Search results for: European security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4207

Search results for: European security

3937 Cultural Event and Urban Regeneration: Lessons from Liverpool as the 2008 European Capital of Culture

Authors: Yi-De Liu

Abstract:

For many European cities, a key motivation in developing event strategies is to use event as a catalyst for urban regeneration. One type of event that is particularly used as a means of urban development is the European Capital of Culture (ECOC) initiative. Based on a case study of the 2008 ECOC Liverpool, this paper aims at conceptualising the significance of major event for a city’s economic, cultural and social regenerations. In terms of economic regeneration, the role of the ECOC is central in creating Liverpool’s visitor economy and reshaping city image. Liverpool planned different themes for eight consecutive years as a way to ensure economic sustainability. As far as cultural regeneration is concerned, the ECOC contributed to the cultural regeneration of Liverpool by stimulating cultural participation and interest from the demand side, as well as improving cultural provision and collaboration within the cultural sector from the supply side. So as to social regeneration, Liverpool treated access development as a policy guideline and considered the ECOC as an opportunity to enhance the sense of place. The most significant lesson learned from Liverpool is its long-term planning and efforts made to integrate the ECOC into the overall urban development strategy. As a result, a more balanced and long-term effect on urban regeneration could be achieved.

Keywords: cultural event, urban regeneration, european capital of culture, Liverpool

Procedia PDF Downloads 241
3936 Changes in Amino Acids Content in Muscle of European Eel (Anguilla anguilla) in Relation to Body Size

Authors: L. Gómez-Limia, I. Franco, T. Blanco, S. Martínez

Abstract:

European eels (Anguilla anguilla) belong to Anguilliformes order and Anguillidae family. They are generally classified as warm-water fish. Eels have a great commercial value in Europe and Asian countries. Eels can reach high weights, although their commercial size is relatively low in some countries. The capture of larger eels would facilitate the recovery of the species, as well as having a greater number of either glass eels or elvers for aquaculture. In the last years, the demand and the price of eels have increased significantly. However, European eel is considered critically endangered by the International Union for the Conservation of Nature (IUCN) Red List. The biochemical composition of fishes is an important aspect of quality and affects the nutritional value and consumption quality of fish. In addition, knowing this composition can help predict an individual’s condition for their recovery. Fish is known to be important source of protein rich in essential amino acids. However, there is very little information about changes in amino acids composition of European eels with increase in size. The aim of this study was to evaluate the effect of two different weight categories on the amino acids content in muscle tissue of wild European eels. European eels were caught in River Ulla (Galicia, NW Spain), during winter. The eels were slaughtered in ice water immersion. Then, they were purchased and transferred to the laboratory. The eels were subdivided into two groups, according to the weight. The samples were kept frozen (-20 °C) until their analysis. Frozen eels were defrosted and the white muscle between the head and the anal hole. was extracted, in order to obtain amino acids composition. Thirty eels for each group were used. Liquid chromatography was used for separation and quantification of amino a cids. The results conclude that the eels are rich in glutamic acid, leucine, lysine, threonine, valine, isoleucine and phenylalanine. The analysis showed that there are significant differences (p < 0.05) among the eels with different sizes. Histidine, threonine, lysine, hydroxyproline, serine, glycine, arginine, alanine and proline were higher in small eels. European eels muscle presents between 45 and 46% of essential amino acids in the total amino acids. European eels have a well-balanced and high quality protein source in the respect of E/NE ratio. However, eels with higher weight showed a better ratio of essential and non-essential amino acid.

Keywords: European eels, amino acids, HPLC, body size

Procedia PDF Downloads 78
3935 Study on the OTP Authentication Method and Security for User Mobility in the Cloud

Authors: Jong-Won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.

Keywords: cloud, OTP, mobility, security, authentication

Procedia PDF Downloads 330
3934 Equality at Home and Equality at Work: The Effect of European Court of Human Rights Jurisprudence on Turkish Gender Policy

Authors: Olgun Akbulut

Abstract:

Turkey has entered in the European human rights monitoring in the early 1990s. Since then many improvements have been observed in domestic law. However, one area stays the least developed one: gender discrimination. Although the country is proud of the fact that electoral rights for women were recognized in Turkey even before many developed countries in the west, interestingly the first Turkish case where the European Court of Human Rights (ECrtHR) found discrimination concerned gender discrimination. With the proposed paper, the author is willing to determine and analyze the findings of the ECrtHR in cases decided against Turkey concerning gender discrimination, identify whether Turkish public institutions display coordination in engagement or disengagement in implementing the judgments where the ECrtHR found discrimination on the basis of gender and evaluate the effectiveness of the Court's jurisprudence on Turkish gender policy.

Keywords: equality, gender discrimination, human rights, Turkey

Procedia PDF Downloads 330
3933 Quantitative Analysis of the Trade Potential of the United States with Members of the European Union: A Gravity Model Approach

Authors: Zahid Ahmad, Nauman Ali

Abstract:

This study has estimated the trade between USA and individual members of European Union using Gravity Model of Trade as The USA has a complex trade relationship with the European countries consist of a large number of consumers, which make USA dependent on EU for major of its total world trade. However, among the member of EU, the trade potential of USA with individual members of EU is not known. Panel data techniques e.g. Random Effect, Fixed Effect and Pooled Panel have been applied to secondary quantitative data to analyze the Trade between USA and EU. Trade Potential of USA with individual members of EU has been obtained using the ratio of Actual trade of USA with EU members and the trade as predicted by Gravity Model. The Study concluded that the USA has greater trade potential with 16 members of EU, including Croatia, Portugal and United Kingdom on top. On the other hand, Finland, Ireland, and France are the top countries with which the USA has exhaustive trade potential.

Keywords: analytical technique, economic, gravity, international trade, significant

Procedia PDF Downloads 268
3932 Status of the European Atlas of Natural Radiation

Authors: G. Cinelli, T. Tollefsen, P. Bossew, V. Gruber, R. Braga, M. A. Hernández-Ceballos, M. De Cort

Abstract:

In 2006, the Joint Research Centre (JRC) of the European Commission started the project of the 'European Atlas of Natural Radiation'. The Atlas aims at preparing a collection of maps of Europe displaying the levels of natural radioactivity caused by different sources (indoor and outdoor radon, cosmic radiation, terrestrial radionuclides, terrestrial gamma radiation, etc). The overall goal of the project is to estimate, in geographical resolution, the annual dose that the public may receive from natural radioactivity, combining all the information from the different radiation components. The first map which has been developed is the European map of indoor radon (Rn) since in most cases Rn is the most important contribution to exposure. New versions of the map are realised when new countries join the project or when already participating countries send new data. We show the latest status of this map which currently includes 25 European countries. Second, the JRC has undertaken to map a variable which measures 'what earth delivers' in terms of Rn. The corresponding quantity is called geogenic radon potential (RP). Due to the heterogeneity of data sources across the Europe there is need to develop a harmonized quantity which at the one hand adequately measures or classifies the RP, and on the other hand is suited to accommodate the variety of input data used to estimate this target quantity. Candidates for input quantities which may serve as predictors of the RP, and for which data are available across Europe, to different extent, are Uranium (U) concentration in rocks and soils, soil gas radon and soil permeability, terrestrial gamma dose rate, geological information and indoor data from ground floor. The European Geogenic Radon Map gives the possibility to characterize areas, on European geographical scale, for radon hazard where indoor radon measurements are not available. Parallel to ongoing work on the European Indoor Radon, Geogenic Radon and Cosmic Radiation Maps, we made progress in the development of maps of terrestrial gamma radiation and U, Th and K concentrations in soil and bedrock. We show the first, preliminary map of the terrestrial gamma dose rate, estimated using the data of ambient dose equivalent rate available from the EURDEP system (about 5000 fixed monitoring stations across Europe). Also, the first maps of U, Th, and K concentrations in soil and bedrock are shown in the present work.

Keywords: Europe, natural radiation, mapping, indoor radon

Procedia PDF Downloads 269
3931 The Challenge of Assessing Social AI Threats

Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi

Abstract:

The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.

Keywords: social threats, artificial Intelligence, mitigation, social experiment

Procedia PDF Downloads 28
3930 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 431
3929 Mechanisms for Strategic Adoption of Innovation Procurement

Authors: Carolina B. A. Morais, Antonio Bob Santos

Abstract:

In order to determine how innovation procurement can strengthen public efficiency and foster the modernization of public services, while at the same time promoting the opening of new private markets, this paper aims to present the two key instruments for the practice of innovation procurement at a European, national, and regional level – Pre-Commercial Procurement (PCP), and Public Procurement of Innovative Solutions (PPI). Thus, it starts with a theoretical framework on the emergence of this topic in the European Innovation Policy (Section 2), then continues with the identification and systematization of the main mechanisms for its effective adoption, both on the demand and supply side of the market (Section 3), as well as to expose and describe methods and tools for positioning innovation at the heart of public entities. The innovative projects best distinguished by the European Commission for their good practices in innovation procurement are identified, and the main methodology for the development and management of innovation procurement – Forward Commitment Procurement (FCP) – is applied to them in a pioneering way (Section 4). The relevance of innovation in public procurement is systematized and reflected upon in Section 5.

Keywords: innovation procurement, innovation policy, innovation, pubic procurement

Procedia PDF Downloads 73
3928 Post-Covid 19 Pandemic Economy: Corporate Governance and Performance of Private Security Firms in Kenya

Authors: Sewe Silvanus Odhiambo

Abstract:

Globally, many governments have publicly recognized private security firms as essential services providers. The private security firms face a lot of challenges, but the COVID-19 situation also has exacerbated them to another level. This paper locates its relevance in the post-coronavirus era. The COVID-19 pandemic has redefined the world operation, which shows a higher impact on the security field. Accordingly, the purpose of the study was to examine the role of corporate governance on the performance of private security firms in a post-covid pandemic era in Kenya. The study employed a descriptive research design, which included a quantitative approach and secondary data. The study was carried in the month of July 2021 from the registered private security firms. After targeting all private security firms, only 54 firms had disclosed their annual report by the time of conducting the study. The results depicted that pandemic has affected the performance of private security firms measures unfavorably. Further, boards of directors show a positive association with security firm performance. The study recommends that there is need board of directors to enhance management’s risk assessments in the midst of COVID-19; ensure that there are business continuity plans; there is organizational resilience; there is need for the development of new digital strategies; enabling the digital workforce in the firms and have effective communication plans with both internal and external stakeholders to deal with uncertainties and develop more post-COVID practices for boards of directors to improve performance of private security firms in Kenya. The practical implications of the study are that the research outcomes might assist regulatory bodies, investors, policymakers, and the security sector in general in their formulation of public and corporate governance strategies concerning future emergency preparedness and responses. This study also provides a unique contribution to the literature of COVID-19 and security firm performance in emerging economies context.

Keywords: COVID-19, corporate governance, firm performance, private security firms

Procedia PDF Downloads 133
3927 Branding Destination for Major Event: A Case Study of Liverpool as the 2008 European Capital of Culture

Authors: Yi-De Liu

Abstract:

Destination branding is a popular practice adopted by many cities in the context of intensified tourism competition. However, branding for major event is a relatively new domain in the studies of destination marketing. Based on a case study of Liverpool as the 2008 European Capital of Culture, the aim of this paper is to explore the effectiveness of the key branding campaign - the ‘Look of the City’ programme. This study looks at quantitative data collected from on-street face-to-face survey. 611 questionnaires were distributed to and collected from local residents, visitors from the immediate hinterland, domestic tourists and overseas visitors. The analysis is done, first by investigating respondents’ impression on the Liverpool 08 brand and the branding campaign, and then by exploring the effects of campaign. The positioning of Liverpool compared with other similar cities is addressed in the end. The final section extracts lessons from this empirical investigation.

Keywords: destination branding, major event, European capital of culture, Liverpool

Procedia PDF Downloads 295
3926 Electricity Generation from Renewables and Targets: An Application of Multivariate Statistical Techniques

Authors: Filiz Ersoz, Taner Ersoz, Tugrul Bayraktar

Abstract:

Renewable energy is referred to as "clean energy" and common popular support for the use of renewable energy (RE) is to provide electricity with zero carbon dioxide emissions. This study provides useful insight into the European Union (EU) RE, especially, into electricity generation obtained from renewables, and their targets. The objective of this study is to identify groups of European countries, using multivariate statistical analysis and selected indicators. The hierarchical clustering method is used to decide the number of clusters for EU countries. The conducted statistical hierarchical cluster analysis is based on the Ward’s clustering method and squared Euclidean distances. Hierarchical cluster analysis identified eight distinct clusters of European countries. Then, non-hierarchical clustering (k-means) method was applied. Discriminant analysis was used to determine the validity of the results with data normalized by Z score transformation. To explore the relationship between the selected indicators, correlation coefficients were computed. The results of the study reveal the current situation of RE in European Union Member States.

Keywords: share of electricity generation, k-means clustering, discriminant, CO2 emission

Procedia PDF Downloads 393
3925 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 65
3924 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 25
3923 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 343
3922 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 346
3921 European Project Meter Matters in Sports: Fostering Criteria for Inclusion through Sport

Authors: Maria Campos, Alain Massart, Hugo Sarmento

Abstract:

The Meter Matters Erasmus Sport European Project (ID: 101050372) explores the field of social inclusion in and through sports with the aim of a) proposing appropriate criteria for co-funding sports programs involving people with intellectual and developmental disabilities and other more vulnerable people, primarily in mainstream sports organizations and b) proposing a model for co-funding social inclusion in and through sports at the national level. This European project (2022-2024) involves 6 partners from 3 countries: Univerza V Ljubljani – coordinator and Drustvo Specialna Olimpiada Slovenije (Slovenia); Magyar Specialis Olimpia Szovetseg and Magyar Testnevelesi Es Sporttudomanyi Egyetem (Hungary) and APPDA Coimbra - Associação Portuguesa para as Perturbações do Desenvolvimento e Autismo and Universidade De Coimbra, Faculty of Sport Sciences and Physical Education (Portugal). Equal involvement of all people in sports activities is, in terms of national and international guidelines, enshrined in some conventions and strategies in the field of sports, as well as human rights, social security, physical and mental health, architecture, environment and public administration. However, there is a gap between the practice and EU guidelines in terms of sustainable support for socially inclusive sports programs in the form of co-funding by state and local (municipal) resources. We observe considerable opacity in the regulation of the field. Given that there are both relevant programs and inclusive legislation and policies, we believe that the reason for the missing article is reflected in the undeveloped criteria for measuring social inclusion in sports. Major sports programs are usually co-funded based on crowds (number of involved athletes) and performance (sports score). In the field of social inclusion in sports, the criteria cannot be the same, as it is a smaller population. Therefore, the goals of inclusion in sports should not be the focused on competitive results but on opening equal opportunities for all, regardless of their psychophysical abilities. In the Meter Matters program, we are searching for criteria for co-funding social inclusion in sports through focus groups with coaches, social workers, psychologists and others professionals involved in inclusive sports programs in regular sports clubs and with athletes and their parents or guardians. Moreover, experts in the field of social inclusion in sports were also interviewed. Based on the proposals for measuring social inclusion in sports, we developed a model for co-funding socially inclusive sports programs.

Keywords: European project, meter matters, inclusion, sport

Procedia PDF Downloads 80
3920 Comparison of Injuries and Accidents Globally and in Finland

Authors: R. Pääkkönen, L. Korpinen

Abstract:

We tried statistically to determine the biggest risks for accidents and injuries in Finland compared to other countries. We have a very high incidence of domestic falls and accidental poisoning compared to other European countries. On the other side, we have a relatively low number of accidents in traffic or at work globally, and in European scale, because we have worked hard to diminish these forms of accidents. In Finland, there is work to be done to improve attitudes and actions against domestic accidents.

Keywords: injuries, accident, comparison, Finland

Procedia PDF Downloads 199
3919 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 400
3918 Pricing European Continuous-Installment Options under Regime-Switching Models

Authors: Saghar Heidari

Abstract:

In this paper, we study the valuation problem of European continuous-installment options under Markov-modulated models with a partial differential equation approach. Due to the opportunity for continuing or stopping to pay installments, the valuation problem under regime-switching models can be formulated as coupled partial differential equations (CPDE) with free boundary features. To value the installment options, we express the truncated CPDE as a linear complementarity problem (LCP), then a finite element method is proposed to solve the resulted variational inequality. Under some appropriate assumptions, we establish the stability of the method and illustrate some numerical results to examine the rate of convergence and accuracy of the proposed method for the pricing problem under the regime-switching model.

Keywords: continuous-installment option, European option, regime-switching model, finite element method

Procedia PDF Downloads 110
3917 The Legal Personality of The Security Council

Authors: Helyeh Doutaghi

Abstract:

The United Nations Security Council (UNSC) is one of the six principal organs of the United Nations. Under the Charter of the United Nations (UN Charter), the UNSC’s primary responsibility is maintaining international peace and security, which it does through establishing and adopting a Security Council resolution. United Nations resolutions are formal expressions of the opinion or will of United Nations organs. However, there have been times when powerful politicians (or governments with great political power) had the first say in situations where the UNSC should have had jurisdiction based on the principle of rule of law, which is the notion that people are governed by the law rather than by officials. This paper will assess the effectiveness of the UNSC by analyzing its actions during the Iran-Iraq war for it has been found that one of the major reasons for the prolongation of the war was a result of the one-sided positions taken by the UNSC and many nations. The UNSC’s success in achieving its primary goal during the war will be discussed, including an examination of the duties and structure of the UNSC by reviewing the articles in the UN Charter; this will include examples of the UNSC’s role in other international disputes as well.

Keywords: UN Security Council, Iran, Iraq, charter, international law

Procedia PDF Downloads 424
3916 Adult Education for Transformation and Security Challenges in Nigeria

Authors: Asmau Zarma Gogaram

Abstract:

The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education.

Keywords: adult education, transformation and security challenges, Nigeria, education and human development

Procedia PDF Downloads 483
3915 International Education Mobility Programs: Inclusive by Definition, Exclusive in Practice

Authors: Mateusz Jeżowski, Jadwiga Fila, Paweł Poszytek

Abstract:

This abstract summarizes the combined findings of several analyses carried out by the authors on the barriers to accessing international education mobility programs by people with fewer opportunities, especially those with a low level of cultural and social capital. Two flagship educational mobility initiatives of the European Union – the Erasmus+ Program and the European Solidarity Corps are aimed at equipping young people and participants of all ages with the qualifications and skills needed for their meaningful participation in a democratic society intercultural understanding and successful transition in the labour market. The heart of these programs is to come closer to people with fewer opportunities, including people with disabilities, migrants, as well as those facing socio-economic difficulties and displaying a low level of social and cultural capital. Still, people who participate in such initiatives usually demonstrate higher than average cultural and social capital, as understood by Pierre Bourdieu. First of all, the educational attainment of their parents is higher than the average. Secondly, they mostly live in large agglomerations, with good access to education and culture, which affects their foreign language skills as well as social and cultural competencies. Finally, participation in Erasmus+ Program or European Solidarity Corps is not their first educational mobility experience. It is therefore justified to state that their social and cultural capital, already high before taking part in Erasmus+ and European Solidarity Corps, becomes even higher once their international mobility activities have been over, at the expense of those people with fewer opportunities, who, in theory, could participate in those initiatives, nonetheless did not, for the following reasons: lack of sufficient information on such programs, financial obstacles or unappreciation of the value of international mobility. In their work, the authors will discuss what are, in the light of Bourdieu’s perception of social and cultural capital, the main obstacles for young people to participate in international mobility programs of the European Union and will offer comprehensive solutions rooted in their vast experience in management and implementation of Erasmus+ Program and European Solidarity Corps.

Keywords: cultural capital, educational mobility, Erasmus+, European solidarity corps, inclusion, social capital

Procedia PDF Downloads 91
3914 Internet Purchases in European Union Countries: Multiple Linear Regression Approach

Authors: Ksenija Dumičić, Anita Čeh Časni, Irena Palić

Abstract:

This paper examines economic and Information and Communication Technology (ICT) development influence on recently increasing Internet purchases by individuals for European Union member states. After a growing trend for Internet purchases in EU27 was noticed, all possible regression analysis was applied using nine independent variables in 2011. Finally, two linear regression models were studied in detail. Conducted simple linear regression analysis confirmed the research hypothesis that the Internet purchases in analysed EU countries is positively correlated with statistically significant variable Gross Domestic Product per capita (GDPpc). Also, analysed multiple linear regression model with four regressors, showing ICT development level, indicates that ICT development is crucial for explaining the Internet purchases by individuals, confirming the research hypothesis.

Keywords: European union, Internet purchases, multiple linear regression model, outlier

Procedia PDF Downloads 277
3913 The Power of “Merkiavelli”: Representations of Angela Merkel in the Portuguese Press (2008-2015)

Authors: Ana Mouro, Ana Ramalheira

Abstract:

Since 1989, with the Fall of the Berlin Wall, Germany has undergone a profound restructuring political and economic process. When the Euro Crisis broke out, Germany was no longer the “sick man” of Europe. Instead, it had recovered its dominance as the strongest and wealthiest economy within the European Union. With the European Debt Crisis, that has been taking place in the European Union since the end of 2009, Germany´s Chancellor Angela Merkel has gained the power of deciding, so to say, on the fate of the debtor nations, but she neither stands for binding German commitments, nor refuses assistance. A debate on whether Merkel’s hesitation has been deliberated and used as a means of coercion has arisen on international print media, and the Portuguese Press has been no exception. This study, which was conducted by using news reporting, opinion articles, interviews and editorials, published in the Portuguese weekly Expresso and the daily Público, from 2008 to 2015, tries to show how Merkel’s hesitation, depicted in the press by the term “Merkiavelli”, was perceived in Portugal, a country that had to embrace the austerity measures, imposed by the European Central Bank, but defined under Angela Merkel´s leading role.

Keywords: Euro crisis, “Merkiavelli”, cultural studies, Portuguese quality press

Procedia PDF Downloads 224
3912 Enhancing Food Security through Cabbage Production by Local Fammers in Nkokobe Municipality

Authors: Sipumle Qapeshu, Bongiwe Mcata, Ajuruchukwu Obi

Abstract:

Subsistence farmers practice farming for survival while commercial farmers produce to feed themselves and larger society with the motive to achieve highest profit. These types of farmers are characterised by growing what they eat, live without making regular purchases in the markets. The main objective of subsistence/peasant farmers is to ensure food security at household level. Cabbage is a crop that has been identified to have vital food nutrient sources like Vitamin A, B and C, protein, calcium, iron and antioxidative compounds beneficial for preventing cancer. This paper, therefore, looks at the potential that cabbage production has in enhancing household food security and also the challenges encountered by these cabbage producers. Primary data was obtained from 50 respondents, and linear regression model was used to analyse the data used. Income was used as food security measure. The results showed that three variables were statistically significant and they are gender (10%), education (5%) and household size (5%). Meaning that these are variables that influenced cabbage production by these households, and it also affects their food security status since income is affected.

Keywords: subsistence farmers, food security, cabbage, farming

Procedia PDF Downloads 268
3911 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 37
3910 The Right to a Fair Trial in French and Spanish Constitutional Law

Authors: Chloe Fauchon

Abstract:

In Europe, the right to a fair trial is enshrined in the European Convention on Human Rights, signed in 1950, in its famous Article 6, and, in the field of the European Union, in Article 47 of the Charter of Fundamental Rights, binding since 2009. The right to a fair trial is, therefore, a fundamental right protected by all the relevant treaties. The right to a fair trial is an "umbrella right" which encompasses various sub-rights and principles. Although this right applies in all the proceedings, it gets a special relevance in criminal matters and, particularly, regarding the defendant. In criminal proceedings, the parties are not equal: the accusation is represented by a State-organ, with specific prerogatives, and the defense does not benefit from these specific powers and is often inexperienced in criminal law. Equality of arms, and consequently the right to a fair trial, needs some specific mechanisms to be effective in criminal proceedings. For instance, the defendant benefits from some procedural rights, such as the right to a lawyer, the right to be informed of the charges against them, the right to confront witnesses, and so on. These rights aim to give the defendant the tools to dispute the accusation. The role of the defense is, therefore, very important in criminal matters to avoid unjustified convictions. This specificity of criminal matters justifies that the focus will be put on them during this study. Then this paper will also focus on French and Spanish legal orders. Indeed, if the European Court and Convention on Human Rights are the most famous instruments to protect the right to a fair trial, this right is also guaranteed at a constitutional level in European national legal orders in Europe. However, this enshrinement differs from one country to the other: for instance, in Spain, the right to a fair trial is protected explicitly by the 1978 constitutional text, whereas, in France, it is more of a case-law construction. Nevertheless, this difference between both legal orders does not imply huge variations in the substantive aspect of the right to a fair trial. This can be specifically explained by the submission of both States to the European Convention on Human Rights. This work aims to show that, although the French and Spanish legal orders differ in the way they protect the right to a fair trial, this right eventually has the same substantive meaning in both legal orders.

Keywords: right to a fair trial, constitutional law, French law, Spanish law, European Court of Human Rights

Procedia PDF Downloads 33
3909 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 530
3908 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia

Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana

Abstract:

Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.

Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom

Procedia PDF Downloads 418