Search results for: security and growth for all in the region
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12737

Search results for: security and growth for all in the region

12497 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 449
12496 Policy Compliance in Information Security

Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran

Abstract:

In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.

Keywords: information technology, information security, involvement theory, policies, social bond theory

Procedia PDF Downloads 347
12495 Political Economy of Internal Dispalcement, Migration and Human Security in Zimbabwe: 1800 to Present Day

Authors: Chupicai Manuel

Abstract:

The purpose of this article is to examine the political economy and history of internal displacement, migration and human security in Zimbabwe from 1800 to present day. The article gives a timeline of major internal displacement, migration trends that took place in Zimbabwe before colonialism, through the colonial period up to the present day and examines the human security context of such periods. In view of the above, a political economy analysis will be employed to examine the different factors that promoted internal displacement and human movements from 1800 to the present day and explore the architecture of human security in Zimbabwe. The ultimate goal of this literature review is to provide a longitudinal analysis of internal displacement, migration and human security regimes that existed in Zimbabwe with the view of promoting social cohesion and nation building.

Keywords: human security, internal displacement, migration, political economy

Procedia PDF Downloads 326
12494 A Pattern Practise for Awareness Educations on Information Security: Information Security Project

Authors: Fati̇h Apaydin

Abstract:

Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics.

Keywords: computer, information security, education, technology, development

Procedia PDF Downloads 573
12493 Economic Analysis of Endogenous Growth Model with ICT Capital

Authors: Shoji Katagiri, Hugang Han

Abstract:

This paper clarifies the role of ICT capital in Economic Growth. Albeit ICT remarkably contributes to economic growth, there are few studies on ICT capital in ICT sector from theoretical point of view. In this paper, production function of ICT which is used as input of intermediate good in final good and ICT sectors is incorporated into our model. In this setting, we analyze the role of ICT on balance growth path and show the possibility of general equilibrium solutions for this model. Through the simulation of the equilibrium solutions, we find that when ICT impacts on economy and economic growth increases, it is necessary that increases of efficiency at ICT sector and of accumulation of non-ICT and ICT capitals occur simultaneously.

Keywords: endogenous economic growth, ICT, intensity, capital accumulation

Procedia PDF Downloads 433
12492 On Differential Growth Equation to Stochastic Growth Model Using Hyperbolic Sine Function in Height/Diameter Modeling of Pines

Authors: S. O. Oyamakin, A. U. Chukwu

Abstract:

Richard's growth equation being a generalized logistic growth equation was improved upon by introducing an allometric parameter using the hyperbolic sine function. The integral solution to this was called hyperbolic Richard's growth model having transformed the solution from deterministic to a stochastic growth model. Its ability in model prediction was compared with the classical Richard's growth model an approach which mimicked the natural variability of heights/diameter increment with respect to age and therefore provides a more realistic height/diameter predictions using the coefficient of determination (R2), Mean Absolute Error (MAE) and Mean Square Error (MSE) results. The Kolmogorov-Smirnov test and Shapiro-Wilk test was also used to test the behavior of the error term for possible violations. The mean function of top height/Dbh over age using the two models under study predicted closely the observed values of top height/Dbh in the hyperbolic Richard's nonlinear growth models better than the classical Richard's growth model.

Keywords: height, Dbh, forest, Pinus caribaea, hyperbolic, Richard's, stochastic

Procedia PDF Downloads 454
12491 Forage Production Area Development in Bangkok Metropolitan Region

Authors: Thipayasothorn Pastraporn, Phonpakdee Rachadakorn, Ponpo Sopar

Abstract:

Forage production area development in Bangkok Metropolitan Region with an Agriculture in the city concept. Food chain of city man reduced distance of the food, so the food chain was a good attempt to connect the city’s product with the changes in each area of city. This paper purposed (I) to study the problems of using forage production area development in Bangkok Metropolitan Region, (II) to propose guidelines of forage production area development in Bangkok Metropolitan Region. We collected the data by questionnaire which we got from the agriculture, marketing and city plan sector in Bangkok Metropolitan Region. We analyzed the questionnaire in the way of relationship and guidelines of forage production area development in Bangkok Metropolitan Region. Results from the analyses are that the role of forage area productive plan in Bangkok Metropolitan Region is important to the cities for adapting in changing way of the food transmission. It also enhanced benefits using from cities fringe. Moreover, it managed watercourse and reduced energy consumption in order to sustainable distribute the food into the cities. .

Keywords: city plan, forage production area, urban development, Bangkok Metropolitan Region

Procedia PDF Downloads 336
12490 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 57
12489 Studying the Spatial Variations of Stable Isotopes (18O and 2H) in Precipitation and Groundwater Resources in Zagros Region

Authors: Mojtaba Heydarizad

Abstract:

Zagros mountain range is a very important precipitation zone in Iran as it receives high average annual precipitation compared to other parts of this country. Although this region is important precipitation zone in semi-arid an arid country like Iran, accurate method to study water resources in this region has not been applied yet. In this study, stable isotope δ18O content of precipitation and groundwater resources showed spatial variations across Zagros region as southern parts of Zagros region showed more enriched isotope values compared to the northern parts. This is normal as southern Zagros region is much drier with higher air temperature and evaporation compared to northern parts. In addition, the spatial variations of stable isotope δ18O in precipitation in Zagros region have been simulated by the models which consider the altitude and latitude variations as input to simulate δ18O in precipitation.

Keywords: groundwater, precipitation, simulation, stable isotopes, Zagros region

Procedia PDF Downloads 117
12488 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 73
12487 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 51
12486 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 332
12485 Exploring the Dark Side of IT Security: Delphi Study on Business’ Influencing Factors

Authors: Tizian Matschak, Ilja Nastjuk, Stephan Kühnel, Simon Trang

Abstract:

We argue that besides well-known primary effects of information security controls (ISCs), namely confidentiality, integrity, and availability, ISCs can also have secondary effects. For example, while IT can add business value through impacts on business processes, ISCs can be a barrier and distort the relationship between IT and organizational value through the impact on business processes. By applying the Delphi method with 28 experts, we derived 27 business process influence dimensions of ISCs. Defining and understanding these mechanisms can change the common understanding of the cost-benefit valuation of IT security investments and support managers' effective and efficient decision-making.

Keywords: business process dimensions, dark side of information security, Delphi study, IT security controls

Procedia PDF Downloads 90
12484 The Developing Method of Supply Chain Economy in Eurasia and North America

Authors: Tae Ho Kim

Abstract:

Using the center of gravity method, we intend to find the center of gravity of Eurasia and North America, focusing on the local population, and study economic development plans in Eurasia and North America. By analyzing the strengths and opportunities of an industrial location for each region, we find ways for the country to grow and develop. Through economic cooperation and support between countries, we want to reduce the cause of conflict and dispute through economic growth in countries or regions. Furthermore, we want to create conditions for peaceful and happy regions or countries. Eurasia and North America are rich in resources, have great growth potential in terms of global supply chains, and have a good position to develop further. By analyzing intimacy between countries using REM, a CRM method, we intend to transform it into a region where a hopeful future of peace and prosperity begins. The future can be transformed through positive thinking or love for humanity. Indicators of intimacy between countries or regions can also be created anew if they change how they view each other. The Earth we live on is facing great risks, such as climate change and war. In order to reduce this crisis and maintain peace and prosperity, we must cooperate with each other in new directions.

Keywords: supply chain economy, REM, Indicators of intimacy, peace and prosperity

Procedia PDF Downloads 39
12483 An Alternative Richards’ Growth Model Based on Hyperbolic Sine Function

Authors: Samuel Oluwafemi Oyamakin, Angela Unna Chukwu

Abstract:

Richrads growth equation being a generalized logistic growth equation was improved upon by introducing an allometric parameter using the hyperbolic sine function. The integral solution to this was called hyperbolic Richards growth model having transformed the solution from deterministic to a stochastic growth model. Its ability in model prediction was compared with the classical Richards growth model an approach which mimicked the natural variability of heights/diameter increment with respect to age and therefore provides a more realistic height/diameter predictions using the coefficient of determination (R2), Mean Absolute Error (MAE) and Mean Square Error (MSE) results. The Kolmogorov-Smirnov test and Shapiro-Wilk test was also used to test the behavior of the error term for possible violations. The mean function of top height/Dbh over age using the two models under study predicted closely the observed values of top height/Dbh in the hyperbolic Richards nonlinear growth models better than the classical Richards growth model.

Keywords: height, diameter at breast height, DBH, hyperbolic sine function, Pinus caribaea, Richards' growth model

Procedia PDF Downloads 371
12482 Effect of Plant Biostimulants on Fruit Set, Yield, and Quality Attributes of “Farbaly” Apricot Cultivar

Authors: A. Tarantino, F. Lops, G. Disciglio, E. Tarantino

Abstract:

Apulia region (southern Italy) is excellent for heavy production of apricot (Prunus armeniaca L.). Fruit quality is a combination of physical, chemical and nutritional characteristics. The present experiment was laid in the commercial orchard in Cerignola (Foggia district, Apulia region, 41°15’49’’N; 15°53’59’’E; 126 a.s.l.) during the 2014-2015 season. The experiment consisted of the use of three biostimulant treatments (Hendophyt®, Ergostim® and Radicon®) compared with untreated control on ‘Farbaly’ apricot cultivar, in order to evaluate the vegeto-productive and fruit qualitative attributes. Foliar spray of biostimulants was applied at different times during the growth season (at red ball, fruit setting and fruit development stages). Experimental data showed some specific differences among the biostimulant treatments, which fruit set, growth and productivity were affected. Moderate influences were found regarding the qualitative attributes of fruits. The soluble solid content was positively affected by Hendophyt® treatment. Antioxidant capacity was significantly higher in Hendophyt® and Radicon® treatments respect to the untreated control.

Keywords: Prunus Armeniaca L., biostimulants, fruit set, fruit quality

Procedia PDF Downloads 275
12481 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 185
12480 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 78
12479 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 311
12478 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 383
12477 Effects of Egg Yolk Peptide on the Retardation of Bone Growth Induced by Low-Calcium Diets

Authors: Kang-Hyun Leem, Myung-Gyou Kim, Hye Kyung Kim

Abstract:

Eggs have long been an important contributor to the nutritional quality of the human, and recognized as a very valuable source of proteins for human nutrition. Egg yolk is composed of various important chemical substances for human health. Growth means not only the increase of body weight but also the elongation of height and the enlargement of each organ's anatomical and morphological size. A calcium shortage causes the growth retardation on the body growth. In this study, we examined the therapeutic effects of egg yolk peptide (EYP) on the retardation of the longitudinal bone growth induced by low-calcium diet (0.05%) in adolescent rats. Low calcium diets were administrated for 15 days. During the last five days, calcium and/or vitamin D and/or EYP were administrated. The body weights, longitudinal bone growth rates, the heights of growth plates, and bone morphogenetic protein (BMP)-2 and insulin-like growth factor (IGF)-1 expressions were measured using histochemical analysis. Low calcium diets caused the significant reduction in body weight gains and the longitudinal bone growth. The heights of growth plates and the expressions of BMP-2 and IGF-1 showed the impairment of body growth as well. Calcium and/or vitamin D administration could not significantly increase the longitudinal bone growth. However, calcium, vitamin D, and EYP administration significantly increased the bone growth, the growth plate height, and BMP-2 and IGF-1 expressions. These results suggest that EYP enhances the longitudinal bone growth in the calcium and/or vitamin D deficiency and it could be a promising agent for the treatment of children suffering from malnutrition.

Keywords: egg yolk peptide, low-calcium diet, longitudinal bone growth, morphogenetic protein-2, insulin-like growth factor-1, vitamin D

Procedia PDF Downloads 425
12476 Finite Element and Experimental Investigation of Ductile Crack Growth of Surface Cracks

Authors: Osama A. Terfas, Abdelhakim A. Hameda, Abdusalam A. Alktiwi

Abstract:

An investigation on ductile crack growth of shallow semi-elliptical surface cracks with a/w=0.2, a/c=0.33 under bending was carried out, where a is the crack depth, w is the plate thickness and c is the crack length at surface. Finite element analysis and experiments were modelling and the crack growth model were verified with experimental data. The results showed that the initial crack shape was no longer maintained as the crack developed under ductile tearing. The maximum growth at the deepest point at early stages was stopped when the crack depth reached half thickness and growth occurred beneath surface. Excellent agreement in the crack shape patterns was observed between the experiments and the crack growth model.

Keywords: crack growth, ductile tearing, mean stress, surface cracks

Procedia PDF Downloads 460
12475 Immunohistochemical Expression of β-catenin and Epidermal Growth Factor Receptor in Adamantinomatous Craniopharyngioma

Authors: Ghada Esheba, Fatimah Alturkistani, Arwa Obaid, Ahdab Bashehab, Moayad Alturkistani

Abstract:

Introduction: Craniopharyngiomas (CPs) are rare epithelial tumors located mainly in the sellar/parasellar region. CPs have been classified histopathologically, genetically, clinically and prognostically into two distinctive subtypes: adamantinomatous and papillary variants. Aim: To examine the pattern of expression of both the β-catenin and epidermal growth factor receptor (EGFR) in surgically resected samples of adamantinomatous CP, and to asses for the possibility of using anti-EGFR in the management of ACP patients. Materials and methods: β-catenin and EGFR immunostaining was performed on paraffin-embedded tissue sections of 18 ACP cases. Result: 17 out of 18 cases (94%) of ACP exhibited strong nuclear/cytoplasmic expression of β-catenin, 15 (83%) of APC cases were positive for EGFR. Conclusion: Nuclear accumulation of β-catenin is a diagnostic hallmark of ACP. EGFR positivity in most cases of ACP could qualify the use of anti-EGFR therapy. 

Keywords: craniopharyngioma, adamantinomatous, papillary, epidermal growth factor receptor, B-catenin

Procedia PDF Downloads 207
12474 Determinants of Dividend Payout Ratio: Evidence form MENA Region

Authors: Abdul-Nasser El-Kassar, Walid Elgammal, Hisham Jawhar

Abstract:

This paper studies the determinants of the dividends payout ratio. The factors affecting the dividends payout ratio are to be identified. The study focuses only on the cement and construction industry within the MENA region in an attempt to isolate any incoherent behavior. The factors under consideration are: sales growth, ROE, ROA, ROS, debt to equity ratio, firm size, and free cash flow. Data were collected from official stock exchange markets in addition to annual reports. The study considered all firms that paid dividend in each of the three consecutive years starting from 2010 till 2012. Out of the 123 listed firms that work in cement and construction industry in MENA region, only 19 paid dividends in the three consecutive years 2010-12. Our sample consists of the 19 firms (57 observations) which are selected according to purposive sampling. Moreover, the study uses the homogeneous subcategory within the purposive sampling since only similar firms in the construction industry had been examined. The outcome of the study provides a vital insight into the determinants of dividends payout ratio of companies in MENA region. The results showed that the dividend payout ratio has a strong and positive relationship with return on assets and strong but negative relationship with return on equity. On the other hand, the results detected weak relationships between dividend payout ratio and sale growth, debt to equity ratio, firm size, and free cash flow. The study suggests that board of directors tend to compensate shareholders and minimize the agency cost by distributing a high portion of profits in form of dividends whenever return on equity decreases. Also, when the performance of the firm improves, and hence return on assets increases, boards of directors are more generous in distributing profits.

Keywords: dividends payout ratio, profitability firm size, free cashflow, debt to equity ratio

Procedia PDF Downloads 337
12473 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 440
12472 Together - A Decentralized Application Connects Ideas and Investors

Authors: Chandragiri Nagadeep, M. V. V. S. Durga, Sadu Mahikshith

Abstract:

Future generation is depended on new ideas and innovations that develops the country economical growth and technology standards so, Startups plays an important role in satisfying above goals. Startups includes support which is given by investing into it by investors but, single digit investors can’t keep supporting one startup and lot of security problems occurs while transferring large funds to startup’s bank account. Targeting security and most supportive funding, TogEther solves these issues by providing a platform where “Crowd Funding” is available in a decentralized way such that funding is done with digital currency called cryptocurrency where transactions are done in a secured way using “Block Chain Technology”. Not only Funding but also Ideas along with their documents can be presented and hosted with help of IPFS (Inter Planetary File System).

Keywords: blockchain, ethereum, web3, reactjs, interplanetary file system, funding

Procedia PDF Downloads 191
12471 EcoMush: Mapping Sustainable Mushroom Production in Bangladesh

Authors: A. A. Sadia, A. Emdad, E. Hossain

Abstract:

The increasing importance of mushrooms as a source of nutrition, health benefits, and even potential cancer treatment has raised awareness of the impact of climate-sensitive variables on their cultivation. Factors like temperature, relative humidity, air quality, and substrate composition play pivotal roles in shaping mushroom growth, especially in Bangladesh. Oyster mushrooms, a commonly cultivated variety in this region, are particularly vulnerable to climate fluctuations. This research explores the climatic dynamics affecting oyster mushroom cultivation and, presents an approach to address these challenges and provides tangible solutions to fortify the agro-economy, ensure food security, and promote the sustainability of this crucial food source. Using climate and production data, this study evaluates the performance of three clustering algorithms -KMeans, OPTICS, and BIRCH- based on various quality metrics. While each algorithm demonstrates specific strengths, the findings provide insights into their effectiveness for this specific dataset. The results yield essential information, pinpointing the optimal temperature range of 13°C-22°C, the unfavorable temperature threshold of 28°C and above, and the ideal relative humidity range of 75-85% with the suitable production regions in three different seasons: Kharif-1, 2, and Robi. Additionally, a user-friendly web application is developed to support mushroom farmers in making well-informed decisions about their cultivation practices. This platform offers valuable insights into the most advantageous periods for oyster mushroom farming, with the overarching goal of enhancing the efficiency and profitability of mushroom farming.

Keywords: climate variability, mushroom cultivation, clustering techniques, food security, sustainability, web-application

Procedia PDF Downloads 42
12470 Engaging with Security and State from a Gendered Lens in the South Asian Context: Indian State’s Construction of Internal Security and State Responses

Authors: Pooja Bakshi

Abstract:

In the following paper, an attempt would be made to engage with the relationship between the state and the imperatives of security from a gendered lens. This will be juxtaposed with the feminist engagement with International Law. Theorizations from the literature on South Asian politics and Global politics would be applied to the manner in which the Indian state has defined and proposed to deal with concerns of internal security pertaining to the ‘Left Wing Extremism’ in 2010-2011. It would be argued that the state needs to be disaggregated into the legislature, executive and the judiciary; since there are times when some institutional parts of the state provide space for progressive democratic engagement whilst other institutions don’t. The specific contours of violence faced by women and children at the hands of the state, in the above-mentioned discourse would also be examined. In the end, implications of the security state discourse on debates in International Law would be elaborated.

Keywords: feminist engagement, human rights, state response to left extremism, security studies in South Asia

Procedia PDF Downloads 479
12469 Magneto-Optical Properties in Transparent Region of Implanted Garnet Films

Authors: Lali Kalanadzde

Abstract:

We investigated magneto-optical Kerr effect in transparent region of implanted ferrite-garnet films for the (YBiCa)3(FeGe)5O12. The implantation process was carried out at room temperature by Ne+ ions with energy of 100 KeV and with various doses (0.5-2.5) 1014 ion/cm2. We discovered that slight deviation of the plane of external alternating magnetic field from plane of sample leads to appearance intensive magneto-optical maximum in transparent region of garnet films ħω=0.5-2.0 eV. In the proceeding, we have also found that the deviation of polarization plane from P- component of incident light leads to the appearance of the similar magneto-optical effects in this region. The research of magnetization processes in transparent region of garnet films showed that the formation of magneto-optical effects in region ħω=0.5-2.3 eV has a rather complex character.

Keywords: ferrite-garnet films, ion implantation, magneto-optical, thin films

Procedia PDF Downloads 286
12468 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia

Authors: Clara Voyvodic

Abstract:

Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.

Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences

Procedia PDF Downloads 112