Search results for: private security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4462

Search results for: private security

2302 Toward a Risk Assessment Model Based on Multi-Agent System for Cloud Consumer

Authors: Saadia Drissi

Abstract:

The cloud computing is an innovative paradigm that introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. As consequence, there is a need of risk assessment model adapted to cloud computing. This paper requires a new risk assessment model based on multi-agent system and AHP model as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.

Keywords: cloud computing, risk assessment model, multi-agent system, AHP model, cloud consumer

Procedia PDF Downloads 546
2301 Corporate Social Responsibility in an Experimental Market

Authors: Nikolaos Georgantzis, Efi Vasileiou

Abstract:

We present results from experimental price-setting oligopolies in which green firms undertake different levels of energy-saving investments motivated by public subsidies and demand-side advantages. We find that consumers reveal higher willingness to pay for greener sellers’ products. This observation in conjunction to the fact that greener sellers set higher prices is compatible with the use and interpretation of energy-saving behaviour as a differentiation strategy. However, sellers do not exploit the resulting advantage through sufficiently high price-cost margins, because they seem trapped into “run to stay still” competition. Regarding the use of public subsidies to energy-saving sellers we uncover an undesirable crowding-out effect of consumers’ intrinsic tendency to support green manufacturers. Namely, consumers may be less willing to support a green seller whose energy-saving strategy entails a direct financial benefit. Finally, we disentangle two alternative motivations for consumer’s attractions to pro-social firms; first, the self-interested recognition of the firm’s contribution to the public and private welfare and, second, the need to compensate a firm for the cost entailed in each pro-social action. Our results show the prevalence of the former over the latter.

Keywords: corporate social responsibility, energy savings, public good, experiments, vertical differentiation, altruism

Procedia PDF Downloads 258
2300 A Review Paper for Detecting Zero-Day Vulnerabilities

Authors: Tshegofatso Rambau, Tonderai Muchenje

Abstract:

Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process.

Keywords: zero-day attacks, exploitation, vulnerabilities

Procedia PDF Downloads 103
2299 The Implications of Some Social Variables in Increasing the Unemployed in Egypt

Authors: Mohamed Elkhouli

Abstract:

This research sets out to identify some social factors or variables that may need to be controlled in order to decrease the volume of unemployed in Egypt. As well as, it comes to investigate the relationship between a set of social variables and unemployment issue in Egypt in the sake of determining the most important social variables influencing the rise of unemployed during the time series targeted (2002-2012). Highlighting the unemployment issue is becoming an increasingly important topic in all countries throughout the world resulting from expand their globalization efforts. In general, the study tries to determine what the most social priorities are likely to adopt seriously by the Egypt's government in order to solve the unemployed problem. The results showed that the low value for both of small projects and the total value of disbursed social security respectively have significant impact on increasing the No. of unemployed in Egypt, according to the target period by the current study.

Keywords: Egypt, social status, unemployment, unemployed

Procedia PDF Downloads 326
2298 Forensic Analysis of Signal Messenger on Android

Authors: Ward Bakker, Shadi Alhakimi

Abstract:

The amount of people moving towards more privacy focused instant messaging applications has grown significantly. Signal is one of these instant messaging applications, which makes Signal interesting for digital investigators. In this research, we evaluate the artifacts that are generated by the Signal messenger for Android. This evaluation was done by using the features that Signal provides to create artifacts, whereafter, we made an image of the internal storage and the process memory. This image was analysed manually. The manual analysis revealed the content that Signal stores in different locations during its operation. From our research, we were able to identify the artifacts and interpret how they were used. We also examined the source code of Signal. Using our obtain knowledge from the source code, we developed a tool that decrypts some of the artifacts using the key stored in the Android Keystore. In general, we found that most artifacts are encrypted and encoded, even after decrypting some of the artifacts. During data visualization, some artifacts were found, such as that Signal does not use relationships between the data. In this research, two interesting groups of artifacts were identified, those related to the database and those stored in the process memory dump. In the database, we found plaintext private- and group chats, and in the memory dump, we were able to retrieve the plaintext access code to the application. Nevertheless, we conclude that Signal contains a wealth of artifacts that could be very valuable to a digital forensic investigation.

Keywords: forensic, signal, Android, digital

Procedia PDF Downloads 83
2297 English Syllabus in the Iranian Education System

Authors: Shaghayegh Mirshekari, Atiyeh Ghorbani

Abstract:

EThe Iranian system of education has been politically influenced by the thoughts of the governing religious party. It has brought many religious books into the educational system from grade one up to graduation from high school, and therefore, teaching English as a non-Islamic language has been put aside the system, focusing on the Islamic language of Arabic. Teaching English has been widely talked about in international academia, but the Iranian educational system has not brought in any of its outcomes due to the general policy of keeping people away from international Western thoughts. Because of the increasing interest among Iranians in learning English, this language is being taught and studied in public and private schools, commercial and adult schools, language institutes, colleges, universities, and numerous homes throughout the country. Methods and techniques of teaching English, the attitude of the teachers and learners towards the language, and the availability of textbooks and other language materials are quite different in any one of the different institutions. This paper has evaluated the outcome of the Iranian educational system in teaching English in terms of their methods of teaching, as well as the policies regarding the educational system. The results show that not only has there been no progress in the system in terms of teaching English, rather there is backwardness in this regard due to the political policy of preventing people from learning English. Therefore, we see the majority of the youth not speaking English properly at the age where they need to enter the international arena.

Keywords: English, public school, language, Iran, teaching

Procedia PDF Downloads 67
2296 Application of Molecular Markers for Crop Improvement

Authors: Monisha Isaac

Abstract:

Use of molecular markers for selecting plants with desired traits has been started long back. Due to their heritable characteristics, they are useful for identification and characterization of specific genotypes. The study involves various types of molecular markers used to select multiple desired characters in plants, their properties, and advantages to improve crop productivity in adverse climatological conditions for the purpose of providing food security to fast-growing global population. The study shows that genetic similarities obtained from molecular markers provide more accurate information and the genetic diversity can be better estimated from the genetic relationship obtained from the dendrogram. The information obtained from markers assisted characterization is more suitable for the crops of economic importance like sugarcane.

Keywords: molecular markers, crop productivity, genetic diversity, genotype

Procedia PDF Downloads 518
2295 Speaking Difficulties Encountered by EFL Learners in Secondary School in Morocco

Authors: Bellali Assia, Bellali Fatima

Abstract:

Speaking is one of the most difficult English skills for non-English learners. This study investigated English-speaking difficulties encountered by non-English secondary school students in a private school in Casablanca, Morocco. The subjects were students of 63 (male and female) from 2ed year classes level. It also aims to investigate the degree of main speaking difficulties and the factors effecting non-English students to speak English. This research used a descriptive qualitative and quantitative approach with a questionnaire and an interview to collect the data. In linguistically related difficulties, there were four difficulties, namely vocabulary, grammar, conversation and pronunciation. The results revealed that there were 40.32% of students agreed that they do not have sufficient grammar knowledge, 45.16% of students agreed that they do not have enough vocabulary, 45.90% of students agreed that they have difficulty in conversation, and 39.34% of students agreed that they have poor pronunciation. Also, the results indicated that 63.33 % of students agreed that they have problems with self-confidence. The factors causing the problem of speaking English in this study were lack of general knowledge, lack of speaking practice, fear of mistakes and grammar practice, low participation, shyness, nervousness, fear of criticism, and unfamiliar word pronunciation. Furthermore, recommendations and suggestions were presented to solve the problem and eliminate difficulties for teachers and students.

Keywords: English speaking, difficulties, factors, non-English students

Procedia PDF Downloads 25
2294 The Flypaper Effect and the Municipal Participation Fund in the Brazilian Public Sector

Authors: Lucas Oliveira Gomes Ferreira, André Luiz Marques Serrano

Abstract:

The fiscal decentralization driven by the 1988 Constitution was responsible for granting greater autonomy to Brazilian subnational entities, as states and municipalities were entrusted with greater responsibilities to provide local public goods and services. However, the revenues necessary to implement the new attributions are largely received through intergovernmental transfers and not by local tax collection. The literature points out that public spending increases more by receiving unconditional and nonmatching (lump sum) intergovernmental grants than by an increase in taxpayers' income. This effect, called the flypaper effect, happens because the funds received could be used to reduce local taxes, meaning an increase in the citizen's private income. However, they are applied in the public sector in the form of expenses. The present work investigates the existence of the flypaper effect in Brazilian municipalities during the first two decades of the 21st century. The research uses the Municipal Participation Fund (FPM) as a grant proxy from 2000 to 2019 through econometrics of cross-section and panel data for all 5,568 municipalities. The results indicate the flypaper effect in Brazilian municipalities, as well as the proportional relationship between the receipt of constitutional transfers and the increase in public expenditure.

Keywords: flypaper effect, intergovernmental transfers, municipal participation fund, fiscal federalism

Procedia PDF Downloads 147
2293 ISIS Resurgence in the Era of COVID-19

Authors: Stacey Pollard, Henry Baraket, Girish Ganesan, Natalie Kim

Abstract:

One year after U.S.-led coalition operations liberated ISIS-held territories in Iraq and Syria and killed ISIS core leader Abu Bakr al-Baghdadi, ISIS is resurging. Taking a page from its old playbook, the organization is capitalizing on social unrest and a rapidly deteriorating security environment—exacerbated by the COVID-19 pandemic—to reconstitute in permissive areas of Iraq and Syria. This Short examines ISIS’s pandemic-era ground and information operations through the lens of its state- and nation-making efforts to help analysts and decisionmakers better understand the imminence and scope of the threat. ISIS is rapidly overcoming U.S.-supported counterterrorism gains and, without direct pressure to reverse these advances, is poised for recovery.

Keywords: Terrorism, COVID-19, Islamic State, Instability, Iraq, Syria, Global, Resurgence

Procedia PDF Downloads 74
2292 An Analysis of Language Borrowing among Algerian University Students Using Online Facebook Conversations

Authors: Messaouda Annab

Abstract:

The rapid development of technology has led to an important context in which different languages and structures are used in the same conversations. This paper investigates the practice of language borrowing within social media platform, namely, Facebook among Algerian Vernacular Arabic (AVA) students. In other words, this study will explore how Algerian students have incorporated lexical English borrowing in their online conversations. This paper will examine the relationships between language, culture and identity among a multilingual group. The main objective is to determine the cultural and linguistic functions that borrowing fulfills in social media and to explain the possible factors underlying English borrowing. The nature of the study entails the use of an online research method that includes ten online Facebook conversations in the form of private messages collected from Bachelor and Masters Algerian students recruited from the English department at the University of Oum El-Bouaghi. The analysis of data revealed that social media platform provided the users with opportunities to shift from one language to another. This practice was noticed in students’ online conversations. English borrowing was the most relevant language performance in accordance with Arabic which is the mother tongue of the chosen sample. The analysis has assumed that participants are skilled in more than one language.

Keywords: borrowing, language performance, linguistic background, social media

Procedia PDF Downloads 159
2291 Automatic Aggregation and Embedding of Microservices for Optimized Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.

Keywords: aggregation, deployment, embedding, resource allocation

Procedia PDF Downloads 204
2290 Overcoming the Obstacles to Green Campus Implementation in Indonesia

Authors: Mia Wimala, Emma Akmalah, Ira Irawati, M. Rangga Sururi

Abstract:

One way that has been aggressively implemented in creating a sustainable environment nowadays is through the implementation of green building concept. In order to ensure the success of its implementation, the support and initiation from educational institutions, especially higher education institutions are indispensable. This research was conducted to figure out the obstacles restraining the success of green campus implementation in Indonesia, as well as to propose strategies to overcome those obstacles. The data presented in this paper are mainly derived from interview and questionnaire distributed randomly to the staffs and students in 10 (ten) major institutions around Jakarta and West Java area. The data were further analyzed using ANOVA and SWOT analysis. According to 182 respondents, it is found that resistance to change, inadequate knowledge, information and understanding, no penalty for any environmental violation, lack of reward for green campus practices, lack of stringent regulations/laws, lack of management commitment, insufficient funds are the obstacles to the green campus movement in Indonesia. In addition, out of 6 criteria considered in UI GreenMetric World Ranking, education was the only criteria that had no significant difference between public and private universities in generating the green campus performance. The work concludes with recommendation of strategies to improve the implementation of green campus in the future.

Keywords: green campus, obstacles, sustainable, higher education institutions

Procedia PDF Downloads 226
2289 Analysis of Geotechnical Parameters from Geophysical Information

Authors: Adewoyin O. Olusegun, Akinwumi I. Isaac

Abstract:

In some part of the world where legislations related to site investigations before constructions are not strictly enforced, the expenses and time required for carrying out a comprehensive geotechnical investigation to characterize a site can discourage prospective private residential building developers. Another factor that can discourage a developer is the fact that most of the geotechnical tests procedures utilized during site investigations, to a certain extent, alter the existing environment of the site. This study suggests a quick, non-destructive and non-intrusive method of obtaining key subsoil geotechnical properties necessary for foundation design for proposed engineering facilities. Seismic wave velocities generated from near surface refraction method was used to determine the bulk density of soil, Young’s modulus, bulk modulus, shear modulus and allowable bearing capacity of a competent layer that can bear structural load at the particular study site. Also, regression equations were developed in order to directly obtain the bulk density of soil, Young’s modulus, bulk modulus, shear modulus and allowable bearing capacity from the compressional wave velocities. The results obtained correlated with the results of standard geotechnical investigations carried out.

Keywords: characterize, environment, geophysical, geotechnical, regression

Procedia PDF Downloads 372
2288 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 315
2287 Application of Intelligent City and Hierarchy Intelligent Buildings in Kuala Lumpur

Authors: Jalalludin Abdul Malek, Zurinah Tahir

Abstract:

When the Multimedia Super Corridor (MSC) was launched in 1995, it became the catalyst for the implementation of the intelligent city concept, an area that covers about 15 x 50 kilometres from Kuala Lumpur City Centre (KLCC), Putrajaya and Kuala Lumpur International Airport (KLIA). The concept of intelligent city means that the city has an advanced infrastructure and infostructure such as information technology, advanced telecommunication systems, electronic technology and mechanical technology to be utilized for the development of urban elements such as industries, health, services, transportation and communications. For example, the Golden Triangle of Kuala Lumpur has also many intelligent buildings developed by the private sector such as the KLCC Tower to implement the intelligent city concept. Consequently, the intelligent buildings in the Golden Triangle can be linked directly to the Putrajaya Intelligent City and Cyberjaya Intelligent City within the confines of the MSC. However, the reality of the situation is that there are not many intelligent buildings within the Golden Triangle Kuala Lumpur scope which can be considered of high-standard intelligent buildings as referred to by the Intelligence Quotient (IQ) building standard. This increases the need to implement the real ‘intelligent city’ concept. This paper aims to show the strengths and weaknesses of the intelligent buildings in the Golden Triangle by taking into account aspects of 'intelligence' in the areas of technology and infrastructure of buildings.

Keywords: intelligent city concepts, intelligent building, Golden Triangle, Kuala Lumpur

Procedia PDF Downloads 299
2286 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 58
2285 Introducing Information and Communication Technologies in Prison: A Proposal in Favor of Social Reintegration

Authors: Carmen Rocio Fernandez Diaz

Abstract:

This paper focuses on the relevance of information and communication technologies (hereinafter referred as ‘ICTs’) as an essential part of the day-to-day life of all societies nowadays, as they offer the scenario where an immense number of behaviors are performed that previously took place in the physical world. In this context, areas of reality that have remained outside the so-called ‘information society’ are hardly imaginable. Nevertheless, it is possible to identify a means that continue to be behind this reality, and it is the penitentiary area regarding inmates rights, as security aspects in prison have already be improved by new technologies. Introducing ICTs in prisons is still a matter subject to great rejections. The study of comparative penitentiary systems worldwide shows that most of them use ICTs only regarding educational aspects of life in prison and that communications with the outside world are generally based on traditional ways. These are only two examples of the huge range of activities where ICTs can carry positive results within the prison. Those positive results have to do with the social reintegration of persons serving a prison sentence. Deprivation of liberty entails contact with the prison subculture and the harmful effects of it, causing in cases of long-term sentences the so-called phenomenon of ‘prisonization’. This negative effect of imprisonment could be reduced if ICTs were used inside prisons in the different areas where they can have an impact, and which are treated in this research, as (1) access to information and culture, (2) basic and advanced training, (3) employment, (4) communication with the outside world, (5) treatment or (6) leisure and entertainment. The content of all of these areas could be improved if ICTs were introduced in prison, as it is shown by the experience of some prisons of Belgium, United Kingdom or The United States. However, rejections to introducing ICTs in prisons obey to the fact that it could carry also risks concerning security and the commission of new offences. Considering these risks, the scope of this paper is to offer a real proposal to introduce ICTs in prison, trying to avoid those risks. This enterprise would be done to take advantage of the possibilities that ICTs offer to all inmates in order to start to build a life outside which is far from delinquency, but mainly to those inmates who are close to release. Reforming prisons in this sense is considered by the author of this paper an opportunity to offer inmates a progressive resettlement to live in freedom with a higher possibility to obey the law and to escape from recidivism. The value that new technologies would add to education, employment, communications or treatment to a person deprived of liberty constitutes a way of humanization of prisons in the 21st century.

Keywords: deprivation of freedom, information and communication technologies, imprisonment, social reintegration

Procedia PDF Downloads 167
2284 Development of Enhanced Data Encryption Standard

Authors: Benjamin Okike

Abstract:

There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.

Keywords: encryption, enhanced data encryption, encryption techniques, information security

Procedia PDF Downloads 151
2283 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 428
2282 The Potential for Maritime Tourism: An African Perspective

Authors: Lynn C. Jonas

Abstract:

The African continent is rich in coastal history, heritage, and culture, presenting immense potential for the development of maritime tourism. Shipping and its related components are generally associated with the maritime industry, and tourism’s link is to the various forms of nautical tourism. Activities may include cruising, yachting, visits to lighthouses, ports, harbors, and excursions to related sites of cultural, historical, or ecological significance. There have been hundreds of years of explorers leaving a string of shipwrecks along the various coastal areas on the continent in their pursuit of establishing trade routes between Europe, Africa, and the Far East. These shipwrecks present diving opportunities in artificial reefs and marine heritage to be explored in various ways in the maritime cultural zones. Along the South African coast, for example, six Portuguese shipwrecks highlight the Bartolomeu Dias legacy of exploration, and there are a number of warships in Tanzanian waters. Furthermore, decades of African countries being under colonized rule have left the continent with an intricate cultural heritage that is enmeshed in European language architecture interlinked with, in many instances, hard-fought independent littoral states. There is potential for coastal trails to be developed to follow these historical events as, at one point in history, France had colonized 35 African states, and subsequently, 32 African states were colonized by Britain. Countries such as Cameroon still have the legacy of Francophone versus Anglophone as a result of this shift in colonizers. Further to the colonized history of the African continent, there is an uncomfortable heritage of the slave trade history. To a certain extent, these coastal slave trade posts are being considered attractive to a niche tourism audience; however, there is potential for education and interpretive measures to grow this as a tourism product. Notwithstanding these potential opportunities, there are numerous challenges to consider, such as poor maritime infrastructure, maritime security concerns with issues such as piracy, transnational crimes including weapons and migrant smuggling, drug, and human trafficking. These and related maritime issues contribute to the concerns over the porous nature of African ocean gateways, adding to the security concerns for tourists. This theoretical paper will consider these trends and how they may contribute to the growth and development of maritime tourism on the African continent. African considerations of the growth potential of tourism in coastal and marine spaces are needed, particularly with a focus on embracing the continent's tumultuous past as part of its heritage. This has the potential to contribute to the creation of a sense of ownership of opportunities.

Keywords: coastal trade routes, maritime tourism, shipwrecks, slave trade routes

Procedia PDF Downloads 22
2281 Importance of Standards in Engineering and Technology Education

Authors: Ahmed S. Khan, Amin Karim

Abstract:

During the past several decades, the economy of each nation has been significantly affected by globalization and technology. Government regulations and private sector standards affect a majority of world trade. Countries have been working together to establish international standards in almost every field. As a result, workers in all sectors need to have an understanding of standards. Engineering and technology students must not only possess an understanding of engineering standards and applicable government codes, but also learn to apply them in designing, developing, testing and servicing products, processes and systems. Accreditation Board for Engineering & Technology (ABET) criteria for engineering and technology education require students to learn and apply standards in their class projects. This paper is a follow-up of a 2006-2009 NSF initiative awarded to IEEE to help develop tutorials and case study modules for students and encourage standards education at college campuses. It presents the findings of a faculty/institution survey conducted through various U.S.-based listservs representing the major engineering and technology disciplines. The intent of the survey was to the gauge the status of use of standards and regulations in engineering and technology coursework and to identify benchmark practices. In light of survey findings, recommendations are made to standards development organizations, industry, and academia to help enhance the use of standards in engineering and technology curricula.

Keywords: standards, regulations, ABET, IEEE, engineering, technology curricula

Procedia PDF Downloads 289
2280 Re-Invent Corporate Governance - Ethical Way

Authors: Talha Sareshwala

Abstract:

The purpose of this research paper is to help entrepreneurs build an environment of trust, transparency and accountability necessary for fostering long term investment, financial stability and business integrity and to guide future Entrepreneurs into a promising future. The study presents a broader review on Corporate Governance, starting from its definition and antecedents. This is the most important aspect of ethical business. In fact, the 3 main pillars of corporate governance are: Transparency; Accountability; Security. The combination of these 3 pillars in running a company successfully and forming solid professional relationships among its stakeholders, which includes key managerial employees and, most important, the shareholders This paper is sharing an experience how an entrepreneur can act as a catalyst while ensuring them that ethics and transparency do pay in business when followed in true spirit and action.

Keywords: business, entrepreneur, ethics, governance, transparency.

Procedia PDF Downloads 76
2279 Multi-Stakeholder Engagement in the Food Waste Ecosystem: Opportunities and Policy Initiatives in Nigeria

Authors: Victor Oyewumi Ogunbiyi

Abstract:

Food waste is a global sustainability issue that demands that multiple stakeholders participate in solving it. This article examines how different food system stakeholders are held responsible in the policy debate related to food waste reduction. The study adopts a qualitative approach, paying attention to the views of both public and private policymakers and constructing their views relating to opportunities and policy initiatives towards waste reduction. The data consists of a list of opportunities and food policy initiatives in the development process in Nigeria. The authors identify three emerging opportunities: sectoral growth, technological demands in food service, and sustainable collaborative behaviour. The findings also revealed key policy initiatives for development: law and regulations, multi-stakeholder collaboration, economic incentives, research, and new knowledge. The study extends the marketing literature on food sustainability by investigating several stakeholders’ roles beyond the practical management of the food services sector. Additionally, considering policy initiative development for food waste mitigation sheds light on how stakeholders’ policy initiatives can sustain the food service sector. Finally, the authors outline policy implications.

Keywords: multistakeholder engagement, food services, food waste, policy initiatives, Nigeria

Procedia PDF Downloads 81
2278 Ghana’s Human Sexual Rights and Family Values Bill, 2021, and the Experiences of the LGBTQ+ Community

Authors: Michael Augustus Akagbor

Abstract:

Same-sex relationships have always existed in Ghana. In coastal towns such as James Town in the heart of the country’s capital, persons who were sexually different and attracted to members of their own sex were able to live their lives openly as queer persons without any fear for their lives. Since 2006, this idyllic existence has been under attack, with LGBTQ+ communities suffering violence and discrimination. This paper highlights the lived experiences of the LGBTIQ+ community in Ghana against the backdrop of the anti-gay bill - The Promotion of Proper Human Sexual Rights and Ghanaian Family Values Bill, 2021 (now renamed the Human Sexual Rights and Family Values Bill, 2021), currently before Parliament, introduced by eight members of Parliament as a Private Members’ Bill, and its implications for the LGBTQ+ community. The paper makes recommendations to key stakeholders on strategies to counter the cultural and religious arguments/strategies and activism of the anti-LGBTQ+ movement in Ghana. It relied on secondary data from a variety of sources, including the Bill before Parliament, media reports, and baseline surveys and studies conducted by LGBTQ organizations and other Civil Society Organizations (CSOs) in Ghana and elsewhere.

Keywords: sexual rights, promotion, family values, lgbtq+, ghana, discrimination

Procedia PDF Downloads 89
2277 The Characteristics of the Graduates Based on Thailand Qualification Framework (TQF) of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University

Authors: Apinya Mungaomklang, Natakamol Lookkham

Abstract:

The purpose of this research is to study the characteristics of the graduates based on Thailand Qualification Framework (TQF) of the Faculty of Industrial Technology, Suan Sunandha Rajabhat University. The population of the research was employers/entrepreneurs/supervisors of students who were doing Professional Experiences course in their respective organizations during semester 1/2012. Data were collected during the month of September 2012 from the total number of 100 people. The tool used in this research was a questionnaire developed by the research team. Data were analyzed using percentage, mean and standard deviation using a computer program. The results showed that most of the surveyed organizations were private companies. The program with most students doing Professional Experiences course was Safety Technology and Occupational Health. The nature of work that most students did was associated with the document. Employers/ entrepreneurs/employers’ opinions on the characteristics of the graduates based on TQF received high scores. Cognitive skills received the highest score, followed by interpersonal relationships and responsibilities, ethics and moral, numerical analysis skills, communication and information technology skills, and knowledge, respectively.

Keywords: graduates characteristics, Thailand Qualification Framework, employers, entrepreneurs

Procedia PDF Downloads 318
2276 Dogmatic Instrumant in Financing Micro Project

Authors: Adel Fatima Zohra, Guendouz Abdelkader

Abstract:

The solitary sector seems to appear nowadays as a third sector along the private and public ones, because of their ineptitude to take in charge the social exigency of the society regarding the lack in their local assets and the weakness of their financial institutions. The role of this sector is promoting a set of activities in the field of the charity, without aiming neither the individual profit nor a power practice. With the rise in the need of domestic resources, it is possible to count on the Zakat funding to realize some investment projects in order to develop the local society in many sectors as health, agriculture … etc. In the Islamic financial system, the Zakat is likely one of the most important instruments in financing the local development with the respect of the “Charia” rules: the amount of the Zakat is 2.5% of a wealth equivalent of each 85 gr of gold possessed since one year at least. In Algeria a fund of Zakat, was created since 2003 as an alternative to the public finding of development. This fund is a religious and social institution under the supervision of the ministry of religious affairs. This supervision covers two tasks: the first is traditional witch concern the distribution and the forwarding of the zakat to the poor people, and the second is modern concerning the financing of microcredits in the aim to enhance social and economic development. In this paper, we try to highlight the main role of the Zakat fund and its impact on the both social and economic development in Algeria.

Keywords: dogmatic instrument, solidary sector, zakat fund, micro project

Procedia PDF Downloads 277
2275 Analysing Maximum Power Point Tracking in a Stand Alone Photovoltaic System

Authors: Osamede Asowata

Abstract:

Optimized gain in respect to output power of stand-alone photovoltaic (PV) systems is one of the major focus of PV in recent times. This is evident in its low carbon emission and efficiency. Power failure or outage from commercial providers, in general, does not promote development to public and private sector; these basically limit the development of industries. The need for a well-structured PV system is of importance for an efficient and cost effective monitoring system. The purpose of this paper is to validate the maximum power point of an off-grid PV system taking into consideration the most effective tilt and orientation angles for PV's in the southern hemisphere. This paper is based on analyzing the system using a solar charger with maximum power point tracking (MPPT) from a pulse width modulation (PWM) perspective. The power conditioning device chosen is a solar charger with MPPT. The practical setup consists of a PV panel that is set to an orientation angle of 0°N, with a corresponding tilt angle of 36°, 26°, and 16°. Preliminary results include regression analysis (normal probability plot) showing the maximum power point in the system as well the best tilt angle for maximum power point tracking.

Keywords: poly-crystalline PV panels, solar chargers, tilt and orientation angles, maximum power point tracking, MPPT, Pulse Width Modulation (PWM).

Procedia PDF Downloads 178
2274 The Impact of the Knowledge-Sharing Factors on Improving Decision Making at Sultan Qaboos University Libraries

Authors: Aseela Alhinaai, Suliman Abdullah, Adil Albusaidi

Abstract:

Knowledge has been considered an important asset in private and public organizations. It is utilized in the libraries sector to run different operations of technical services and administrative works. As a result, the International Federation of Library Association (IFLA) established a department “Knowledge Management” in December 2003 to provide a deep understanding of the KM concept for professionals. These are implemented through different programs, workshops, and activities. This study aims to identify the impact of the knowledge-sharing factors (technology, collaboration, management support) to improve decision-making at Sultan Qaboos University Libraries. This study conducted a quantitative method using a questionnaire instrument to measure the impact of technology, collaboration, and management support on knowledge sharing that lead to improved decision-making. The study population is the (SQU) libraries (Main Library, Medical Library, College of Economic and political science library, and Art Library). The results showed that management support, collaboration, and technology use have a positive impact on the knowledge-sharing process, and knowledge-sharing positively affects the decision making process.

Keywords: knowledge sharing, decision-making, information technology, management support, corroboration, Sultan Qaboos University

Procedia PDF Downloads 82
2273 Factors Affecting Cost Efficiency of Municipal Waste Services in Tuscan Municipalities: An Empirical Investigation by Accounting for Different Management

Authors: María Molinos-Senante, Giulia Romano

Abstract:

This paper aims at investigating the effect of ownership in the efficiency assessment of municipal solid waste management. In doing so, the Data Envelopment Analysis meta-frontier approach integrating unsorted waste as undesirable output was applied. Three different clusters of municipalities have been created on the basis of the ownership type of municipal waste operators. In the second stage of analysis, the paper investigates factors affecting efficiency, in order to provide an outlook of levers to be used by policy and decision makers to improve efficiency, taking into account different management models in force. Results show that public waste management firms have better performance than mixed and private ones since their efficiency scores are significantly larger. Moreover, it has been demonstrated that the efficiency of waste management firms is statistically influenced by the age of population, population served, municipal size, population density and tourism rate. It evidences the importance of economies of scale on the cost efficiency of waste management. This issue is relevant for policymakers to define and implement policies aimed to improve the long-term sustainability of waste management in municipalities.

Keywords: data envelopment analysis, efficiency, municipal solid waste, ownership, undesirable output

Procedia PDF Downloads 162