Search results for: liberty security and justice area
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11762

Search results for: liberty security and justice area

11522 Renewable Energy and Energy Security in Malaysia: A Quantitative Analysis

Authors: Endang Jati Mat Sahid, Hussain Ali Bekhet

Abstract:

Robust economic growth, increasing population, and personal consumption are the main drivers for the rapid increase of energy demand in Malaysia. Increasing demand has compounded the issue of national energy security due to over-dependence on fossil fuel, depleting indigenous domestic conventional energy resources which in turns has increased the country’s energy import dependence. In order to improve its energy security, Malaysia has seriously embarked on a renewable energy journey. Many initiatives on renewable energy have been introduced in the past decade. These strategies have resulted in the exploding growth of renewable energy deployment in Malaysia. Therefore, this study investigated the impact of renewable energy deployment on energy security. Secondary data was used to calculate the energy security indicators. The study also compared the results of applying different energy security indicators namely availability, applicability, affordability and acceptability dimension of energy resources. The evaluation shows that Malaysia will experience slight improvement in availability and acceptability dimension of energy security. This study suggests that energy security level could be further enhanced by efficient utilization of energy, reducing carbon content of energy and facilitating low-carbon industries.

Keywords: energy policy, energy security, Malaysia, renewable energy

Procedia PDF Downloads 228
11521 Systems and Procedures in Indonesian Administrative Law

Authors: Andhika Danesjvara

Abstract:

Governance of the Republic of Indonesia should be based on the principle of sovereignty and the rule of law. Based on these principles, all forms of decisions and/or actions of government administration should be based on the sovereignty of the people and the law. Decisions and/or actions for citizens should be based on the provisions of the legislation and the general principles of good governance. Control of the decisions and/or actions is a part of administrative review and also judicial control. The control is part of the administrative justice system, which is intended for people affected by the decisions or administrative actions. This control is the duty and authority of the government or independent administrative court. Therefore, systems and procedures for the implementation of the task of governance and development must be regulated by law. Systems and procedures of governance is a subject studied in administrative law, therefore, the research also includes a review of the principles of law in administrative law. The administrative law procedure is important for the government to make decisions, the question is whether the procedures are part of the justice system itself.

Keywords: administrative court, administrative justice, administrative law, administrative procedures

Procedia PDF Downloads 267
11520 Overview of Wireless Body Area Networks

Authors: Rashi Jain

Abstract:

The Wireless Body Area Networks (WBANs) is an emerging interdisciplinary area where small sensors are placed on/within the human body. These sensors monitor the physiological activities and vital statistics of the body. The data from these sensors is aggregated and communicated to a remote doctor for immediate attention or to a database for records. On 6 Feb 2012, the IEEE 802.15.6 task group approved the standard for Body Area Network (BAN) technologies. The standard proposes the physical and MAC layer for the WBANs. The work provides an introduction to WBANs and overview of the physical and MAC layers of the standard. The physical layer specifications have been covered. A comparison of different protocols used at MAC layer is drawn. An introduction to the network layer and security aspects of the WBANs is made. The WBANs suffer certain limitations such as regulation of frequency bands, minimizing the effect of transmission and reception of electromagnetic signals on the human body, maintaining the energy efficiency among others. This has slowed down their implementation.

Keywords: vehicular networks, sensors, MicroController 8085, LTE

Procedia PDF Downloads 250
11519 A Textual Analysis of Prospective Teachers’ Social Justice Identity Development and LGBTQ Advocacy

Authors: Mi Ok Kang

Abstract:

This study examined the influences of including LGBTQ-related content in a multicultural teacher education course on the development of prospective teachers’ social justice identities. Appling a content analysis to 53 reflection texts written by participating prospective teachers in response to the relevant course content, this study deduced the stages of social justice identity development (naïve, acceptance, resistance, redefinition, and internalization) that participants reached during the course. The analysis demonstrated that the participants reached various stages in the social identity development model and none of the participants remained at the naïve stage during/after class. The majority (53%) of the participants reached the internalization stage during the coursework and became conscious about the heterosexual privileges they have had and aware of possible impacts of such privilege on their future LGBTQ students. Also the participants had begun to develop pedagogic action plans and devised applicable teaching strategies for their future students based on the new understanding of heteronormativity. We expect this study will benefit teacher educators and educational administrators who want to address LGBTQ-related issues in their multicultural education programs and/or revisit the goals, directions, and implications of their approach.

Keywords: LGBTQ, heteronormativity, social justice identity, teacher education, multicultural education, content analysis

Procedia PDF Downloads 248
11518 Fieldwork on the Way That Greeks View the Migration under the 'Veil of Ignorance'

Authors: Nikoletta G. Karytsioti

Abstract:

The European Union’s function and effectiveness are still an issue that minds, bringing about division even in the member-states interior. Recently, more serious issues have been added in the Union’s malfunction, which affects not only the Union’s function but also their residents’ safety. One of these issues is the migration crisis, which frustrates the European Union’s balances and the stability. The present paper’s aim to frame and interpret the Greek public opinion in basic migration matters, throughout the political philosophy and specifically via John Rawls ‘Theory of Justice’. The theory is deployed to examine if it may be used in a practical way, on a tangible issue and in a specific area. In order to obtain a real frame of the public opinion about the matter of migration, a questionnaire was addressed to Greek people. The sample was chosen for three main reasons: a) Greeks are experienced in the migration as they had migrated in the past, b) many young people migrated the recent years after the debt crisis, c) Greece is a reception state. Being based in the Theory of Justice and specifically in the ‘veil of ignorance’, is tried to overcome the obstacles of human nature’s subjectivity, while examining the variations in the responses per social group. The questionnaire will have demographic questions and special interest questions, related with the crisis, before and after ‘the veil of ignorance’. The paper’s originality comes from the fact that it is the first time that a philosophical theory is used to examine the migration issue in a practical manner. The main goals of the paper are three: - To examine the differences/similarities in the responses before and after the veil of ignorance, - to reveal opinions on migration crisis from E.U. citizens and - to confirm or not the practical usefulness of the Political Philosophy as a highlighting tool

Keywords: European Union, immigrants, migration crisis, political philosophy, theory of justice, veil of ignorance

Procedia PDF Downloads 264
11517 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 511
11516 Education For Social Justice: A Comparative Study of University Teachers' Conceptions and Practice

Authors: Digby Warren, Jiri Kropac

Abstract:

This comparative study seeks to develop a deeper understanding of what is meant by “education for social justice” (ESJ) - an aspiration articulated by universities, though often without much definition. The research methodology involved thematic analysis of data from in-depth interviews with academics (voluntary participants) in different disciplines and institutions in the UK, Czech Republic and other EU countries. The interviews explored lecturers’ conceptions of ESJ, their practice of it, and associated challenges and enabling factors. Main findings are that ESJ is construed as provision of equitable and conscientising education opportunities that run across the whole higher education (HE) journey, from widening access to HE to stimulating critical learning and awareness that can empower graduates to transform their lives and societies. Teaching practice featured study of topics related to social justice; collaborative and creative learning activities, and assignments offering choice and connection to students’ realities. Student responses could be mixed, occasionally resistant, but mostly positive in terms of gaining increased confidence and awareness of equality and social responsibility. Influences at the macro, meso and mico level could support or limit scope for ESJ. Overall, the study highlights the strong, values-based commitment of HE teachers to facilitating student learning engagement, wellbeing and development towards building a better world.

Keywords: higher education, social justice, inclusivity, diversity

Procedia PDF Downloads 67
11515 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 108
11514 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 585
11513 Re-Imagining and De-Constructing the Global Security Architecture

Authors: Smita Singh

Abstract:

The paper develops a critical framework to the hegemonic discourses resorted to by the dominant powers in the global security architecture. Within this framework, security is viewed as a discourse through which identities and threats are represented and produced to legitimize the security concerns of few at the cost of others. International security have long been driven and dominated by power relations. Since the end of the Cold War, the global transformations have triggered contestations to the idea of security at both theoretical and practical level. These widening and deepening of the concept of security have challenged the existing power hierarchies at the theoretical level but not altered the substance and actors defining it. When discourses are introduced into security studies, several critical questions erupt: how has power shaped security policies of the globe through language? How does one understand the meanings and impact of those discourses? Who decides the agenda, rules, players and outliers of the security? Language as a symbolic system and form of power is fluid and not fixed. Over the years the dominant Western powers, led by the United States of America have employed various discursive practices such as humanitarian intervention, responsibility to protect, non proliferation, human rights, war on terror and so on to reorient the constitution of identities and interests and hence the policies that need to be adopted for its actualization. These power relations are illustrated in this paper through the narratives used in the nonproliferation regime. The hierarchical security dynamics is a manifestation of the global power relations driven by many factors including discourses.

Keywords: hegemonic discourse, global security, non-proliferation regime, power politics

Procedia PDF Downloads 304
11512 Considering Climate Change in Food Security: A Sociological Study Investigating the Modern Agricultural Practices and Food Security in Bangladesh

Authors: Hosen Tilat Mahal, Monir Hossain

Abstract:

Despite being a food-sufficient country after revolutionary changes in agricultural inputs, Bangladesh still has food insecurity and undernutrition. This study examines the association between agricultural practices (as social practices) and food security concentrating on the potential impact of sociodemographic factors and climate change. Using data from the 2012 Bangladesh Integrated Household Survey (BIHS), this study shows how modifiedagricultural practices are strongly associated with climate change and different sociodemographic factors (land ownership, religion, gender, education, and occupation) subsequently affect the status of food security in Bangladesh. We used linear and logistic regression models to analyze the association between modified agricultural practices and food security. The findings indicate that socioeconomic statuses are significant predictors of determining agricultural practices in a society like Bangladesh and control food security at the household level. Moreover, climate change is adversely impactingeven the modified agricultural and food security association version. We conclude that agricultural practices must consider climate change while boosting food security. Therefore, future research should integrate climate change into the agriculture and food-related mitigation and resiliency models.

Keywords: food security, agricultural productivity, climate change, bangladesh

Procedia PDF Downloads 107
11511 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 333
11510 Role of Alternative Dispute Resolution (ADR) in Advancing UN-SDG 16 and Pathways to Justice in Kenya: Opportunities and Challenges

Authors: Thomas Njuguna Kibutu

Abstract:

The ability to access justice is an important facet of securing peaceful, just, and inclusive societies, as recognized by Goal 16 of the 2030 Agenda for Sustainable Development. Goal 16 calls for peace, justice, and strong institutions to promote the rule of law and access to justice at a global level. More specifically, Target 16.3 of the Goal aims to promote the rule of law at the national and international levels and ensure equal access to justice for all. On the other hand, it is now widely recognized that Alternative Dispute Resolution (hereafter, ADR) represents an efficient mechanism for resolving disputes outside the adversarial conventional court system of litigation or prosecution. ADR processes include but are not limited to negotiation, reconciliation, mediation, arbitration, and traditional conflict resolution. ADR has a number of advantages, including being flexible, cost-efficient, time-effective, and confidential, and giving the parties more control over the process and the results, thus promoting restorative justice. The methodology of this paper is a desktop review of books, journal articles, reports and government documents., among others. The paper recognizes that ADR represents a cornerstone of Africa’s, and more specifically, Kenya’s, efforts to promote inclusive, accountable, and effective institutions and achieve the objectives of goal 16. In Kenya, and not unlike many African countries, there has been an outcry over the backlog of cases that are yet to be resolved in the courts and the statistics have shown that the numbers keep on rising. While ADR mechanisms have played a major role in reducing these numbers, access to justice in the country remains a big challenge, especially to the subaltern. There is, therefore, a need to analyze the opportunities and challenges facing the application of ADR mechanisms as tools for accessing justice in Kenya and further discuss various ways in which we can overcome these challenges to make ADR an effective alternative to dispute resolution. The paper argues that by embracing ADR across various sectors and addressing existing shortcomings, Kenya can, over time, realize its vision of a more just and equitable society. This paper discusses the opportunities and challenges of the application of ADR in Kenya with a view to sharing the lessons and challenges with the wider African continent. The paper concludes that ADR mechanisms can provide critical pathways to justice in Kenya and the African continent in general but come with distinct challenges. The paper thus calls for concerted efforts of respective stakeholders to overcome these challenges.

Keywords: mediation, arbitration, negotiation, reconsiliation, Traditional conflict resolution, sustainable development

Procedia PDF Downloads 5
11509 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 152
11508 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 57
11507 The Impact of Artificial Intelligence on Sustainable Architecture and Urban Design

Authors: Alfons Aziz Asaad Hozain

Abstract:

The goal of sustainable architecture is to design buildings that have the least negative impact on the environment and provide better conditions for people. What forms of development enhance the area? This question was asked at the Center for the Study of Spatial Development and Building Forms in Cambridge in the late 1960s. This has resulted in many influential articles that have had a profound impact on the practice of urban planning. This article focuses on the sustainability outcomes caused by the climatic conditions of traditional Iranian architecture in hot and dry regions. Since people spend a lot of time at home, it is very important that these homes meet their physical and spiritual needs as well as the cultural and religious aspects of their lifestyle. In a country as large as Iran with different climates, traditional builders have put forward a number of logical solutions to ensure human comfort. With these solutions, the environmental problems of the have long been solved. Taking into account the experiences of traditional architecture in Iran's hot and dry climate, sustainable architecture can be achieved.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 58
11506 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry

Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht

Abstract:

Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.

Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628

Procedia PDF Downloads 156
11505 A Review of Food Security Policy Research in Central Asia

Authors: Mergen Dyussenov

Abstract:

Food security has become a prominent issue on the global policy agenda. Yet, one particular region that remains understudied is a cohort of Central Asian countries. To shed light onto the issue, the paper looks into a review of existing literature related to food security policies in Central Asia. In so doing, it seeks to systematize the context analyzed, key findings, and recommendations. Furthermore, it analyzes the role of key actors in promoting the food security policies across Central Asian nations. Finally, the paper attempts to set the agenda for further research.

Keywords: food security, central Asia, the role of actors, policy analysis

Procedia PDF Downloads 313
11504 Enhancing Civil Aviation Safety and Security: A Comprehensive Approach

Authors: J. Waldon

Abstract:

The civil aviation industry plays a crucial role in global transportation, connecting people and goods across the world. Ensuring the safety and security of passengers, crew, and aircraft is of paramount importance. This paper aims to address the aspect of training and human factors, amongst others, necessary for enhancing civil aviation safety and security. In this context, we are focusing on the level of attention exhibited in the checking of luggage and travel credentials, with the aim to identify areas of improvement and avoid compromising security and safety at the Nsimalen Airport Yaoundé, Cameroon. We found that there is a lack of proper awareness among both travelers and some staff on the safety and security of goods and passengers. We suggest that improved training and handling, and sensitization in the form of legible billboards are important. Thus, we recommend refresher courses like this one for staff to keep abreast with the fast-changing security landscape in air transport as well as proper sensitization, including health-related issues. In conclusion, we established that the human factors, as well as the frequency of training and refresher courses, have a positive outlook on safety and security in air transport.

Keywords: safety, security, passengers, cargo

Procedia PDF Downloads 56
11503 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 79
11502 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems

Authors: Mirko Sailio

Abstract:

Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.

Keywords: border automation, cyber-security, threat actors, border cyber-security

Procedia PDF Downloads 188
11501 Protecting Privacy and Data Security in Online Business

Authors: Bilquis Ferdousi

Abstract:

With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.

Keywords: privacy, data security, legislation, online business

Procedia PDF Downloads 91
11500 The Victim as a Public Actor: Understanding the Victim’s Role as an Agent of Accountability

Authors: Marie Manikis

Abstract:

This paper argues that the scholarship to date on victims in the criminal process has mainly adopted a private conception of victims –as bearers of individual interests, rights, and remedies– rather than a conception of the victim as an actor with public functions and interests, who has historically and continuously taken on an active role in the common law tradition. This conception enables a greater understanding of the various developments around victim participation in common law criminal justice systems and provides a useful analytical tool to understand the different roles of victims in England and Wales and the United States. Indeed, the main focus on individual rights and the conception of the victim as a private entity undermines the distinctive and increasing role victims play in the wider criminal justice process as agents of accountability through administrative-based processes within and outside courts, including private prosecutions, internal review processes within prosecutorial agencies, judicial review, and ombudsmen processes.

Keywords: victims, participation, criminal justice, accountability

Procedia PDF Downloads 116
11499 Investigation into the Socio-ecological Impact of Migration of Fulani Herders in Anambra State of Nigeria Through a Climate Justice Lens

Authors: Anselm Ego Onyimonyi, Maduako Johnpaul O.

Abstract:

The study was designed to investigate into the socio-ecological impact of migration of Fulani herders in Anambra state of Nigeria, through a climate justice lens. Nigeria is one of the world’s most densely populated countries with a population of over 284 million people, half of which are considered to be in abject poverty. There is no doubt that livestock production provides sustainable contributions to food security and poverty reduction to Nigeria economy, but not without some environmental implications like any other economic activities. Nigeria is recognized as being vulnerable to climate change. Climate change and global warming if left unchecked will cause adverse effects on livelihoods in Nigeria, such as livestock production, crop production, fisheries, forestry and post-harvest activities, because the rainfall regimes and patterns will be altered, floods which devastate farmlands would occur, increase in temperature and humidity which increases pest and disease would occur and other natural disasters like desertification, drought, floods, ocean and storm surges, which not only damage Nigerians’ livelihood but also cause harm to life and property, would occur. This and other climatic issue as it affects Fulani herdsmen was what this study investigated. In carrying out this research, a survey research design was adopted. A simple sampling technique was used. One local government area (LGA) was selected purposively from each of the four agricultural zone in the state based on its predominance of Fulani herders. For appropriate sampling, 25 respondents from each of the four Agricultural zones in the state were randomly selected making up the 100 respondent being sampled. Primary data were generated by using a set of structured 5-likert scale questionnaire. Data generated were analyzed using SPSS and the result presented using descriptive statistics. From the data analyzed, the study indentified; Unpredicted rainfall (mean = 3.56), Forest fire (mean = 4.63), Drying Water Source (mean = 3.99), Dwindling Grazing (mean 4.43), Desertification (mean = 4.44), Fertile land scarcity (mean = 3.42) as major factor predisposing Fulani herders to migrate southward while rejecting Natural inclination to migrate (mean = 2.38) and migration to cause trouble as a factor. On the reason why Fulani herders are trying to establish a permanent camp in Anambra state; Moderate temperature (mean= 3.60), Avoiding overgrazing (4.42), Search for fodder and water (mean = 4.81) and (mean = 4.70) respectively, Need for market (4.28), Favorable environment (mean = 3.99) and Access to fertile land (3.96) were identified. It was concluded that changing climatic variables necessitated the migration of herders from Northern Nigeria to areas in the South were the variables are most favorable to the herders and their animals.

Keywords: socio-ecological, migration, fulani, climate, justice, lens

Procedia PDF Downloads 19
11498 The Role of Intellectual Security Immunisation in Reducing Extremism in the Kingdom of Saudi Arabia, 1979 – 2019

Authors: Anas Abdulrahman A. Almiman

Abstract:

In recent decades, efforts to combat extremism have focused on non-physical dimensions, as various countries have attempted to raise security awareness or promote authentic and moderate Islamic education. The Kingdom of Saudi Arabia is one of the most successful and unique cases because it has focused on the immunization of Islamic intellectual security to combat extremism. This study aims to define the concept and importance of Islamic intellectual security in the Kingdom of Saudi Arabia through a descriptive-analytical study. It describes the potential role of Islamic intellectual security immunization in reducing extremism in the Kingdom of Saudi Arabia from 1979 to 2019, identifying various factors that connect Islamic intellectual security immunization to extremism reduction. One such factor is the MISK Foundation’s forums and conferences intended to raise Islamic intellectual security and reduce intellectual deviation, thus reducing extremism. It concludes that the common significant factor for Islamic intellectual deviation is direct commands and prohibitions. This study supports the efforts made by the Kingdom of Saudi Arabia to immunize Islamic intellectual security and fight extremism as a consequence.

Keywords: extremism, intellectual security immunization , Saudi Arabia, Islamic

Procedia PDF Downloads 180
11497 The Impact of Character Strengths on Employee Well-Being: The Mediating Effect of Work-Family Relationship

Authors: Jing Wang, Yong Wang

Abstract:

For organizational development, employee well-being is critical and has been influenced deeply by character strengths. Therefore, investigating the relationship between character strengths and employee well-being and its inner mechanism is crucial. In this study, we explored the features of Chinese employees' character strengths, studied the relationship between character strengths and employees' subjective well-being, work well-being and psychological well-being respectively, and examined the mediating effect of work-family relationship (both enrichment and conflict). An online survey was conducted. The results showed that: (1) The top five character strengths of Chinese employees were gratitude, citizenship, kindness, appreciation of beauty and excellence, justice, while the bottom five ones were creativity, authenticity, bravery, spirituality, open-mindedness. (2) Subjective well-being was significantly correlated to courage, humanity, transcendence and justice. Work well-being was significantly correlated to wisdom, courage, humanity, justice and transcendence. Psychological well-being was significantly correlated to all the above five character strengths and temperance. (3) Wisdom and humanity influenced Chinese employees’ subjective well-being through work-family enrichment. Justice enhanced psychological well-being via work-family enrichment; meanwhile, it also played a positive role in subjective well-being, work well-being, and psychological well-being by decreasing the family-work conflict. At the end of this paper, some theoretical and practical contributions to organizational management were further discussed.

Keywords: character strengths, work-family conflict, work-family enrichment, employee well-being, work well-being

Procedia PDF Downloads 378
11496 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 350
11495 The Influence of an Occupation as a Calling on the Value of Job Security and Its Connection with Wage Levels

Authors: Malul Miki, Rafi Bar-El, Eithan Hourie

Abstract:

In this article, we test the influence of an occupation as a calling on the value of job security and its connection with wage levels. Our sample consists of 495 workers in Israel from 10 occupations in the public sector, who are assumed to have a relatively high level of job security, and the private sector, who are assumed to have less job security or none at all. These 10 occupations are social workers, lecturers, lawyers, administration workers, accountants, high school teachers, bank workers, high-tech worker, nurses and psychologists. Using regression analysis, we find that those who have occupations that the literature has defined as a calling value job security less than those in ordinary employment. In addition, salary level has no effect on this relationship. Finally, those who work in occupations that are regarded as a calling have less status quo bias than those in ordinary employment.

Keywords: calling, loss aversion, job security, status quo bias

Procedia PDF Downloads 92
11494 The Importance of Developing Pedagogical Agency Capacities in Initial Teacher Formation: A Critical Approach to Advance in Social Justice

Authors: Priscilla Echeverria

Abstract:

This paper addresses initial teacher formation as a formative space in which pedagogy students develop a pedagogical agency capacity to contribute to social justice, considering ethical, political, and epistemic dimensions. This paper is structured by discussing first the concepts of agency, pedagogical interaction, and social justice from a critical perspective; and continues offering preliminary results on the capacity of pedagogical agency in novice teachers after the analysis of critical incidents as a research methodology. This study is motivated by the concern that responding to the current neoliberal scenario, many initial teacher formation (ITF) programs have reduced the meaning of education to instruction, and pedagogy to methodology, favouring the formation of a technical professional over a reflective or critical one. From this concern, this study proposes that the restitution of the subject is an urgent task in teacher formation, so it is essential to enable him in his capacity for action and advance in eliminating institutionalized oppression insofar as it affects that capacity. Given that oppression takes place in human interaction, through this work, I propose that initial teacher formation develops sensitivity and educates the gaze to identify oppression and take action against it, both in pedagogical interactions -which configure political, ethical, and epistemic subjectivities- as in the hidden and official curriculum. All this from the premise that modelling democratic and dialogical interactions are basic for any program that seeks to contribute to a more just and empowered society. The contribution of this study lies in the fact that it opens a discussion in an area about which we know little: the impact of the type of interactions offered by university teaching at ITF on the capacity of future teachers to be pedagogical agents. For this reason, this study seeks to gather evidence of the result of this formation, analysing the capacity of pedagogical agency of novice teachers, or, in other words, how capable the graduates of secondary pedagogies are in their first pedagogical experiences to act and make decisions putting the formative purposes that they are capable of autonomously defining before technical or bureaucratic issues imposed by the curriculum or the official culture. This discussion is part of my doctoral research, "The importance of developing the capacity for ethical-political-epistemic agency in novice teachers during initial teacher formation to contribute to social justice", which I am currently developing in the Educational Research program of the University of Lancaster, United Kingdom, as a Conicyt fellow for the 2019 cohort.

Keywords: initial teacher formation, pedagogical agency, pedagogical interaction, social justice, hidden curriculum

Procedia PDF Downloads 78
11493 The Debacle of the Social Pact: Finding a New Theoretical Framework for Egalitarian Justice

Authors: Abosede Priscilla Ipadeola

Abstract:

The quest for egalitarian justice requires a suitable theoretical foundation that can address the problem of marginalization and subjugation arising from various forms of oppression, such as sexism, racism, classism, and others. Many thinkers and societies have appealed to contractarianism, a theory that has been widely regarded as a doctrine of egalitarianism by some political theorists for about five centuries. Despite its numerous criticisms, the social contract still enjoys a prominent status as a key theory for egalitarian justice. However, Pateman and Mills have contended that the contractarian approach legitimizes gender and racial inequalities by excluding and marginalizing women and people of color from the original agreement. Therefore, the social contract is incapable of generating or fostering equality. This study proposes postcontractarianism, which is a viable alternative to the social contract. Postcontractarianism argues that the basis for egalitarianism cannot be grounded on agreement but rather on understanding. Postcontractarianism draws on Jorge Nef’s idea of mutual vulnerability and Obiri (an African theory of cosmology) to argue for the imperative of social equality.

Keywords: postcontractarianism, obiri, mutual vulnerability, egalitarianism, the social contract

Procedia PDF Downloads 45