Search results for: Islamic social security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12432

Search results for: Islamic social security

10362 Cybersecurity Protection Structures: The Case of Lesotho

Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule

Abstract:

The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.

Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team

Procedia PDF Downloads 163
10361 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.

Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis

Procedia PDF Downloads 105
10360 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network

Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono

Abstract:

There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.

Keywords: Bayesian network, decision analysis, national security system, text mining

Procedia PDF Downloads 395
10359 The Study of Factors Affecting Social Responsibility among Undergraduate Students of the Faculty of Management Science, Suan Sunandha Rajabhat University

Authors: Somtop Keawchuer

Abstract:

The purpose of the research is to study the level of social responsibility among the undergraduate students of the faculty of Management Science, Suan Sunandha Rajabhat University. The research also studies the factors affecting social responsibility of the undergraduate students. The research methodology applied a self-administered questionnaire as a quantitative method. A convenience sampling was used to distribute the questionnaire. Finally, 350 questionnaires were received for data analysis. Data were analyzed by using descriptive statistics including percentage, mean, standard deviation, and inferential statistics including regression analysis for hypothesis testing. The results indicated that the level of social responsibility of the students was at a good level. In addition, internal and external factors were related to social responsibility of the undergraduate students with the statistical significance level of 0.05.

Keywords: internal and external factors, social responsibility, Suan Sunandha Rajabhat University, undergraduate students

Procedia PDF Downloads 277
10358 The Management Accountant’s Roles for Creation of Corporate Shared Value

Authors: Prateep Wajeetongratana

Abstract:

This study investigates the management accountant’s roles that link with the creation of corporate shared value to enable more effective decision-making and improve the information needs of stakeholders. Mixed method is employed to collect using triangulation for credibility. A quantitative approach is employed to conduct a survey of 200 Thai companies providing annual reports in the Stock Exchange of Thailand. The results of the study reveal that environmental and social data incorporated in a corporate social responsibility (CSR) disclosure are based on the indicators of the Global Reporting Initiatives (GRI) at a statistically significant level of 0.01. Environmental and social indicators in CSR are associated with environmental and social data disclosed in the annual report to support stakeholders’ and the public’s interests that are addressed and show that a significant relationship between environmental and social in CSR disclosures and the information in annual reports is statistically significant at the 0.01 level.

Keywords: corporate social responsibility, creating shared value, management accountant’s roles, stock exchange of Thailand

Procedia PDF Downloads 227
10357 Social Work in Rehabilitation: Improving Practice Through Action Research

Authors: Poglajen Andrej, Malečihar Špela

Abstract:

Social work in rehabilitation needs constant development and embetterment of its practitioners. This became even more evident during the covid pandemic at times when outside sources of help, care and support were non-existent, or the access to such sources was severely limited. Social workers are, at our core, researchers of the rehabilitated world – from a personal and intrapersonal to a systematic perspective. This is also why a method of research was used in order to see if clinical social work practice can be further improved. The first stage of research showcased how action research and social work practice share many of the core values, whereas the Implementation of the new behaviour principle was severely lacking and thus became the main focus of the follow-up research. Twenty randomly selected case files of clinical social work practice in rehabilitation were qualitatively analyzed and potential benefits of action research on practice were assessed in the process of intervention while also getting feedback of the usefulness by the patients themselves using pre and post evaluation forms where a mixed-method approach was used. Implementation of new behaviour principle was recognized as a potential, improving factor of clinical social work practice in most analyzed cases, while it wasn’t deemed necessary in all of them. Potential improvements of newly implemented behaviour span across different areas of life and were also noted in the feedback from the rehabilitates. Despite the benefits of practice embetterment, the inclusion and focus on Implementation of new behaviour principle also caused additional workload, lack of time and stressful situations for the practitioners, which showcased the need to address certain systemic obstacles in the context of social work in healthcare in Slovenia.

Keywords: action research, practice, rehabilitation, social work

Procedia PDF Downloads 164
10356 Examining The Effects of Parenting Style and Parents’ Social Attitudes on Social Development in Early Childhood

Authors: Amber Lim, Ted Ruffman

Abstract:

A vast amount of research evidence indicates that children develop social attitudes that are similar to those of their parents. When using general measures of social attitudes, such as social dominance orientation (SDO), right-wing authoritarianism (RWA), and prejudice, studies show that parents' and children’s attitudes were correlated. However, the mechanisms behind the intergenerational transmission of attitudes remain largely unexplained. Since it was speculated that the origins of RWA could be traced back to one’s relationship with their parents, the aim of this study was to assess how parents’ social attitudes and parenting behavior are related to children’s social development. One line of research suggests that the different ways in which authoritarian and authoritative parents reason with their children may impact Theory of Mind (ToM) development. That is, inductive discipline (e.g., emphasising how the child’s actions affect others) facilitates empathy and ToM development. Conversely, past evidence shows that children have poorer ToM development when parents enforce rules without explanation. Thus, this study addresses the question of how parent behavior plays a role in the gradual acquisition of a ToM and social attitudes. Seventy parents reported their social attitudes, parenting behavior, and their child’s mental state and non-mental state vocabulary. Their children were given ToM and perspective-taking tasks, along with a friend choice task to measure racial bias and anti-fat bias. As hypothesised, parents’ use of inductive reasoning correlated with children’s performance on Theory of Mind tasks. Mothers’ inductive reasoning facilitated children’s acquisition of mental state vocabulary. Parents’ autonomy granting was associated with improved mental state vocabulary. Authoritarian parenting traits such as verbal hostility were linked to children’s racial bias. These findings highlight the importance of parent-child discussion in shaping children’s social understanding.

Keywords: parenting style, prejudice, social attitudes, social understanding, theory of mind

Procedia PDF Downloads 85
10355 Dependency on Social Media and Psychological Well-Being among Young Adults: Case Study of University Students in Pakistan

Authors: Ghazala Yasmeen, Zahid Yousaf

Abstract:

Frequent social media use has significantly changed people's life and communication styles during the last two decades. Social media use has multiple dimensions, and there are nuanced relationships between it and how it affects different societal subgroups. With the increased popularity and rapid growth of social networking sites, people are experiencing potential social media addiction, which causes severe mental health problems. How social media is dramatically influencing the lives and mental health of its users, and particularly of the students, creating psychological issues, e.g., isolation, depression, and anxiety, will be the primary objective of this study. This research will address the problems confronted by many students who are regular social media users and can undergo mental distress. This study aims to explore how social media use can lead to isolation, depression, and anxiety. This research will also investigate the effects of cyber-bullying on social, emotional, and psychological wellbeing. For this purpose, the researcher will use the survey technique as a method of inquiry. Ryff's theory of Psychological wellbeing will be used as a theoretical framework to explore the association between social media addiction and psychological effects among users. For data collection, the researcher will use the quantitative research method through a survey questionnaire from three universities in Pakistan from the public and private sectors. This study will imply a two-stage random sampling technique. At first, the researcher will select 20% of students from universities. In the second stage, 20% of students using different social networking sites will be chosen, and draw a representative sample from these will be. The intended study will use questionnaires comprising two portions. The first section will consist of social media engagement by the students, following impacts on their mental health and reported attitude towards psychological wellbeing. This study will spotlight the considerations of parents, educationists, and policymakers to take measures against the devastating effects of cyber-crimes on young adults.

Keywords: anxiety, depression, isolation, social media, wellbeing

Procedia PDF Downloads 84
10354 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 166
10353 Facilitating Familial Support of Saudi Arabians Living with HIV/AIDS

Authors: Noor Attar

Abstract:

This paper provides an overview of the current situation of HIV/AIDS patients in the Kingdom of Saudi Arabia (KSA) and a literature review of the concepts of stigma communication, communication of social support. These concepts provide the basis for the proposed methods, which will include conducting a textual analysis of materials that are currently distributed to family members of people living with HIV/AIDS (PLWHIV/A) in KSA and creating an educational brochure. The brochure will aim to help families of PLWHIV/A in KSA (1) understand how stigma shapes the experience of PLWHIV/A, (2) realize the role of positive communication as a helpful social support, and (3) develop the ability to provide positive social support for their loved ones.

Keywords: HIV/AIDS, Saudi Arabia, social support, stigma communication

Procedia PDF Downloads 289
10352 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 145
10351 Inspiring Woman: The Emotional Intelligence Leadership of Khadijah Bint Khuwaylid

Authors: Eman S. Soliman, Sana Hawamdeh, Najmus S. Mahfooz

Abstract:

Purpose: The purpose of this paper was to examine various components of applied emotional intelligence as demonstrated in the leadership style of Khadijah Bint Khuwaylid in pre and post-Islamic society. Methodology: The research used a qualitative research method, specifically historical and ethnographic techniques. Data collection included both primary and secondary sources. Data from sources were analyzed to document the use of emotional intelligent leadership behaviors throughout Khadijah Bint Khuwaylid leadership experience from 596 A.D. to 621 A.D. Findings: Demonstration of four cornerstones of emotional intelligence which are self-awareness, self-management, social awareness and relationship management. Apply them on khadejah Bint Khuwaylid leadership style reveal that she possess main behavioral competences in the form of emotionally self-aware, self-.confidence, adaptability, empathy and influence. Conclusions: Khadijah Bint Khuwaylid serves as a historical model of effective leadership that included the use of emotional intelligence in her leadership behavior. The inclusion of the effective portion of the brain created a successful leadership style that can be learned by present day and future leadership. The recommendations for future leaders are to include the use of emotionally self-aware and self-confidence, adaptability, empathy and influence as components of leadership. This will then demonstrate in a leadership a basic knowledge and understanding of feelings, the keenness to be emotionally open with others, the ability to prototype beliefs and values, and the use of emotions in future communications, vision and progress.

Keywords: emotional intelligence, leadership, Khadijah Bint Khuwaylid, women

Procedia PDF Downloads 281
10350 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks

Authors: C. N. Vanitha, M. Usha

Abstract:

In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.

Keywords: neural networks, pattern learning, security, wireless sensor networks

Procedia PDF Downloads 408
10349 Analysis of the Evolution of Social and Economic Indicators of the Mercosur´s Members: 1980-2012

Authors: L. Aparecida Bastos, J. Leige Lopes, J. Crepaldi, R. Monteiro da Silva

Abstract:

The objective of this study is to analyze the evolution of some social and economic indicators of Mercosur´s economies from 1980 to 2012, based on the statistics of the Latin American Integration Association (LAIA). The objective is to observe if after the accession of these economies to Mercosur (the first accessions occurred in 1994) these indicators showed better performance, in order to demonstrate if economic integration contributed to improved trade, macroeconomic performance, and level of social and economic development of member countries. To this end, the methodologies used will be a literature review and descriptive statistics. The theoretical framework that guides the work are the theories of Integration: Classical Liberal, Marxist and structural-proactive. The results reveal that most social and economic indicators showed better performance in those economies that joined Mercosur after 1994. This work is the result of an investigation already completed.

Keywords: economic integration, Mercosur, social indicators, economic indicators

Procedia PDF Downloads 303
10348 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process

Authors: Itai Kohavi, Wojciech Nowiak

Abstract:

This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.

Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation

Procedia PDF Downloads 307
10347 Child Rearing Styles and Family Communication Patterns among University Students

Authors: Pegah Farokhzad

Abstract:

Family is a basic unit of the society and the main source of human development. The initial aim of the family is psychological and social support of its members and has special developmental stages. Researches show the families who have less cohesion, have more conflicts and maladjustments and the members of such families are not able to communicate effectively. Family is a system in which any inter communication is related to child rearing patterns and can affect it. Even the child rearing styles in childhood can determine the family communications in adulthood. Therefore, the aim of the present research was to examine the relationship between child-rearing styles including authoritative, authoritarian and permissive with dimensions of family communication patterns including the conversation and conformity. The research design was a correlational and the population consisted of the psychology students of Roudehen Islamic Azad University who were studying in academic year 2013-2014. A sample of 324 students were selected randomly from the population. The research tools were the Baumrind Child-rearing Questionnaires and Family Communication Patterns Inventory, The Revised Scale of Koerner and Fitzpatrick. The results were: (a) There was a positive and significant relationship between conversation orientation and authoritative style. (b) There was no significant relationship between conversation orientation and other child-rearing styles. (c) There was a negative significant relationship between conformity orientation and authoritative style. (d) There was a positive significant relationship between conformity orientation with authoritarian and permissive styles. (e) There was a significant relationship between 3 dimensions of child-rearing and communication patterns.

Keywords: child-rearing styles, family relationship patterns, university students, Iran

Procedia PDF Downloads 511
10346 Metaphysical and Mystical Viewpoints of Roozbihan Baqli Shirazi on the Quran

Authors: Seyed Abdol Majid Hosseinizadeh

Abstract:

This study aims at an assessment of the part of interpretational issues on the Quran in Roozbihan Baqli Shirazi's books, who has been a mystic and Sufi in the 12th century. He has written many mystical books which Henry Corbin and others have introduced and researched, especially his commentary on the Quran called Ara'is al-Bayan, but he also has other interpretational viewpoints on the Quran spread throughout his mystical works, which have not been considered. In this paper, it has been shown through a documentary method that Quranic verses and their interpretations also have a great role in his other works.

Keywords: interpretation, Islamic mysticism, Quran, Roozbihan Baqli Shirazi

Procedia PDF Downloads 261
10345 Social Integration of Visually Impaired Persons in Georgia

Authors: Vakhtang Nozadze, Luiza Arutinova, Khatuna Martskvishvili

Abstract:

The social empowerment of most needed individuals is a challenging issue, especially for developing countries. The current study explores the effects of visual impairment on individuals’ satisfaction with different aspects of life (i.e. education, job, income, family) and coping strategies. Furthermore, the difference between groups according to health status is revealed. Other demographic variables (education, employment, and marital status) is also considered. The cross-sectional design and self-reported questionnaires were adopted. Seventy-two visually impaired males and females (age range 13-66) and seventy healthy individuals participated in the study. The results reveal the importance of health status on the accessibility of social amenities, individuals’ satisfaction with life, and a diversity of coping strategies, irrespective of the age. The research has an important implication for social integration research and policy.

Keywords: coping strategies, life satisfaction, social integration, visual impairment

Procedia PDF Downloads 335
10344 Connotation Reform and Problem Response of Rural Social Relations under the Influence of the Earthquake: With a Review of Wenchuan Decade

Authors: Yanqun Li, Hong Geng

Abstract:

The occurrence of Wenchuan earthquake in 2008 has led to severe damage to the rural areas of Chengdu city, such as the rupture of the social network, the stagnation of economic production and the rupture of living space. The post-disaster reconstruction has become a sustainable issue. As an important link to maintain the order of rural social development, social network should be an important content of post-disaster reconstruction. Therefore, this paper takes rural reconstruction communities in earthquake-stricken areas of Chengdu as the research object and adopts sociological research methods such as field survey, observation and interview to try to understand the transformation of rural social relations network under the influence of earthquake and its impact on rural space. It has found that rural societies under the earthquake generally experienced three phases: the break of stable social relations, the transition of temporary non-normal state, and the reorganization of social networks. The connotation of phased rural social relations also changed accordingly: turn to a new division of labor on the social orientation, turn to a capital flow and redistribution in new production mode on the capital orientation, and turn to relative decentralization after concentration on the spatial dimension. Along with such changes, rural areas have emerged some social issues such as the alienation of competition in the new industry division, the low social connection, the significant redistribution of capital, and the lack of public space. Based on a comprehensive review of these issues, this paper proposes the corresponding response mechanism. First of all, a reasonable division of labor should be established within the villages to realize diversified commodity supply. Secondly, the villages should adjust the industrial type to promote the equitable participation of capital allocation groups. Finally, external public spaces should be added to strengthen the field of social interaction within the communities.

Keywords: social relations, social support networks, industrial division, capital allocation, public space

Procedia PDF Downloads 160
10343 The South African Polycentric Water Resource Governance-Management Nexus: Parlaying an Institutional Agent and Structured Social Engagement

Authors: J. H. Boonzaaier, A. C. Brent

Abstract:

South Africa, a water scarce country, experiences the phenomenon that its life supporting natural water resources is seriously threatened by the users that are totally dependent on it. South Africa is globally applauded to have of the best and most progressive water laws and policies. There are however growing concerns regarding natural water resource quality deterioration and a critical void in the management of natural resources and compliance to policies due to increasing institutional uncertainties and failures. These are in accordance with concerns of many South African researchers and practitioners that call for a change in paradigm from talk to practice and a more constructive, practical approach to governance challenges in the management of water resources. A qualitative theory-building case study through longitudinal action research was conducted from 2014 to 2017. The research assessed whether a strategic positioned institutional agent can be parlayed to facilitate and execute WRM on catchment level by engaging multiple stakeholders in a polycentric setting. Through a critical realist approach a distinction was made between ex ante self-deterministic human behaviour in the realist realm, and ex post governance-management in the constructivist realm. A congruence analysis, including Toulmin’s method of argumentation analysis, was utilised. The study evaluated the unique case of a self-steering local water management institution, the Impala Water Users Association (WUA) in the Pongola River catchment in the northern part of the KwaZulu-Natal Province of South Africa. Exploiting prevailing water resource threats, it expanded its ancillary functions from 20,000 to 300,000 ha. Embarking on WRM activities, it addressed natural water system quality assessments, social awareness, knowledge support, and threats, such as: soil erosion, waste and effluent into water systems, coal mining, and water security dimensions; through structured engagement with 21 different catchment stakeholders. By implementing a proposed polycentric governance-management model on a catchment scale, the WUA achieved to fill the void. It developed a foundation and capacity to protect the resilience of the natural environment that is critical for freshwater resources to ensure long-term water security of the Pongola River basin. Further work is recommended on appropriate statutory delegations, mechanisms of sustainable funding, sufficient penetration of knowledge to local levels to catalyse behaviour change, incentivised support from professionals, back-to-back expansion of WUAs to alleviate scale and cost burdens, and the creation of catchment data monitoring and compilation centres.

Keywords: institutional agent, water governance, polycentric water resource management, water resource management

Procedia PDF Downloads 144
10342 Public Squares and Their Potential for Social Interactions: A Case Study of Historical Public Squares in Tehran

Authors: Asma Mehan

Abstract:

Under the thrust of technological changes, population growth and vehicular traffic, Iranian historical squares have lost their significance and they are no longer the main social nodes of the society. This research focuses on how historical public squares can inspire designers to enhance social interactions among citizens in Iranian urban context. Moreover, the recent master plan of Tehran demonstrates the lack of public spaces designed for the purpose of people’s social gatherings. For filling this gap, first the current situation of 7 selected primary historical public squares in Tehran including Sabze Meydan, Arg, Topkhaneh, Baherstan, Mokhber-al-dole, Rah Ahan and Hassan Abad have been compared. Later, the influencing elements on social interactions of the public squares such as subjective factors (human relationships and memories) and objective factors (natural and built environment) have been investigated. As a conclusion, some strategies are proposed for improving social interactions in historical public squares like; holding cultural, national, athletic and religious events, defining different and new functions in public squares’ surrounding, increasing pedestrian routs, reviving the collective memory, demonstrating the historical importance of square, eliminating visual obstacles across the square, organization the natural elements of the square, appropriate pavement for social activities. Finally, it is argued that the combination of all influencing factors which are: human interactions, natural elements and built environment criteria will lead to enhance the historical public squares’ potential for social interaction.

Keywords: historical square, Iranian public square, social interaction, Tehran

Procedia PDF Downloads 410
10341 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks

Authors: Afnan Al-Romi, Iman Al-Momani

Abstract:

The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.

Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN

Procedia PDF Downloads 327
10340 The Special Testimony as a Methodology for Social Workers to Ensure the Rights of Children and Adolescents Who Are Victims of Sexual Violence

Authors: Natany Rodrigues De Carvalho, Denise Bomtempo Birche De Carvalho

Abstract:

The purpose of this study is to analyze the Special Testimony as a methodology for social workers to ensure the rights of children and adolescents who are victims of sexual violence. The specific objectives are: a) to contextualize, through the specialized literature, the social history of childhood and adolescence; b) to investigate, in the scientific literature, the sexual violence against children and adolescents as an analytical category; c) identify, with the social workers, if there is any defense of children and adolescents in the special testimony. To answer the research objectives we use qualitative research, in three axes that complement each other: a) participant observation through the insertion in the research field (supervised internship I and II); b) survey of literature on the subject; c) semi-structured interviews with social workers of the TJDFT. We used content analysis to systematize and interpret the collected data. The results of the research were organized into three chapters with the following contents: a) literature review, contextualizing the social history of childhood and adolescence to the present; b) sexual violence against children and adolescents and their categories of analysis; c) understanding of the special testimony in the Federal District and Territories in guaranteeing the rights of children and adolescents, identifying their main points from the perspective of social workers. The results showed how the lack of interdisciplinarity in the Special Testimony can lead to the non-integral protection of children and adolescents victims of sexual violence.

Keywords: childhood and adolescence, sexual violence, special testimony, social work

Procedia PDF Downloads 324
10339 Materiality of Gender Roles in Gede City State

Authors: David Maina Muthegethi

Abstract:

For decades, archaeological work of Swahili Civilization has mainly concentrated on exploration of economic and political dynamics of City states. This paper moves further and explore how gender roles were formed, maintained, negotiated and re-negotiated through time and space in Gede City. Unlike other Swahili city states, Gede was located around two miles away from the shores of Indian Ocean. Nonetheless, the city was characterized by security walls, stone houses, mosques and tombs typical of Swahili City states such as Kilwa. The study employed several methods of data collection namely: archival research, survey, re-examination of collected materials and excavation of Gede archaeological site. Since, the study aimed to examine gender roles across different social class, a total of three houses were excavated based on their social hierarchy. Thus, the houses were roughly categorized as belonging to elites, middle class and lower class. The house were located in the inner wall, second inner wall and the outer wall of Gede City respectively. Key findings shows that gender roles differed considerably along classes in Gede archaeological site. For instance, the women of the elite and middle class were active participants in Gede international trade through production and consumption of imported goods. This participation corresponded with commercialization of Gede households especially in elite’ areas where they hosted international traders. On the other hand, the middle class houses, women concentrated on running of light industries aimed at supplying goods for the urban community. Thus, they were able to afford exotic goods as their elites counterparts. Lastly, the gender roles of lower class entailed subsistence gender roles with little participation in Gede formal commerce. Interestingly, gender roles in Gede were dynamic in nature and response to cultural diffusion, spread of Islam, intensification of trade, diversification of subsistence patterns and urbanization. Therefore, this findings, demonstrate centrality of gender in reconstruction of social lives of Swahili Civilization.

Keywords: gender roles, Islam, Swahili civilization, urbanization

Procedia PDF Downloads 97
10338 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration

Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu

Abstract:

This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.

Keywords: migration, border, security, memory effect

Procedia PDF Downloads 95
10337 New Subculture in Social Media

Authors: Maryam Mousivand

Abstract:

Subculture is one of the important concepts in social sciences and the field of cultural studies, which falls under the huge concept of culture. In general, subculture is a kind of movement and experience of collective resistance that is manifested by a population as a reaction against the acceptance of official identities approved by custom and society. Subcultures exist in the virtual world in the new era, and they emerged in various forms, such as the emergence of a subculture under common concepts and interests in the form of sites, channels, and groups of virtual space, which will be discussed in this article.

Keywords: subculture, social media, cultural studies, culture

Procedia PDF Downloads 124
10336 Centering Critical Sociology for Social Justice and Inclusive Education

Authors: Al Karim Datoo

Abstract:

Abstract— The presentation argues for an urgent case to center and integrate critical sociology in enriching potency of educational thought and practice to counteract inequalities and social injustices. COVID phenomenon has starkly exposed burgeoning of social-economic inequalities and widening marginalities which have been historically and politically constructed through deep-seated social and power imbalances and injustices in the world. What potent role could education possibly play to combat these issues? A point of departure for this paper highlights increasing reductionist and exclusionary ‘mind-set’ of education that has been developed through trends in education such as: the commodification of knowledge, standardisation, homogenization, and reification which are products of the positivist ideology of knowledge coopted to serve capitalist interests. To redress these issues of de-contextualization and de-humanization of education, it is emphasized that there is an urgent need to center the role of interpretive and critical epistemologies and pedagogies of social sciences. In this regard, notions of problem-posing versus problem-solving, generative themes, instrumental versus emancipatory reasoning will be discussed. The presentation will conclude by illustrating the pedagogic utility of these critically oriented notions to counteract the social reproduction of exclusionary and inequality in and through education.

Keywords: Critical pedagogy, social justice, inclusion , education

Procedia PDF Downloads 116
10335 In Search of a Safe Haven-Sexual Violence Leading to a Change of Sexual Orientation

Authors: Medagedara Kaushalya Sewwandi Supun Gunarathne

Abstract:

This research explores the underlying motivations and consequences of individuals changing their sexual orientation as a response to sexual violence. The primary objective of the study is to unravel the psychological, emotional, and social factors that drive individuals, akin to Celie in Alice Walker’s ‘The Color Purple’, to contemplate and undergo changes in their sexual orientation following the trauma of sexual violence. Through an analytical and qualitative approach, the study employs in-depth textual and thematic analyses to scrutinize the complex interplay between sexual orientation and violence within the selected text. Through a close examination of Celie’s journey and experiences, the study reveals that her decision to switch sexual orientation arises from a desire for a more favorable and benevolent relationship driven by the absence of safety and refuge in her previous relationships. By establishing this bond between sexual orientation and violence, the research underscores how sexual violence can lead individuals to opt for a change in their sexual orientation. The findings highlight Celie’s transformation as a means to seek solace and security, thus concluding that sexual violence can prompt individuals to alter their sexual orientation. The ensuing discussion explores the implications of these findings, encompassing psychological, emotional, and social consequences, as well as the societal and cultural factors influencing the perception of sexual orientation. Additionally, it sheds light on the challenges and stigma faced by those who undergo such transformations. By comprehending the complex relationship between sexual violence and the decision to change sexual orientation, as exemplified by Celie in ‘The Color Purple’, a deeper understanding of the experiences of survivors who seek a safe haven through altering their sexual orientation can be attained.

Keywords: sexual violence, sexual orientation, refuge, transition

Procedia PDF Downloads 83
10334 Emotional Impact and Moral Panic in Swedish Social Media during the COVID-19 Crisis

Authors: Sophia Yakhlef

Abstract:

In spring 2020, the spread of coronavirus disease 2019 (COVID-19) reached the epidemiological criteria to be declared a global pandemic. Global action was taken in order to stop the spread of the virus, such as, for example, restrictions regarding spending time outside of your home and, in several countries, periods of mandatory quarantine. Sweden's method of handling the pandemic has stood out among other European nations, and the tactic of relying on citizens' sense of civic solidarity, rather than enforcing legal restrictions preventing people from spending time outside, has been highly criticised in international news media. This situation has entailed a moral dilemma concerning the proper conduct of behaviour in everyday situations in Sweden, which is also reflected in public news media and social media. This media study focuses on Swedish social media debates and attitudes concerning moral dilemmas of handling this sense of civic solidarity. Comments on social media forums expressing outrage and anger regarding, amongst others, the actions of public media figures (such as celebrities, journalists, and bloggers) are analyzed. Drawing on a social psychological perspective on emotions, the study identifies ambiguities of moral disagreements and moral panics as ways of expressing that a moral norm has been violated. The findings suggest that social media is used in order to handle such ambiguities and make sense of the loosely defined norms of civic solidarity.

Keywords: COVID-19 crisis, moral disagreements, moral panic, social media, social norms, social psychology, Sweden

Procedia PDF Downloads 130
10333 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 257