Search results for: income security
2225 The Fight against Terrorist Radicalization: A French Perspective
Authors: Julia Burchett
Abstract:
After France became the target of an increasing number of terrorist attacks committed by people who have been declared ‘radicalized’, the issue of radicalization has become the main component of the national Action Plan for the Prevention of terrorism, thus stressing the need to address the roots causes of this peril. Therefore, the aim of this research paper is to provide a preliminary review of Frances’s strategy in the fight against terrorist radicalization in order to point out the challenges posed by this phenomenon while also highlighting its contemporary version and the understanding the results. In this regard, it should not be forgotten that the process of radicalization does not always lead to a terrorist act. To this end, the French legal framework that applies to radicalization coupled with the judicial response provided by the National Court will be analyzed in the light of the need for a balance between the concern for security and the protection of fundamental freedoms.Keywords: criminal law, France, fundamental freedoms, radicalization, terrorism
Procedia PDF Downloads 4302224 Analyzing Soviet and Post-Soviet Contemporary Russian Foreign Policy by Applying the Theory of Political Realism
Authors: Simon Tsipis
Abstract:
In this study, we propose to analyze Russian foreign policy conduct by applying the theory of Political Realism and the qualitative comparative method of analysis. We find that the paradigm of Political Realism supplies us with significant insights into the sources of contemporary Russian foreign policy conduct since the power factor was and remains an integral element in Russian foreign policies, especially when we apply comparative analysis and compare it with the behavior of its Soviet predecessor. Through the lens of the Realist theory, a handful of Russian foreign policy-making becomes clearer and much more comprehensible.Keywords: realism, Russia, cold war, Soviet Union, European security
Procedia PDF Downloads 1172223 Community Based Tourism and Development in Third World Countries: The Case of the Bamileke Region of Cameroon
Authors: Ngono Mindzeng Terencia
Abstract:
Community based tourism, as a sustainable tourism approach, has been adopted as a tool for development among local communities in third world countries with income generation as the main driver. However, an analysis of community based tourism and development brings to light another driving force which is paramount to development strategies in the difficult conditions of third world countries: this driving force is “place revitalization”. This paper seeks to assess the relevance of “place revitalization” to the enhancement of development within the challenging context of developing countries. The research provides a community based tourism model to development in third world countries through a three step process based on awareness, mentoring and empowerment at the local level. It also tries to examine how effectively this model can address the development problems faced by the local communities of third world countries. The case study for this research is the Bamiléké region of Cameroon, the breeding ground of community based tourism initiatives and a region facing the difficulties of third world countries that are great impediments to community based tourism.Keywords: awareness, empowerment, local communities, mentoring, place revitalization, third world countries
Procedia PDF Downloads 3182222 The Concept of Equal Pay: Analyzing the Presence of Inequality in the Hospitality Sector with the Perspective of Employees in Gujarat, India
Authors: Vedi Goenka
Abstract:
Inequality refers to unequal treatment or perceptions of individuals based on any particular trait. It arises from differences in socially constructed roles. Women are usually characterized as inferior and weak, who are dependent on their male counterparts. Even though it is claimed that both the genders have been given equal rights, inequality has always been prevalent in the Indian society, from personal to the professional front. There are different types of inequality that persist in the corporate world such as age inequality, gender inequality, tenure inequality and so on. Consequently, wage inequality occurs when employees are equally qualified and perform the same task but, one group of employees is paid more than the other. The hospitality sector is one of the emerging sectors in Gujarat which also experiences a lot of organizational dynamics. The proposed paper focuses on the concept of equal pay which states that pay should be based on the kind and quality of work done and not according to any other aspects. An exploratory attempt to understand the existence of inequality in the Hospitality sector on the basis of income is made in this research. The myth that wage discrimination has always favored men over similarly qualified women is analyzed in this research paper. A structured survey of a sample, representative of the employees of the Hospitality sector is being carried out in this study. An attempt to keep the effects of the environmental factors to a minimum level is made.Keywords: equal pay, human resources, hospitality sector, inequality, perspective, wage structure
Procedia PDF Downloads 1822221 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester
Procedia PDF Downloads 1482220 Perception of Nursing Care of Patients in a University Hospital
Authors: Merve Aydin, Mağfiret Kara Kaşikçi
Abstract:
Aim: To determine the perceptions of inpatients about care at Farabi Hospital in KTU. Material and Method: This research was conducted by using the universe known examples of formulas and probability selected by sampling method with 277 chosen patients in the hospital at least 14 days in other internal and surgical clinics except for pediatric, psychiatry, and intensive care unit services between January-March 2014 in KTU Farabi Hospital. The data was collected through the forms of nursing care perception scale of patients and defining characteristics of patients. In the evaluation of data, percentage, mean, Mann Whitney U, Student t and Kurskall Wallis tests were applied. Results: The average point the patients got in nursing care perception scale is 62.64±10.08’dir. 48.7 % of patients regard nursing care well and 36.8 % of them regard it very well. 19 % of the patients regard nursing care badly. When the age, sex, occupation, marital status, educational background, residential place, income level, hospitalization period, hospitalization clinic and having a hospital attendant were compared with nursing care perception average point, the difference among point averages was not found meaningful statistically (p > 0.05). The average point of nursing care perception was found greater in those having chronic disease (p < 0.05). Conclusion: The perception point of patients about nursing care is above the average according to the average of the lowest and highest points. The great majority of patients regard nursing care well or very well.Keywords: hospital, patient, perception of nursing care, nursing care
Procedia PDF Downloads 3962219 Macroeconomic Measure of Projectification: An Empirical Study of Pakistani Economy
Authors: Shafaq Rana, Hina Ansar
Abstract:
Projectification is an emerging phenomenon in Western economies. The projects have become the key driver of the economic actions. The impact of projectification is understudy for over a decade. A methodology was developed to measure the degree of projectification at economical level, which was later adapted to measure the degree of projectification in Germany, Norway, and Iceland; and compared the differences in these project societies, considering their industrial structure, organizational size, and the share of project work. Using the same methodology, this study aims to provide empirical evidence of the project work in the context of Pakistan –a developing nation, keeping into consideration the macroeconomic measures, qualitative and quantitative measures of the project i/c GDP, monetary measures, and project success. The research includes a qualitative pre-study to define these macro-measures in the country-specific context and a quantitative study to measure the project work w.r.t hours working in the organizations on projects. The outcome of this study provides the key data on the projectification in a developing economy, which will help industry practitioners and decision-makers to examine the consequences of projectification and strategize, respectively. This study also provides a foundation for further research in individual sectors of the country while exploring different macroeconomic questions, including the effect of projectification on project productivity, income effects, and labor market.Keywords: developing economy, Pakistan, project work, projectification
Procedia PDF Downloads 1152218 Multilevel Gray Scale Image Encryption through 2D Cellular Automata
Authors: Rupali Bhardwaj
Abstract:
Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient
Procedia PDF Downloads 3772217 Criminal Law and Internet of Things: Challenges and Threats
Authors: Celina Nowak
Abstract:
The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.Keywords: criminal law, internet of things, privacy, security threats
Procedia PDF Downloads 1622216 Designing Electric Vehicle Charging Infrastructure to Benefit Historically-Marginalized Residents
Authors: Polly Parkinson, Emma Mecham, Fawn Groves, Amy Wilson-Lopez, Ivonne Santiago
Abstract:
In the rush to meet electric vehicle (EV) adoption goals that address environmental and health concerns, engineering planners and community policy experts cannot separate the socioeconomic and equity factors from transportation needs. Two gaps are identified in existing research: concrete proposals that address affordable micromobility options and provide for needs of community members without cars, and community-engaged research that elevates the concerns and solutions brought forward by historically-marginalized community members. This data analysis from a recent case study in a vulnerable community indicates that because transportation decisions are inextricably linked to health, work, and housing, EV adoption must also address multifaceted human needs. Communities focused on building more electric vehicle charging stations must find ways for lower-income households to also benefit. This research engaged residents in the planning process and resulted in a template for charging stations to advance mobility justice with a range of options that purposefully benefit the whole community.Keywords: community engagement, electric vehicle charging, environmental justice, participatory research, transportation equity
Procedia PDF Downloads 372215 Reactive Power Cost Evaluation with FACTS Devices in Restructured Power System
Authors: A. S. Walkey, N. P. Patidar
Abstract:
It is not always economical to provide reactive power using synchronous alternators. The cost of reactive power can be minimized by optimal placing of FACTS devices in power systems. In this paper a Particle Swarm Optimization- Sequential Quadratic Programming (PSO-SQP) algorithm is applied to minimize the cost of reactive power generation along with real power generation to alleviate the bus voltage violations. The effectiveness of proposed approach tested on IEEE-14 bus systems. In this paper in addition to synchronous generators, an opportunity of FACTS devices are also proposed to procure the reactive power demands in the power system.Keywords: reactive power, reactive power cost, voltage security margins, capability curve, FACTS devices
Procedia PDF Downloads 5062214 Exploitation behind the Development of Home Batik Industry in Lawean, Solo, Central Java
Authors: Mukhammad Fatkhullah, Ayla Karina Budita, Cut Rizka Al Usrah, Kanita Khoirun Nisa, Muhammad Alhada Fuadilah Habib, Siti Muslihatul Mukaromah
Abstract:
Batik industry has become one of the leading industries in the economy of Indonesia. Since the recognition of batik as one of cultural wealth and national identity of Indonesia by UNESCO, batik production keeps increasing as a result of increasing demands for batik, whether from domestically or abroad. One of the rapid development batik industries in Indonesia is batik industry in Lawean Village, Solo, Central Java, Indonesia. This batik industry generally uses putting-out system where batik workers work in their own houses. With the implementation of this system, therefore employers don’t have to prepare Environmental Impact Analysis (EIA), social security for workers, overtime payment, space for working, and equipment for working. The implementation of putting-out system causes many problems, starting from environmental pollution, the loss of social rights of workers, and even exploitation of workers by batik entrepreneurs. The data used to describe this reality is the primary data from qualitative research with in-depth interview data collection technique. Informants were determined purposively. The theory used to perform data interpretation is the phenomenology of Alfred Schutz. Both qualitative and phenomenology are used in this study to describe batik workers exploitation in terms of the implementation of putting-out system on home batik industry in Lawean. The research result showed that workers in batik industry sector in Lawean were exploited with the implementation of putting-out system. The workers were strictly employed by the entrepreneurs, so that their job cannot be called 'part-time' job anymore. In terms of labor and time, the workers often work more than 12 hours per day and they often work overtime without receiving any overtime payment. In terms of work safety, the workers often have contact with chemical substances contained in batik making materials without using any protection, such as clothes work, which is worsened by the lack of standard or procedure in work that can cause physical damage, such as burnt and peeled off skin. Moreover, exposure and contamination of chemical materials make the workers and their families vulnerable to various diseases. Meanwhile, batik entrepreneurs did not give any social security (including health cost aid). Besides that, the researchers found that batik industry in home industry sector is not environmentally friendly, even damaging ecosystem because industrial waste disposed without EIA.Keywords: exploitation, home batik industry, occupational health and safety, putting-out system
Procedia PDF Downloads 3172213 Restriction on the Freedom of Economic Activity in the Polish Energy Law
Authors: Zofia Romanowska
Abstract:
Recently there have been significant changes in the Polish energy market. Due to the government's decision to strengthen energy security as well as to strengthen the implementation of the European Union common energy policy, the Polish energy market has been undergoing significant changes. In the face of these, it is necessary to answer the question about the direction the Polish energy rationing sector is going, how wide apart the powers of the state are and also whether the real regulator of energy projects in Poland is not in fact the European Union itself. In order to determine the role of the state as a regulator of the energy market, the study analyses the basic instruments of regulation, i.e. the licenses, permits and permissions to conduct various activities related to the energy market, such as the production and sale of liquid fuels or concessions for trade in natural gas. Bearing in mind that Polish law is part of the widely interpreted European Union energy policy, the legal solutions in neighbouring countries are also being researched, including those made in Germany, a country which plays a key role in the shaping of EU policies. The correct interpretation of the new legislation modifying the current wording of the Energy Law Act, such as obliging the entities engaged in the production and trade of liquid fuels (including abroad) to meet a number of additional requirements for the licensing and providing information to the state about conducted business, plays a key role in the study. Going beyond the legal framework for energy rationing, the study also includes a legal and economic analysis of public and private goods within the energy sector and delves into the subject of effective remedies. The research caused the relationships between progressive rationing introduced by the legislator and the rearrangement rules prevailing on the Polish energy market to be taken note of, which led to the introduction of greater transparency in the sector. The studies refer to the initial conclusion that currently, despite the proclaimed idea of liberalization of the oil and gas market and the opening of market to a bigger number of entities as a result of the newly implanted changes, the process of issuing and controlling the conduction of the concessions will be tightened, guaranteeing to entities greater security of energy supply. In the long term, the effect of the introduced legislative solutions will be the reduction of the amount of entities on the energy market. The companies that meet the requirements imposed on them by the new regulation to cope with the profitability of the business will in turn increase prices for their services, which will be have an impact on consumers' budgets.Keywords: license, energy law, energy market, public goods, regulator
Procedia PDF Downloads 2462212 A Comparative Study of Virus Detection Techniques
Authors: Sulaiman Al amro, Ali Alkhalifah
Abstract:
The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based
Procedia PDF Downloads 4842211 Secure Data Sharing of Electronic Health Records With Blockchain
Authors: Kenneth Harper
Abstract:
The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,
Procedia PDF Downloads 212210 Competitiveness and Value Creation of Tourism Sector: In the Case of 10 ASEAN Economies
Authors: Apirada Chinprateep
Abstract:
The ASEAN Economic Community (AEC) shall be the goal of regional economic integration by 2015. Tourism is an activity that is growing important, especially as a source of foreign currency, employment creation and distribution of income bringing to the region. The preparation of members of the countries group, given the complexity of the issues entail to the concept of sustainable tourism, this paper tries to assess tourism sustainability, based on a number of quantitative indicators for all the ten economies, first, Thailand, compared with other nine countries, Myanmar, Laos, Vietnam, Malaysia, Singapore, Indonesia, Philippines, Cambodia, and Brunei. The proposed methodological framework will provide a number of benchmarks of tourism activities in these countries assessed. They include identification of the dimensions, for example, economic, socio-ecologic, infrastructure and indicators, method of scaling, chart representation and evaluation on Asian countries. This specification shows us that a similar level of tourism activity might introduce different sort of implementation in the tourism activity and might have different consequences for the socio-ecological environment and sustainability. The heterogeneity of developing countries exposed briefly here would be useful to detect and prepare for coping with the main problem of each country in their tourism activities, as well as competitiveness and value creation of tourism for ASEAN economic community, and will compare with other parts of the world and the world benchmark.Keywords: AEC, ASEAN, sustainable, tourism, competitiveness
Procedia PDF Downloads 4262209 Socio-Cultural Behaviors of Individuals in High-Rise Housing
Authors: Raweyah Al-Sedairawi
Abstract:
While high-rise housing detained massive negative connotations on several societies and well-being, this typology did deliver housing demand efficiently. Despite its adverse reference due to declining precedents, high-rise housing is still in global demand. Yet the suitability of this typology is still questioned. In this research, the suitability of high-rise housing as a socio-culturally sustainable solution to meet housing demands will be examined. By questioning what is the potential of high-rise housing as a socio-culturally sustainable solution for housing demands, the research will examine some high-rise housing practices. Through reviewing the literature on the origins of high-rise housing, how and why they were developed, some unsuccessful cases, and some successful cases, with the identification of factors for successful high-rise living. Thus, the research groundings will materialize from existing patterns of housing demands. Whilst most of the literature covers the housing market from an economic, real estate, and political perspective, there is less amount that discloses occupants’ reactions towards this typology and its appropriateness for the reason that income controls individuals’ choices. To bridge the gap, the prospect of implementing the study would be effective. This will be applied through a mixture of a qualitative and a quantitative methodology by conducting questionnaires and focus groups on existing cases of high-net-worth residential towers.Keywords: architecture, behaviors, high-rise, socio-cultural, sustainability
Procedia PDF Downloads 882208 Theory and Reality on Working Life of People with Disability: The Case in Poland
Authors: Dorota Kobus-Ostrowska
Abstract:
Work for everyone, especially for person with disability is a condition in independence; it secures basic needs and develops manual and intellectual capabilities. The work is a source of income, and it builds and strengthens of self-esteem and competence. The purpose of this article is to identify work as an important factor in everyone’s life, despite Polish disabled persons rarely having the chance to undertake a job. In order to achieve this purpose, two methods were used: comparative and qualitative. The theoretical part of this article is based on studies of a wide range of Polish and foreign literature devoted to the issue of the occupational development of people with disabilities. The article was also enriched with the institutional and legal analysis types of support for people with disabilities in Poland. Currently, a Polish person with disability who wants to enter or return to the labor market is under a special protection. Those entities employing workers with disabilities may obtain a subsidy for the salary of a person with disabilities. Unfortunately, people with disability in Poland rarely participate in the workforce. The factors that contribute to this include the difficulty in obtaining work, the uncertainty of keeping it, and the low salary offered. Despite that domestic and foreign literature highlight the important role of disabled people as a workforce, very few people with disability in Poland are economically active.Keywords: disabled person, employer, rehabilitation, work
Procedia PDF Downloads 1532207 The Relationship between Inventory Management and Profitability: A Comparative Research on Turkish Firms Operated in Weaving Industry, Eatables Industry, Wholesale and Retail Industry
Authors: Gamze Sekeroglu, Mikail Altan
Abstract:
Working capital is identified as firm’s all current assets. Inventories which are one of the working capital elements are very important among current assets for firms. Because, profitability is an indicator for firms’ financial success is provided with minimum cost and optimum inventory quantity. So in this study, it is investigated as comparatively that the effect of inventory management on the profitability of Turkish firms which operated in weaving industry, eatables industry, wholesale and retail industry in between 2003 – 2012 years. Research data consist of profitability ratios and inventory turnovers ratio calculated by using balance sheets and income statements of firms which operated in Borsa Istanbul (BIST). In this research, the relationship between inventories and profitability is investigated by using SPSS-20 software with regression and correlation analysis. The results achieved from three industry departments which exist in study interpreted as comparatively. Accordingly, it is determined that there is a positive relationship between inventory management and profitability in eatables industry. However, it was founded that there is no relationship between inventory management and profitability in weaving industry and wholesale and retail industry.Keywords: profitability, regression analysis, inventory management, working capital
Procedia PDF Downloads 3362206 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country
Authors: Meszár Tárik
Abstract:
The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.Keywords: Middle East, Iraq, Islamic State, minorities
Procedia PDF Downloads 872205 Coping Mechanisms of Batangueño Families Facing Cancer
Authors: Aiza G. Clanor, Lotlot B. Hernandez, Jonna Marie T. Ibuna
Abstract:
This study aimed to know the coping mechanisms of Batangueño families facing cancer, specifically, those from Cancer Warriors Foundation, Inc. Batangas chapter. The researchers used purposive sampling. This study was limited to the responses provided by the Batangueño families of the cancer patients. A family member of the immediate family with a child facing cancer represents the family as a whole. A total number of forty six (46) respondents were given the questionnaires. Upon analysis, most of the respondents came from rural areas and nuclear family and have Php 5000 and below family monthly income. Most of them have their own houses, and 3 to 5 members, one of whom is a cancer patient diagnosed for more than 2 years. The two most frequently utilized coping strategies were mobilizing the family to acquire and accept help, and reframing. Passive appraisal is the least utilized one. There was a significant difference on the coping mechanisms of the family relative to passive appraisal based on the length of time since the illness was first diagnosed. Based from the study, the researchers developed modules with discussions and activities on cancer awareness, ideas on coping and how to deal with the cancer patients that may help the respondents and other Batangueño families overcome the difficulties in facing cancer. The researchers recommend the modules for they are found to be effective ways to help the families relieve stress, reduce anxiety and improve quality of life.Keywords: coping with chronic illness, family, psychology, cancer
Procedia PDF Downloads 5392204 Change in Food Choice Behavior: Trend and Challenges
Authors: Gargi S. Kumar, Mrinmoyi Kulkarni
Abstract:
Food choice behavior is complex and determined by biological, psychological, socio-cultural, and economic factors. The past two decades, have seen dramatic changes in food consumption patterns among urban Indian consumers. The objective of the current study was to evaluate perceptions about changes with respect to food choice behavior. Ten participants [urban men and women] ranging in age from 40 to 65 were selected and in-depth interviews were conducted with a set of open ended questions. The recorded interviews were transcribed and thematically analyzed using inductive, open and axial coding. The results identified themes that act as drivers and consequences of change in food choice behavior. Drivers such as globalization [sub themes of urbanization, education, income, and work environment], media and advertising, changing gender roles, women in the workforce, and change in family structure have influenced food choice, both at an individual and national level. The consequences of changes in food choice were health implications, processed food consumption, food decisions driven by children and eating out among others. The study reveals that, over time, food choices change and evolve. However it is interesting to note how market forces and culture interact to influence individual behavior and the overall food environment which subsequently affects food choice and the health of the people.Keywords: change, consequences, drivers, food choice, globalization
Procedia PDF Downloads 2292203 Challenges in Multi-Cloud Storage Systems for Mobile Devices
Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta
Abstract:
The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices
Procedia PDF Downloads 6992202 Cuckoo Search Optimization for Black Scholes Option Pricing
Authors: Manas Shah
Abstract:
Black Scholes option pricing model is one of the most important concepts in modern world of computational finance. However, its practical use can be challenging as one of the input parameters must be estimated; implied volatility of the underlying security. The more precisely these values are estimated, the more accurate their corresponding estimates of theoretical option prices would be. Here, we present a novel model based on Cuckoo Search Optimization (CS) which finds more precise estimates of implied volatility than Particle Swarm Optimization (PSO) and Genetic Algorithm (GA).Keywords: black scholes model, cuckoo search optimization, particle swarm optimization, genetic algorithm
Procedia PDF Downloads 4532201 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems
Authors: Nadjah Chergui, Narhimene Boustia
Abstract:
Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.Keywords: context, default, exception, vulnerability
Procedia PDF Downloads 2592200 An E-Retailing System Architecture Based on Cloud Computing
Authors: Chanchai Supaartagorn
Abstract:
E-retailing is the sale of goods online that takes place over the Internet. The Internet has shrunk the entire World. The world e-retailing is growing at an exponential rate in the Americas, Europe, and Asia. However, e-retailing costs require expensive investment, such as hardware, software, and security systems. Cloud computing technology is internet-based computing for the management and delivery of applications and services. Cloud-based e-retailing application models allow enterprises to lower their costs with their effective implementation of e-retailing activities. In this paper, we describe the concept of cloud computing and present the architecture of cloud computing, combining the features of e-retailing. In addition, we propose a strategy for implementing cloud computing with e-retailing. Finally, we explain the benefits from the architecture.Keywords: architecture, cloud computing, e-retailing, internet-based
Procedia PDF Downloads 3962199 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles
Authors: Anthony Overmars, Sitalakshmi Venkatraman
Abstract:
This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography
Procedia PDF Downloads 2392198 Maturity Transformation Risk Factors in Islamic Banking: An Implication of Basel III Liquidity Regulations
Authors: Haroon Mahmood, Christopher Gan, Cuong Nguyen
Abstract:
Maturity transformation risk is highlighted as one of the major causes of recent global financial crisis. Basel III has proposed new liquidity regulations for transformation function of banks and hence to monitor this risk. Specifically, net stable funding ratio (NSFR) is introduced to enhance medium- and long-term resilience against liquidity shocks. Islamic banking is widely accepted in many parts of the world and contributes to a significant portion of the financial sector in many countries. Using a dataset of 68 fully fledged Islamic banks from 11 different countries, over a period from 2005 – 2014, this study has attempted to analyze various factors that may significantly affect the maturity transformation risk in these banks. We utilize 2-step system GMM estimation technique on unbalanced panel and find bank capital, credit risk, financing, size and market power are most significant among the bank specific factors. Also, gross domestic product and inflation are the significant macro-economic factors influencing this risk. However, bank profitability, asset efficiency, and income diversity are found insignificant in determining the maturity transformation risk in Islamic banking model.Keywords: Basel III, Islamic banking, maturity transformation risk, net stable funding ratio
Procedia PDF Downloads 4152197 Phone Number Spoofing Attack in VoLTE
Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 5222196 Economic Characteristics of Bitcoin: "An Analytical Study"
Authors: Abdelhalem Shahen
Abstract:
The world is now experiencing a digital revolution and greatly accelerated technological developments, in addition to the transition from the economy in its traditional form to the digital economy, which has resulted in the emergence of new tools that are appropriate to those developments, and from this, this paper attempts to explore the economic characteristics of the bitcoin currency that circulated recently. Due to the many advantages that distinguish it from money in its traditional forms, which have a range of economic effects. The study found that Bitcoin is among the technological innovations, which contain a set of characteristics that are worth studying, those that make it the focus of attention, such as the digital currency, the peer-to-peer property, Lower and Faster Transaction Costs, transparency, decentralized control, privacy, and Double-Spending, as well as security and Cryptographic, and finally mining.Keywords: Digital Economics, Digital Currencies, Bitcoin, Features of Bitcoin
Procedia PDF Downloads 138