Search results for: energy security policy
13943 Humanity in Public Policy: The Polemic of Death Penalty Policy in Indonesia
Authors: Alvian R. E. Purnomo, K. Noni Srijati, Hernawan Adi
Abstract:
Government regulation is a result of agreement on the struggle of ideas, interests, and ideologies among elites in state institution. The polemic about death penalty policy in Indonesia is still becoming an interesting discussion and also a complex issue. There are pros/ cons of whether the policy is humane or not. Indonesia becomes the concern of the world’s community because the policy of death penalty applied is considered not reflecting the values of Indonesian culture including tolerance, mutual cooperation, and love. This paper examines them using literature study on how public policy theories respond to humanity issues and how Indonesian government should take steps to the issue of the death penalty that has become polemic until now.Keywords: government regulation, public policy, death penalty policy, humanity
Procedia PDF Downloads 31113942 Mechanisms and Process of an Effective Public Policy Formulation in Islamic Economic System
Authors: Md Abu Saieed
Abstract:
Crafting and implementing public policy is one of the indispensable works in any form of state and government. But the policy objectives, methods of formulation and tools of implementation might be different based on the ideological nature, historical legacy, structure and capacity of administration and management and other push and factors. Public policy in Islamic economic system needs to be based on the key guidelines of divine scriptures along with other sources of sharia’h. As a representative of Allah (SWT), the governor and other apparatus of the state will formulate and implement public policies which will enable to establish a true welfare state based on justice, equity and equality. The whole life of Prophet Muhammad (pbuh) and his policy in operating state of affairs in Madina is the practical guidelines for the policy actors and professionals in Islamic system of economics. Moreover, policy makers need to be more meticulous in formulating Islamic public policy which meets the needs and demands of contemporary worlds as well.Keywords: formulation, Islam, public policy, policy factors, Sharia’h
Procedia PDF Downloads 35013941 Simple Ways to Enhance the Security of Web Services
Authors: Majid Azarniush, Soroush Mokallaei
Abstract:
Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.Keywords: firewalls, security, web services, software
Procedia PDF Downloads 51013940 Energy Efficiency Retrofitting of Residential Buildings Case Study: Multi-Family Apartment Building in Tripoli, Lebanon
Authors: Yathreb Sabsaby
Abstract:
Energy efficiency retrofitting of existing buildings was long ignored by public authorities who favored energy efficiency policies in new buildings, which are easier to implement. Indeed, retrofitting is more complex and difficult to organize because of the extreme diversity in existing buildings, administrative situations and occupation. Energy efficiency retrofitting of existing buildings has now become indispensable in all economies—even emerging countries—given the constraints imposed by energy security and climate change, and because it represents considerable potential energy savings. Addressing energy efficiency in the existing building stock has been acknowledged as one of the most critical yet challenging aspects of reducing our environmental footprint on the ecosystem. Tripoli, Lebanon chosen as case study area is a typical Mediterranean metropolis in the North Lebanon, where multifamily residential buildings are all around the city. This generally implies that the density of energy demand is extremely high, even the renewable energy facilities are involved, they can just play as a minor energy provider at the current technology level in the single family house. It seems only the low energy design for buildings can be made possible, not the zero energy certainly in developing country. This study reviews the latest research and experience and provides recommendations for deep energy retrofits that aim to save more than 50% of the energy used in a typical Tripoli apartment building.Keywords: energy-efficiency, existing building, multifamily residential building, retrofit
Procedia PDF Downloads 45413939 The Nexus between Renewable Energy, Urbanization, Industrialization and Economic Growth in Pakistan
Authors: Zubda Zia, Zainab Masood
Abstract:
This study has investigated the relationship between renewable energy, urbanization, industrialization, and economic growth in Pakistan, through the years 1990-2016. All the three explanatory variables play a pivotal role in their contribution to growth in any economy, especially a developing one such as Pakistan. Auto-regressive distributive lag (ARDL) model has been used to determine the co-integration and relationship between the variables. The empirical results indicate that there exists a positive and significant relationship between all the three variables and economic growth and that there is a stable, long-run relationship among them. Policy suggestions that incorporate the results include having a larger share of renewable energy in the energy sector, using urbanization as a means to remove the big city trend and move towards, smaller sustainable cities, etc.Keywords: economic growth, energy crisis, industrialization, renewable energy, SGDs, urbanization
Procedia PDF Downloads 18613938 Enterprise Security Architecture: Approaches and a Framework
Authors: Amir Mohtarami, Hadi Kandjani
Abstract:
The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.Keywords: enterprise architecture, architecture framework, security architecture, information systems
Procedia PDF Downloads 70313937 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon
Authors: Jessy Abouarab
Abstract:
For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women
Procedia PDF Downloads 14313936 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations
Authors: Pratyush Vatsala, Sanjay Ahuja
Abstract:
The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.Keywords: Kashmir, Mizoram, security, value, human right
Procedia PDF Downloads 27613935 Electricity Sector's Status in Lebanon and Portfolio Optimization for the Future Electricity Generation Scenarios
Authors: Nour Wehbe
Abstract:
The Lebanese electricity sector is at the heart of a deep crisis. Electricity in Lebanon is supplied by Électricité du Liban (EdL) which has to suffer from technical and financial deficiencies for decades and proved to be insufficient and deficient as the demand still exceeds the supply. As a result, backup generation is widespread throughout Lebanon. The sector costs massive government resources and, on top of it, consumers pay massive additional amounts for satisfying their electrical needs. While the developed countries have been investing in renewable energy for the past two decades, the Lebanese government realizes the importance of adopting such energy sourcing strategies for the upgrade of the electricity sector in the country. The diversification of the national electricity generation mix has increased considerably in Lebanon's energy planning agenda, especially that a detailed review of the energy potential in Lebanon has revealed a great potential of solar and wind energy resources, a considerable potential of biomass resource, and an important hydraulic potential in Lebanon. This paper presents a review of the energy status of Lebanon, and illustrates a detailed review of the EDL structure with the existing problems and recommended solutions. In addition, scenarios reflecting implementation of policy projects are presented, and conclusions are drawn on the usefulness of a proposed evaluation methodology and the effectiveness of the adopted new energy policy for the electrical sector in Lebanon.Keywords: EdL Electricite du Liban, portfolio optimization, electricity generation mix, mean-variance approach
Procedia PDF Downloads 24713934 A Systematic Review of Street-Level Policy Entrepreneurship Strategies in Different Political Contexts
Authors: Hui Wang, Huan Zhang
Abstract:
This study uses systematic review and qualitative comparative analysis methods to comprehensively inquire about the recent street-level policy entrepreneurship research, to identify the characteristics and lessons we can learn from 20 years of street-level policy entrepreneurship literature, and the relations between political contexts and street-level policy entrepreneurs’ strategies. Using data from a systematic review of street-level policy entrepreneurship literature, we identify the sub-components of different political contexts and core strategies of street-level policy entrepreneurs and estimate the configurational relations between different political settings and street-level policy entrepreneurs’ strategies. Our results show that street-level policy entrepreneurs display social acuity, define the problem, and build team strategies when policy or political streams dominate. Street-level policy entrepreneurs will use lead-by-example strategies when both policy and political streams dominate. Furthermore, street-level policy entrepreneurs will use bureaucratic strategies, even if no stream dominates in the political context.Keywords: policy entrepreneurs, qualitative comparative analysis, street-level bureaucracy, systematic review
Procedia PDF Downloads 10913933 The Research of Weights Identify of Harbin Ecological Security Evaluation Index Based on AHP
Authors: Rong Guo, Mengshi Huang, Yujing Bai
Abstract:
With the rapid development of urbanization, the urban population increases and urban sprawl appeared. And these issues led to a sharp deterioration of the ecological environment. So, the urban ecological security evaluation was imminent. The weights identify of index was a key step of the research of ecological security evaluation. The AHP was widely used in the extensive research of weights identify of ecological security index. The characteristics of authority and quantitative can fully reflect the views of relevant experts. On the basis of building the ecological security evaluation index of Harbin, the paper combed and used the basic principle of the AHP, and calculated the weights of Harbin ecological security evaluation index through the process of the expert opinions “summary-feedback-summary”. And lay a foundation of future study of Harbin ecological security index, and guide the quantitative evaluation of Harbin ecological security.Keywords: AHP, ecological security, evaluation Index, weights identify, harbin
Procedia PDF Downloads 49413932 The Effects of Globalization on the Foreign Policy of the Islamic Republic of Iran in the 21st Century
Authors: Pouriya Angosht Baft, Farzan Safari Sabet
Abstract:
Globalization should be considered as a process that has affected all areas of human activity, including the foreign policy of countries. The phenomenon of globalization has created tremendous changes in the economic, political and cultural fields. Obviously, no country can keep itself away from the new global consequences and globalization process. Dealing with the world requires formulating a realistic and intelligent foreign policy. By examining the phenomenon of globalization and its impact on foreign policy, this article aims to provide solutions for formulating a more active and effective foreign policy. The conclusion of this research is that Iran's foreign policy has gradually moved towards more realism and maintaining and strengthening national interests in the changing world has been the focus of foreign policy makers and decision makers. Strengthening the course of more realism in the future should be at the center of formulating Iran's foreign policy.Keywords: globalization, foreign policy, international relations, realism, iran
Procedia PDF Downloads 5213931 Rules in Policy Integration, Case Study: Victoria Catchment Management
Authors: Ratri Werdiningtyas, Yongping Wei, Andrew Western
Abstract:
This paper contributes to on-going attempts at bringing together land, water and environmental policy in catchment management. A tension remains in defining the boundaries of policy integration. Most of Integrated Water Resource Management is valued as rhetoric policy. It is far from being achieved on the ground because the socio-ecological system has not been understood and developed into complete and coherent problem representation. To clarify the feature of integration, this article draws on institutional fit for public policy integration and uses these insights in an empirical setting to identify the mechanism that can facilitate effective public integration for catchment management. This research is based on the journey of Victoria’s government from 1890-2016. A total of 274 Victorian Acts related to land, water, environment management published in those periods has been investigated. Four conditions of integration have been identified in their co-evolution: (1) the integration policy based on reserves, (2) the integration policy based on authority interest, (3) policy based on integrated information and, (4) policy based coordinated resource, authority and information. Results suggest that policy coordination among their policy instrument is superior rather than policy integration in the case of catchment management.Keywords: catchment management, co-evolution, policy integration, phase
Procedia PDF Downloads 24613930 Basics of SCADA Security: A Technical Approach
Authors: Michał Witas
Abstract:
This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.Keywords: denial of service, SCADA, security policy, distributed network
Procedia PDF Downloads 37013929 Optimizing the Public Policy Information System under the Environment of E-Government
Authors: Qian Zaijian
Abstract:
E-government is one of the hot issues in the current academic research of public policy and management. As the organic integration of information and communication technology (ICT) and public administration, e-government is one of the most important areas in contemporary information society. Policy information system is a basic subsystem of public policy system, its operation affects the overall effect of the policy process or even exerts a direct impact on the operation of a public policy and its success or failure. The basic principle of its operation is information collection, processing, analysis and release for a specific purpose. The function of E-government for public policy information system lies in the promotion of public access to the policy information resources, information transmission through e-participation, e-consultation in the process of policy analysis and processing of information and electronic services in policy information stored, to promote the optimization of policy information systems. However, due to many factors, the function of e-government to promote policy information system optimization has its practical limits. In the building of E-government in our country, we should take such path as adhering to the principle of freedom of information, eliminating the information divide (gap), expanding e-consultation, breaking down information silos and other major path, so as to promote the optimization of public policy information systems.Keywords: China, e-consultation, e-democracy, e-government, e-participation, ICTs, public policy information systems
Procedia PDF Downloads 86213928 Industrial and Environmental Safety in the Integrated Security Policy of the Industry: A Corporation and an Enterprise
Authors: Vladimir A. Grachev
Abstract:
Today, in the context of rapidly developing technosphere and hourly emerging new technologies, the industrial and environmental safety issue is ever more pressing. The article is devoted to the relationship of social, environmental, and industrial policies with industrial safety, occupational health and safety, environmental safety, and environmental protection. The author assesses the up-to-day situation through system analysis and on the basis of the existing practices. A complex system of the policies implementation without "gaps" and missing links ensures preservation of human lives, health and a favorable living environment. The author demonstrates that absence of an "environmental safety" high-priority link can lead to a significant loss of human lives and health and the global changes in the environment. The role of implementing the environmental policy of enterprises and organizations, and of economic sectors in the implementation of national environmental policy is shown. It was established that the system for implementing environmental policy should be based on a system analysis.Keywords: environmental protection, environmental safety, industrial safety, occupational health and safety
Procedia PDF Downloads 21413927 Structured Tariff Calculation to Promote Geothermal for Energy Security
Authors: Siti Mariani, Arwin DW Sumari, Retno Gumilang Dewi
Abstract:
This paper analyzes the necessity of a structured tariff calculation for geothermal electricity in Indonesia. Indonesia is blessed with abundant natural resources and a choices of energy resources to generate electricity among other are coal, gas, biomass, hydro to geothermal, creating a fierce competition in electricity tariffs. While geothermal is inline with energy security principle and green growth initiative, it requires a huge capital funding. Geothermal electricity development consists of phases of project with each having its own financial characteristics. The Indonesian government has set a support in the form of ceiling price of geothermal electricity tariff by 11 U.S cents / kWh. However, the government did not set a levelized cost of geothermal, as an indication of lower limit capacity class, to which support is given. The government should establish a levelized cost of geothermal energy to reflect its financial capability in supporting geothermal development. Aside of that, the government is also need to establish a structured tariff calculation to reflect a fair and transparent business cooperation.Keywords: load fator, levelized cost of geothermal, geothermal power plant, structured tariff calculation
Procedia PDF Downloads 43913926 Sectoral Energy Consumption in South Africa and Its Implication for Economic Growth
Authors: Kehinde Damilola Ilesanmi, Dev Datt Tewari
Abstract:
South Africa is in its post-industrial era moving from the primary and secondary sector to the tertiary sector. The study investigated the impact of the disaggregated energy consumption (coal, oil, and electricity) on the primary, secondary and tertiary sectors of the economy between 1980 and 2012 in South Africa. Using vector error correction model, it was established that South Africa is an energy dependent economy, and that energy (especially electricity and oil) is a limiting factor of growth. This implies that implementation of energy conservation policies may hamper economic growth. Output growth is significantly outpacing energy supply, which has necessitated load shedding. To meet up the excess energy demand, there is a need to increase the generating capacity which will necessitate increased investment in the electricity sector as well as strategic steps to increase oil production. There is also need to explore more renewable energy sources, in order to meet the growing energy demand without compromising growth and environmental sustainability. Policy makers should also pursue energy efficiency policies especially at sectoral level of the economy.Keywords: causality, economic growth, energy consumption, hypothesis, sectoral output
Procedia PDF Downloads 46913925 Green Building Practices: Harmonizing Non-Governmental Organizations Roles and Energy Efficiency
Authors: Abimbola A. Adebayo, Kikelomo I. Adebayo
Abstract:
Green buildings provide serious challenges for governments all over the world with regard to achieving energy efficiency in buildings. Energy efficient buildings are needed to keep up with minimal impacts on the environment throughout their cycle and to enhance sustainable development. The lack of awareness and benefits of energy efficient buildings have given rise to NGO’s playing important role in filling data gaps, publicizing information, and undertaking awareness raising and policy engagement activities. However, these roles are countered by concerns about subsidies for evaluations, incentives to facilitate data-sharing, and incentives to finance independent research. On the basis of literature review on experiences with NGO’s involvement in energy efficient buildings, this article identifies governance strategies that stimulate the harmonization of NGO’s roles in green buildings with the objective to increase energy efficiency in buildings.Keywords: energy efficiency, green buildings, NGOs, sustainable development
Procedia PDF Downloads 23813924 The Fiscal-Monetary Policy and Economic Growth in Algeria: VECM Approach
Authors: K. Bokreta, D. Benanaya
Abstract:
The objective of this study is to examine the relative effectiveness of monetary and fiscal policy in Algeria using the econometric modelling techniques of cointegration and vector error correction modelling to analyse and draw policy inferences. The chosen variables of fiscal policy are government expenditure and net taxes on products, while the effect of monetary policy is presented by the inflation rate and the official exchange rate. From the results, we find that in the long-run, the impact of government expenditures is positive, while the effect of taxes is negative on growth. Additionally, we find that the inflation rate is found to have little effect on GDP per capita but the impact of the exchange rate is insignificant. We conclude that fiscal policy is more powerful then monetary policy in promoting economic growth in Algeria.Keywords: economic growth, monetary policy, fiscal policy, VECM
Procedia PDF Downloads 30913923 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies
Authors: Stefano Fantin
Abstract:
The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.Keywords: cybersecurity, vulnerability, European Union, Japan
Procedia PDF Downloads 15613922 Concept, Modules and Objectives of the Syllabus Course: Small Power Plants and Renewable Energy Sources
Authors: Rade M. Ciric, Nikola L. J. Rajakovic
Abstract:
This paper presents a curriculum of the subject small power plants and renewable energy sources, dealing with the concept of distributed generation, renewable energy sources, hydropower, wind farms, geothermal power plants, cogeneration plants, biogas plants of agriculture and animal origin, solar power and fuel cells. The course is taught the manner of connecting small power plants to the grid, the impact of small generators on the distribution system, as well as economic, environmental and legal aspects of operation of distributed generators.Keywords: distributed generation, renewable energy sources, energy policy, curriculum
Procedia PDF Downloads 35513921 Towards Security in Virtualization of SDN
Authors: Wanqing You, Kai Qian, Xi He, Ying Qian
Abstract:
In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.Keywords: SDN, network, virtualization, security
Procedia PDF Downloads 42713920 A Systematic Literature Review on Security and Privacy Design Patterns
Authors: Ebtehal Aljedaani, Maha Aljohani
Abstract:
Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns
Procedia PDF Downloads 13113919 Exploring Coordination between Monetary and Macroprudential Policies Using a Monetary Policy Procyclicality Ratio
Authors: Lukasz Kurowski, Paweł Smaga
Abstract:
We explore the procyclicality of monetary policy decisions towards the financial cycle in the 1995−2015 period on a sample of six central banks. Using interest rate paths and the credit-to-GDP gap to construct a monetary policy procyclicality ratio, we provide evidence that monetary policy procyclicality was high in BoE and CNB and low in Riksbank and ECB. The results support the need for coordination between macroprudential and monetary policies, for example, by including financial stability considerations to the inflation targeting strategy.Keywords: central bank, financial stability, macroprudential policy, monetary policy
Procedia PDF Downloads 37113918 A Migration Policy Gone Wrong: A Study on How the Encampment Policy Undermines Refugees’ Potentials and Fails Local Economy: A Case of East Africa
Authors: John Bosco Ngendakurio
Abstract:
The key question this paper asks is, ‘how does the refugee encampment policy undermine refugees’ potentials and fail local economy in East African countries?’ It is important to develop a full understanding of the legacies of the encampment policy for refugees’ performances economically, socially, and politically. The negative impacts of the encampment policy include the lack of participation or access to opportunities outside the refugee camps such as employment, education, and local integration, unfair imprisonments and constant alienation of refugees, mental and physical health issues, just to name a few. Evidence suggests that refugee camps in East Africa have progressively become open detention centres due to their designs, their locations, and movement restrictions imposed on refugees. Such restrictions in a region that hosts millions of refugees do not only undermine refugees’ potentials, but it also hurts the local economy- host countries miss out in many ways. Outlining the negative impacts of the encampment policy will enable governments and relevant non-governmental actors, including policymakers, to re-consider this policy with the aim to improve refugees’ participation and contributions in the broader society, promote socially cohesive practices, and help millions of refugees gain independence and reach their potentials financially, socially and politically, finally and truly giving the voice to the voiceless. The encampment policy undermines the general human security in East Africa, and it is one of the migration practices showcasing East African governments’ lack of will to protect human rights, especially within the most vulnerable population groups such as refugees.Keywords: migration policy, immigration, refugees, encampment, migration, integration, social cohesion
Procedia PDF Downloads 13013917 A Holistic Approach to Institutional Cyber Security
Authors: Mehmet Kargaci
Abstract:
It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.Keywords: cyber defence, information, critical infrastructure, security
Procedia PDF Downloads 53613916 Secure Watermarking not at the Cost of Low Robustness
Authors: Jian Cao
Abstract:
This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)
Procedia PDF Downloads 38213915 Inventory Policy with Continuous Price Reduction in Solar Photovoltaic Supply Chain
Authors: Xiangrong Liu, Chuanhui Xiong
Abstract:
With the concern of large pollution emissions from coal-fired power plants and new commitment to green energy, global solar power industry was emerging recently. Due to the advanced technology, the price of solar photovoltaic(PV) module was reduced at a fast rate, which arose an interesting but challenge question to solar supply chain. This research is modeling the inventory strategies for a PV supply chain with a PV manufacturer, an assembler and an end customer. Through characterizing the manufacturer's and PV assembler's optimal decision in decentralized and centralized situation, this study shed light on how to improve supply chain performance through parameters setting in the contract design. The results suggest the assembler to lower the optimal stock level gradually each period before price reduction and set up a newsvendor base-stock policy in all periods after price reduction. As to the PV module manufacturer, a non-stationary produce-up-to policy is optimal.Keywords: photovoltaic, supply chain, inventory policy, base-stock policy
Procedia PDF Downloads 34813914 Developing a Viral Artifact to Improve Employees’ Security Behavior
Authors: Stefan Bauer, Josef Frysak
Abstract:
According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.Keywords: information security awareness, delivery methods, viral videos, employee security behavior
Procedia PDF Downloads 541