findings show that the rental convertible contract with a sufficiently high conversion ratio has less severe inefficiencies arising from risk-shifting and debt overhang than those entailed by risky debt and pure-equity financing. The problem of underinvestment pointed out by Mauer and Ott (2000) and the problem of overinvestment mentioned by Hackbarth and Mauer (2012) may be reduced under contingent convertible lease financing. Our findings predict that the firm value under contingent convertible lease financing increases globally with asset volatility instead of decreasing with business risk. The study reveals that convertible leasing contracts can stand for a reliable solution to ensure the lessee and quickly recover the counterparties of the lease upon default.

Keywords: contingent convertible lease, growth option, debt overhang, risk-shifting, capital structure

Procedia PDF Downloads 58
3460 Study of Causes and Effects of Road Projects Abandonment in Nigeria

Authors: Monsuru Oyenola Popoola, Oladapo Samson Abiola, Wusamotu Alao Adeniji

Abstract:

The prevalent and incessant abandonment of road construction projects are alarming that it creates several negative effects to social, economic and environmental values of the project. The purpose of this paper is to investigate and determined the various causes and effects of abandoning road construction projects in Nigeria. Likert Scale questionnaire design was used to administered and analysed the data obtained for the stydy. 135 (Nr) questionnaires were completed and retrieved from the respondents, out of 200 (Nr) questionnaires sent out, representing a response rate of 67.5%. The analysis utilized the Relative Importance Index (R.I.I.) method and the results are presented in tabular form. The findings confirms that at least 20 factors were the causes of road projects abandonment in Nigeria with most including Leadership Instability, Improper Project Planning, Inconsistence in government policies and Design, Contractor Incompetence, Economy Instability and Inflation, Delay in remittance of money, Improper financial analysis, Poor risk management, Climatic Conditions, Improper Project Estimates etc. The findings also show that at least eight (8) effect were identified on the system, and these include; Waste of Financial Resources, Loss of economic value, Environmental degradation, Loss of economic value, Reduction in standard of living, Litigation and Arbitration, etc. The reflection is that allocating reasonable finance, developing appropriate and effective implementation plans and monitoring, evaluation and reporting on development project activities by key actors should enhance in resolving the problem of road projects abandonment.

Keywords: road construction, abandonment of road projects, climatic condition, project planning, contractor

Procedia PDF Downloads 290
3459 The Exchange Rate Exposure of Exporting and Domestic Firms in Central and Eastern European Countries Controlling for Regime Effect and Recent Crisis

Authors: Raheel Asif, Michael Frommel

Abstract:

This paper focuses on analyzing the exchange rate exposure of exporting & domestic firms in (the so far rarely addressed) largest Eastern European transition economies, i.e., Russia and the three EU accession countries, Poland, Hungary, and Czech Republic (CEEC-3). It also controls for possible effects of different exchange rate regimes, Great Financial crisis (2007-08), Russian Financial crisis (2014-15), the formation of EU & turn of year effect. Substantially improving the results from the existing literature on these transition economies, we find for more than 51% of our sample firms in CEEC-3 countries and 29% in Russia shows a significant exchange rate exposure. However, the magnitude and direction of firms’ exposure depends on the particular bilateral exchange rate and differs between CEEC-3 and Russia. We find that share price increases with an appreciation of the domestic currency against the EURO and US Dollar (USD) in CEEC-3; however, the effect is more pronounced for EURO as expected. Whereas, for Russian firms share price increases with a depreciation of the domestic currency against the USD only. Those differences may result from a differing dominance of exposure channels in the respective economies, such as the country-specific export structure, competitiveness channels, and dependence on foreign debt. Finally, the switch from a pegged to a flexible exchange rate regime appears to have a less pronounced effect for the exchange rate exposure of firms in all countries except for USD in Poland and Russia.

Keywords: exchange rate exposure, transition economies, central and eastern Europe, international finance

Procedia PDF Downloads 118
3458 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 393
3457 Development of Earthquake and Typhoon Loss Models for Japan, Specifically Designed for Underwriting and Enterprise Risk Management Cycles

Authors: Nozar Kishi, Babak Kamrani, Filmon Habte

Abstract:

Natural hazards such as earthquakes and tropical storms, are very frequent and highly destructive in Japan. Japan experiences, every year on average, more than 10 tropical cyclones that come within damaging reach, and earthquakes of moment magnitude 6 or greater. We have developed stochastic catastrophe models to address the risk associated with the entire suite of damaging events in Japan, for use by insurance, reinsurance, NGOs and governmental institutions. KCC’s (Karen Clark and Company) catastrophe models are procedures constituted of four modular segments: 1) stochastic events sets that would represent the statistics of the past events, hazard attenuation functions that could model the local intensity, vulnerability functions that would address the repair need for local buildings exposed to the hazard, and financial module addressing policy conditions that could estimates the losses incurring as result of. The events module is comprised of events (faults or tracks) with different intensities with corresponding probabilities. They are based on the same statistics as observed through the historical catalog. The hazard module delivers the hazard intensity (ground motion or wind speed) at location of each building. The vulnerability module provides library of damage functions that would relate the hazard intensity to repair need as percentage of the replacement value. The financial module reports the expected loss, given the payoff policies and regulations. We have divided Japan into regions with similar typhoon climatology, and earthquake micro-zones, within each the characteristics of events are similar enough for stochastic modeling. For each region, then, a set of stochastic events is developed that results in events with intensities corresponding to annual occurrence probabilities that are of interest to financial communities; such as 0.01, 0.004, etc. The intensities, corresponding to these probabilities (called CE, Characteristics Events) are selected through a superstratified sampling approach that is based on the primary uncertainty. Region specific hazard intensity attenuation functions followed by vulnerability models leads to estimation of repair costs. Extensive economic exposure model addresses all local construction and occupancy types, such as post-linter Shinand Okabe wood, as well as concrete confined in steel, SRC (Steel-Reinforced Concrete), high-rise.

Keywords: typhoon, earthquake, Japan, catastrophe modelling, stochastic modeling, stratified sampling, loss model, ERM

Procedia PDF Downloads 253
3456 Modeling of Virtual Power Plant

Authors: Muhammad Fanseem E. M., Rama Satya Satish Kumar, Indrajeet Bhausaheb Bhavar, Deepak M.

Abstract:

Keeping the right balance of electricity between the supply and demand sides of the grid is one of the most important objectives of electrical grid operation. Power generation and demand forecasting are the core of power management and generation scheduling. Large, centralized producing units were used in the construction of conventional power systems in the past. A certain level of balance was possible since the generation kept up with the power demand. However, integrating renewable energy sources into power networks has proven to be a difficult challenge due to its intermittent nature. The power imbalance caused by rising demands and peak loads is negatively affecting power quality and dependability. Demand side management and demand response were one of the solutions, keeping generation the same but altering or rescheduling or shedding completely the load or demand. However, shedding the load or rescheduling is not an efficient way. There comes the significance of virtual power plants. The virtual power plant integrates distributed generation, dispatchable load, and distributed energy storage organically by using complementing control approaches and communication technologies. This would eventually increase the utilization rate and financial advantages of distributed energy resources. Most of the writing on virtual power plant models ignored technical limitations, and modeling was done in favor of a financial or commercial viewpoint. Therefore, this paper aims to address the modeling intricacies of VPPs and their technical limitations, shedding light on a holistic understanding of this innovative power management approach.

Keywords: cost optimization, distributed energy resources, dynamic modeling, model quality tests, power system modeling

Procedia PDF Downloads 47
3455 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 247
3454 Cryptocurrency as a Payment Method in the Tourism Industry: A Comparison of Volatility, Correlation and Portfolio Performance

Authors: Shu-Han Hsu, Jiho Yoon, Chwen Sheu

Abstract:

With the rapidly growing of blockchain technology and cryptocurrency, various industries which include tourism has added in cryptocurrency as the payment method of their transaction. More and more tourism companies accept payments in digital currency for flights, hotel reservations, transportation, and more. For travellers and tourists, using cryptocurrency as a payment method has become a way to circumvent costs and prevent risks. Understanding volatility dynamics and interdependencies between standard currency and cryptocurrency is important for appropriate financial risk management to assist policy-makers and investors in marking more informed decisions. The purpose of this paper has been to understand and explain the risk spillover effects between six major cryptocurrencies and the top ten most traded standard currencies. Using data for the daily closing price of cryptocurrencies and currency exchange rates from 7 August 2015 to 10 December 2019, with 1,133 observations. The diagonal BEKK model was used to analyze the co-volatility spillover effects between cryptocurrency returns and exchange rate returns, which are measures of how the shocks to returns in different assets affect each other’s subsequent volatility. The empirical results show there are co-volatility spillover effects between the cryptocurrency returns and GBP/USD, CNY/USD and MXN/USD exchange rate returns. Therefore, currencies (British Pound, Chinese Yuan and Mexican Peso) and cryptocurrencies (Bitcoin, Ethereum, Ripple, Tether, Litecoin and Stellar) are suitable for constructing a financial portfolio from an optimal risk management perspective and also for dynamic hedging purposes.

Keywords: blockchain, co-volatility effects, cryptocurrencies, diagonal BEKK model, exchange rates, risk spillovers

Procedia PDF Downloads 131
3453 Pathfinders Career Guidance and Skill Development Program

Authors: Vinodd Nayak

Abstract:

10th & 12th are the most crucial period in a student’s life. It is the time when he or she has to make vital career choices and get the relevant professional education. Unfortunately most students are not aware of the multitudes of career options available to them. This leads to affect our social fabric of the society with issues like unemployment, stress etc. We have planned a guidance program for the youth in Maharashtra state which has 4 components; creating awareness about different career options, proper guidance and motivation, counseling for parents, and information on financial aid for unemployed youth we are conducting skill development programs. Currently we are conducting programs under 4 categories Uneducated Youth: Skill Development programs for unemployed youth in construction field (Carpentry/Masoning/Wlder/Electrician/Tiling etc..) in association with L&T Construction Training Institute Educated Youth: Il&FS: Training and Job Placement in the field of Finance and Customer Service NIS Sparta: Training and Job Placement in the field of Sales and Marketing Apeejay Inst. of Hotel Management: Training and Job Placement in the field of hospitality industry Skill India: Training and Job Placement in the field of IT Results: The results were really overwhelming. We were able to cater to approx. 10,000 students a year and the list is growing. Earlier we were only catering to schools and colleges, now we have started receiving invitations from other community organizations to conduct such programs for their communities Implications for Social Work and Social Development practice: It is a high time that Social work organisations need to get into such work as this will enhance people to improve their financial condition. We always believed that it is better to teach a man to fish than feed him.

Keywords: youth education, career guidance, skill development, parental guidance

Procedia PDF Downloads 328
3452 Rescaling Global Health and International Relations: Globalization of Health in a Low Security Environment

Authors: F. Argurio, F. G. Vaccaro

Abstract:

In a global environment defined by ever-increasing health issues, in spite of the progress made by modern medicine, this paper seeks to readdress the question of global health in an international relations perspective. The research hypothesis is: the lower the security environment, the higher the spread of communicable diseases. This question will be channeled by re-scaling the connotation of 'global' and 'international' dimension through the theoretical lens of glocalization, a theory by Bauman that starts its analysis from simple systems to get to the most complex ones. Glocalization theory will be operationalized by analyzing health in an armed-conflict context. In this respect, the independent variable 'low security environment' translates into the cases of Syria and Yemen, which provide a clear example of the all-encompassing nature of conflict on national health and the effects on regional development. In fact, Syria and Yemen have been affected by poliomyelitis and cholera outbreaks respectively. The dependent variable will be constructed on said communicable diseases which belong to the families of sanitation-related and vaccine-preventable diseases. The research will be both qualitative and quantitative, based on primary (interviews) and secondary (WHO and other NGO’s reports) sources. The methodology is based on the assessment of the vaccine coverage and case-analysis in time and space using epidemiological data. Moreover, local health facilities’ functioning and efficiency will be studied. The article posits that the intervention and cooperation of international organizations with the local authorities becomes crucial to provide the local populations with their primary health needs. In Yemen, the majority of fatal cholera cases were in the regions controlled by the Houthi rebels, not officially accredited by the International Community. Similarly, the polio outbreak in Syria primarily affected the areas not controlled by the Syrian Arab Republic forces, recognized as the leading interlocutor by the WHO. The jeopardized possibilities to access these countries have been pivotal to the determining the problem in controlling sanitation-related and vaccine preventable diseases. This represents a potential threat to global health.

Keywords: health in conflict-affected areas, cholera, polio, Yemen, Syria, glocalization

Procedia PDF Downloads 119