Search results for: European security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4207

Search results for: European security

4177 Scenario Analysis to Assess the Competitiveness of Hydrogen in Securing the Italian Energy System

Authors: Gianvito Colucci, Valeria Di Cosmo, Matteo Nicoli, Orsola Maria Robasto, Laura Savoldi

Abstract:

The hydrogen value chain deployment is likely to be boosted in the near term by the energy security measures planned by European countries to face the recent energy crisis. In this context, some countries are recognized to have a crucial role in the geopolitics of hydrogen as importers, consumers and exporters. According to the European Hydrogen Backbone Initiative, Italy would be part of one of the 5 corridors that will shape the European hydrogen market. However, the set targets are very ambitious and require large investments to rapidly develop effective hydrogen policies: in this regard, scenario analysis is becoming increasingly important to support energy planning, and energy system optimization models appear to be suitable tools to quantitively carry on that kind of analysis. The work aims to assess the competitiveness of hydrogen in contributing to the Italian energy security in the coming years, under different price and import conditions, using the energy system model TEMOA-Italy. A wide spectrum of hydrogen technologies is included in the analysis, covering the production, storage, delivery, and end-uses stages. National production from fossil fuels with and without CCS, as well as electrolysis and import of low-carbon hydrogen from North Africa, are the supply solutions that would compete with other ones, such as natural gas, biomethane and electricity value chains, to satisfy sectoral energy needs (transport, industry, buildings, agriculture). Scenario analysis is then used to study the competition under different price and import conditions. The use of TEMOA-Italy allows the work to catch the interaction between the economy and technological detail, which is much needed in the energy policies assessment, while the transparency of the analysis and of the results is ensured by the full accessibility of the TEMOA open-source modeling framework.

Keywords: energy security, energy system optimization models, hydrogen, natural gas, open-source modeling, scenario analysis, TEMOA

Procedia PDF Downloads 74
4176 Entrepreneurial Education in the European Union

Authors: Marko Kolaković, Mladen Turuk

Abstract:

Entrepreneurship is a valuable discipline important for the competitiveness of the European economy. The European Union's economy is constantly changing, and there is an increased demand for special knowledge and skills to help actors cope in a turbulent business environment. By promoting entrepreneurship in education, the citizens of the European Union are encouraged to be enterprising, innovative, and creative in designing solutions to perceived commercial and social problems in the form of offered products and services created as a result of the entrepreneurial process. The European Union has developed a series of guidelines to encourage entrepreneurship in education and training, and it supports entrepreneurship itself through various activities such as Erasmus + and other programs. A number of tools have been developed to support the development of entrepreneurial spirit among the citizens of the European Union. Special emphasis is placed on the methods of developing creativity, critical thinking, and the development of digital competencies. The aim of this paper is to investigate the initiatives of the European Union in the field of entrepreneurship education and to analyze the concept of entrepreneurship education in selected EU member states. Also, an overview of the desired learning outcomes acquired as a result of the successfully completed entrepreneurship education process will be provided.

Keywords: entrepreneurship, entrepreneurial education, EU, croatia

Procedia PDF Downloads 93
4175 Economic Conflict between the United Kingdom and the European Community 1945-1975

Authors: Soumia Hebbri

Abstract:

The relationship between Britain and the European Union is phenomenally complex with a great opposition to Europe in the British Conservative and Labour Parties emerged since 1945. During the history and development of the European Union, Europe saw a lack of British involvement until 1961, after refusing to sign the Treaties of Rome of 1957 for being a member of the European Economic Community. Britain then applied to join the EEC in 1961 under Harold Macmillan’s Conservative Government, its application led by the Chief Negotiator Edward Heath. This application was vetoed by President de Gaulle. With de Gaulle out of power Britain. finally could joined in 1973. But again Labour and conservative both found themselves divided on the issue and they hold a referendum under labour on whether to continue the UK’s membership.

Keywords: the European Union, the British, economic community, de Gaulle

Procedia PDF Downloads 463
4174 Conditionality in the European Union as a New Instrument to Guarantee the Principle of Separation of Powers

Authors: Ana Neves

Abstract:

The European Union’s multi-level constitutionalism is grounded in an intricate network of vertical and horizontal legal relationships among different levels and types of public authorities. In a very significant way since the 2008 crisis, evolving institutional arrangements and institutional dynamics in the European Union have been progressively impacting Member States and the terms under which national public authorities are organised, interact and exercise their powers. This impact occurs in both macro and micro dimensions. Several examples are relevant here, such as the involvement of national Parliaments in the activities of the European Union, the enhanced integration of public administrations, the side effects of the Council framework decision on the European Arrest Warrant, the European Union Justice Scoreboard, the protection of whistle-blowers regulation, the enhanced cooperation on the establishment of the European Public Prosecutor’s Office, the regime for the protection of the Union budget and the European Rule of Law Mechanism. A common trend or denominator underlies the deepening of institutional interdependence and the increased interactions between the European Union, Member States, and public authorities at different levels. This seems to be conditionality as a general principle. The European multi-level constitutionalism must be considered in the light of this conditionality principle, which does not “imply a relationship of command and obedience”. Nevertheless, it might be more effective or be a very compelling principle. It is as if the extension of the shared rule is being accompanied by a contrapuntal dialogue. The different public authorities at various levels are being called to rethink and readjust themselves within a broader and more plural framework concerning understanding the limitation of power.

Keywords: european union -, multi-level hierarchy, conditionality, separation of powers

Procedia PDF Downloads 71
4173 LGBTQ+ Visibility: An Analysis of the Mechanisms for Safeguarding Sexual Minorities within the Common European Asylum System

Authors: Alessandra Tosi, Teia M. Rogers

Abstract:

The Common European Asylum System (CEAS) is the framework that standardises the treatment of applicants for international protection and harmonises asylum systems throughout the European Union. This paper interrogates the rules applied within the CEAS, specifically Directive 2013/33/EU of the European Parliament and of the Council of 26 June 2013, which puts forth the standards for the reception of vulnerable people applying for asylum. Absent from the definition of ‘vulnerable people’ are sexual minorities who routinely experience discrimination in reception centres and emergency accommodations. This paper undertakes an analysis of policies and legalisation of reception centres within the European Union. In confronting the flaws inherent to the system of processing asylum applications, this paper argues for the reform of the CEAS with emphasis on the inclusion of LBGTQ+ asylum seekers as vulnerable people following standards set by international human rights law.

Keywords: accommodation, asylum seekers, CEAS, Common European Asylum System, European Union, LGBTQ+, reception conditions, vulnerable people

Procedia PDF Downloads 111
4172 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 116
4171 The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory

Authors: Ari S. Prabowo, Nia Febriyanti, Haryono B. Santosa

Abstract:

Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions.

Keywords: laboratory, physical protection system, security culture, security function

Procedia PDF Downloads 147
4170 Blockchain Solutions for IoT Challenges: Overview

Authors: Amir Ali Fatoorchi

Abstract:

Regardless of the advantage of LoT devices, they have limitations like storage, compute, and security problems. In recent years, a lot of Blockchain-based research in IoT published and presented. In this paper, we present the Security issues of LoT. IoT has three levels of security issues: Low-level, Intermediate-level, and High-level. We survey and compare blockchain-based solutions for high-level security issues and show how the underlying technology of bitcoin and Ethereum could solve IoT problems.

Keywords: Blockchain, security, data security, IoT

Procedia PDF Downloads 178
4169 Benefits of Polish Accession to the European Union for Air Transport

Authors: D. Tloczynski

Abstract:

The main aim of this article is to present a balance of the decade of Polish air transport market in the European Union having taking into account selected entities of the aviation market. This article analyzes the functioning of the Polish air transport market after the Polish accession to the European Union. During the study two main areas were pointed: shipping activity and activity of the airports. The most important benefits of integration and the benefits of introducing of the open sky policy were indicated. The last part of the article presents the perspectives of development of air traffic.

Keywords: air transport, airports, development air transport, European Union, Poland

Procedia PDF Downloads 417
4168 The Concepts of Urban Sustainable Development and Smart Cities: In the Understanding of Academia and the European Union

Authors: Wolfgang Haupt

Abstract:

When considering the future city one repeatedly comes across two sometimes sparsely differentiated terms: Sustainable and smart. ‘A European Strategy for Smart, Sustainable, and Inclusive Growth’, this is how the European Commission named its current growth strategy. Thus, Europe should become smarter and more sustainable. Both, the smart and the sustainable city represent a positive vision of urban development as well as a subject area for contemporary and future urban policies. However, more clarity on what is actually behind these terminologies is required. The paper analyses how the terms are defined academically and how this academic understanding is represented in the funding mechanisms of European urban policies. The theoretical framework is mainly based on sources such as journal articles and policy reports. It became clear that despite some similarities, such as the broad field of work or the tendency to operationalize the terms by defining sub-categories, both ideas are distinctly different in terms of the development history, the main driving forces behind and the theoretical scope. Moreover, the significantly more comprehensively defined term sustainability has found its way into the centre of European regional funding policies. On the contrary, the smart city vision still lacks terminological and content-related clarity and as a consequence, the corresponding European funding landscape is more small-scaled and less customized.

Keywords: European spatial policy, European union, smart city, urban sustainable development

Procedia PDF Downloads 344
4167 Impact of Brexit on the Structure of the European Insurance Market: A Solvency and Financial Condition Report Content Analysis of UK Insurance Companies

Authors: Antonia Müller, Svend Reuse

Abstract:

The Brexit referendum in June 2016 led to different publications analysing potential consequences for European and British insurance companies under the European Passport. This study addresses a research gap, regarding the measures taken by insurance companies based in the United Kingdom and thus on structural changes to the European insurance market by an innovative structured Solvency and Financial Condition Report content analysis. In scope are all insurance companies based in the United Kingdom, that fall under the Solvency II supervisory regime. The results show that the majority of British Solvency II insurance companies in scope, conducting cross-border business to the European Union, have applied and reported measures to be able to continue operating this cross-border business after Brexit. In addition, the study shows that 34 new insurance companies based in the European Union were established as a result of Brexit, indicating structural changes to the European insurance market.

Keywords: brexit, europe, insurance market, solvency and financial condition repot, structural changes

Procedia PDF Downloads 168
4166 Microbial Resource Research Infrastructure: A Large-Scale Research Infrastructure for Microbiological Services

Authors: R. Hurtado-Ortiz, D. Clermont, M. Schüngel, C. Bizet, D. Smith, E. Stackebrandt

Abstract:

Microbiological resources and their derivatives are the essential raw material for the advancement of human health, agro-food, food security, biotechnology, research and development in all life sciences. Microbial resources, and their genetic and metabolic products, are utilised in many areas such as production of healthy and functional food, identification of new antimicrobials against emerging and resistant pathogens, fighting agricultural disease, identifying novel energy sources on the basis of microbial biomass and screening for new active molecules for the bio-industries. The complexity of public collections, distribution and use of living biological material (not only living but also DNA, services, training, consultation, etc.) and service offer, demands the coordination and sharing of policies, processes and procedures. The Microbial Resource Research Infrastructure (MIRRI) is an initiative within the European Strategy Forum Infrastructures (ESFRI), bring together 16 partners including 13 European public microbial culture collections and biological resource centres (BRCs), supported by several European and non-European associated partners. The objective of MIRRI is to support innovation in microbiology by provision of a one-stop shop for well-characterized microbial resources and high quality services on a not-for-profit basis for biotechnology in support of microbiological research. In addition, MIRRI contributes to the structuring of microbial resources capacity both at the national and European levels. This will facilitate access to microorganisms for biotechnology for the enhancement of the bio-economy in Europe. MIRRI will overcome the fragmentation of access to current resources and services, develop harmonised strategies for delivery of associated information, ensure bio-security and other regulatory conditions to bring access and promote the uptake of these resources into European research. Data mining of the landscape of current information is needed to discover potential and drive innovation, to ensure the uptake of high quality microbial resources into research. MIRRI is in its Preparatory Phase focusing on governance and structure including technical, legal governance and financial issues. MIRRI will help the Biological Resources Centres to work more closely with policy makers, stakeholders, funders and researchers, to deliver resources and services needed for innovation.

Keywords: culture collections, microbiology, infrastructure, microbial resources, biotechnology

Procedia PDF Downloads 417
4165 COVID-19: A Thread to the Security System of Foreign Investment

Authors: Mehdi Ghaemi

Abstract:

In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.

Keywords: foreign investment, FPS standard, host country, public health, COVID-19

Procedia PDF Downloads 72
4164 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 453
4163 Muslims as the Cultural ‘Other’ in Europe and the Crisis of Multiculturalism

Authors: Tatia Tavkhelidze

Abstract:

The European agenda on multiculturalism has undermined Muslim communities through cultural repulsion. Muslims have been labeled as primitive and dangerous people. They experience discrimination at university, workplace, or in the public sphere on a daily basis. Keeping this in view, the proposed research argues that the coining of Muslimness as a problem in modern European societies indicates the crisis of multiculturalism and it could be explained by the anthropological theory of cultural othering. To prove this assumption, the research undertakes a content analysis of modern policy discourse about Muslims and Islam in different European countries (e.g. France, Austria, Denmark, and Hungary). It focuses on the speech of populist politicians, right-wing party leaders and state officials. The research findings are of great significance as they elucidate that the European societies forgot to respect their own values of toleration, religious liberty and democracy; and undermine the European motto 'unity in diversity.

Keywords: assimilation, islamophobia, multiculturalism, populism

Procedia PDF Downloads 170
4162 Gramscian Class Analysis of the Brexit Process in the Passive Revolution Framework

Authors: Volkan Gulsen

Abstract:

This paper attempts to indicate the main class dynamics of the Brexit process in a Gramscian theoretical framework. It further aims to point out the influence of the withdrawal of the United Kingdom on the European Union class structure. It defines the unification process of the European Union as a passive revolution. In that way, the Brexit process has been described as a moment of negation in the European Union history of class struggle. It will be argued that the withdrawal of the United Kingdom has already altered the European class structure from the embedded neoliberal structure to a more corporate-liberal one.

Keywords: brexit, gramsci, passive revolution, post-neoliberalism

Procedia PDF Downloads 114
4161 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration

Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu

Abstract:

This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.

Keywords: migration, border, security, memory effect

Procedia PDF Downloads 55
4160 The European Union: Considering Its Alleged Endangerment

Authors: Jesús Ulloa

Abstract:

The creation, rise, and consolidation of far right-wing, ultranationalist, and eurosceptic parties in Europe after the Second World War pose a real threat towards the disintegration of the European Union. Starting more than thirty years ago with Jean-Marie Le Pen's FN and Margaret Thatcher's policies, to Marine Le Pen's current FN and anti-immigration proposals along with Nigel Farage's UKIP and their intentions to leave the European Union, the progress of right-wing parties should be noted, taking into account that they may have very important differences within their postures but that they also reach common ground in certain areas. The actual disintegration of the EU would represent an enormous failure of the new liberal world order. Through this essay, the roots of this political parties will be analyzed and the conclusion of whether the disintegration may become a reality or if the principles of cooperation and unity will prevail will be answered.

Keywords: eurosceptic, ultarnationalist, right-wing, European Union

Procedia PDF Downloads 551
4159 Random Walks and Option Pricing for European and American Options

Authors: Guillaume Leduc

Abstract:

In this paper, we describe a broad setting under which the error of the approximation can be quantified, controlled, and for which convergence occurs at a speed of n⁻¹ for European and American options. We describe how knowledge of the error allows for arbitrarily fast acceleration of the convergence.

Keywords: random walk approximation, European and American options, rate of convergence, option pricing

Procedia PDF Downloads 431
4158 Reasons of Change in Security Prices and Price Volatility: An Analysis of the European Carbon Futures Market

Authors: Boulis M. Ibrahim, Iordanis A. Kalaitzoglou

Abstract:

A micro structural pricing model is proposed in which price components account for learning by incorporating changing expectations of the trading intensity and the risk level of incoming trades. An analysis of European carbon futures transactions finds expected trading intensity to increase the information component and decrease the liquidity component of price changes, but at different rates. Among the results, the expected persistence in trading intensity explains the majority of the auto correlations in the level and the conditional volatility of price changes, helps predict hourly patterns in the bid–ask spread and differentiates between the impact of buy versus sell and continuing versus reversing trades.

Keywords: CO2 emission allowances, market microstructure, duration, price discovery

Procedia PDF Downloads 370
4157 Security Architecture for Cloud Networking: A Survey

Authors: Vishnu Pratap Singh Kirar

Abstract:

In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.

Keywords: cloud computing, cloud networking, IaaS, PaaS, SaaS, cloud security

Procedia PDF Downloads 499
4156 Islamic Social Security: A Discourse

Authors: Safiyya A. Abba, Shehu U. R. Aliyu

Abstract:

This paper deals with Islamic social security: a discourse explores the meaning and nature of Islamic social security system. The paper reviews the social security framework and operations during the early period. The paper further identifies the instruments of Islamic social security discusses its principles and objectives. The paper discovers that Islamic social security is a personification of a comprehensive welfare approach in view of its varied instruments that are deeply rooted in the Islamic law, unique principles and realistic and achievable objectives. Furthermore, the Islamic social security system has far reaching socioeconomic implications; social justice, cohesion, equity, a catalyst for poverty eradication, income redistribution, economic growth and development.

Keywords: Islamic social security, basic needs, zakat, socioeconomic justice, equity

Procedia PDF Downloads 404
4155 Cost Efficiency of European Cooperative Banks

Authors: Karolína Vozková, Matěj Kuc

Abstract:

This paper analyzes recent trends in cost efficiency of European cooperative banks using efficient frontier analysis. Our methodology is based on stochastic frontier analysis which is run on a set of 649 European cooperative banks using data between 2006 and 2015. Our results show that average inefficiency of European cooperative banks is increasing since 2008, smaller cooperative banks are significantly more efficient than the bigger ones over the whole time period and that share of net fee and commission income to total income surprisingly seems to have no impact on bank cost efficiency.

Keywords: cooperative banks, cost efficiency, efficient frontier analysis, stochastic frontier analysis, net fee and commission income

Procedia PDF Downloads 180
4154 Tenure Security, Agricultural Diversity and Food Security

Authors: Amanuel Hadera Gebreyesus

Abstract:

In the literature, the study of tenure and food security has largely involved separate lines of inquiry. In effect, the nexus among these has received little attention; and the underinvestment in research related to the relationship between tenure and food security deters generation of tenure-related knowledge and policy guidance for improving food and nutrition security. Drawing from this motivation, we study the relationship among tenure security, agricultural diversity and food security and dietary diversity. We employ IV approaches to examine the effect of tenure security and agricultural diversity on food security and dietary diversity. We find tenure security is inversely related with food insecurity as shown by its negative association with hunger scale, hunger index and hunger category. On the other hand, results suggest that tenure security improves minimum dietary diversity of women while we find no association with child dietary diversity. Moreover, agricultural diversity is positively related with minimum dietary diversity of women, which may point to higher accessibility and consumption of dietary food groups by women. Also, findings suggest that farmers use their human (knowledge and skills) and resource (land) endowments to improve food security and dietary diversity. An implication from this is the importance of not only improving access to land but also long-term tenure security to promote agricultural diversity, food security and dietary diversity.

Keywords: tenure security, food security, agricultural diversity, dietary diversity, women

Procedia PDF Downloads 163
4153 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 454
4152 Guarding the Fortress: Intellectual Property Rights and the European Union’s Cross-Border Jurisdiction

Authors: Sara Vora (Hoxha)

Abstract:

The present article delves into the intricate matters concerning Intellectual Property Rights (IPR) and cross-border jurisdiction within the confines of the European Union (EU). The prevalence of cross-border intellectual property rights (IPR) disputes has increased in tandem with the globalization of commerce and the widespread adoption of technology. The European Union (EU) is not immune to this trend. The manuscript presents a comprehensive analysis of various forms of intellectual property rights (IPR), such as patents, trademarks, and copyrights, and the regulatory framework established by the European Union (EU) to oversee these rights. The present article examines the diverse approaches employed for ascertaining the appropriate jurisdiction within the European Union (EU), and their potential application in the sphere of cross-border intellectual property rights (IPR) conflicts. The article sheds light on jurisdictional issues and outcomes of significant cross-border intellectual property rights (IPR) disputes in the European Union (EU). Additionally, the document provides suggestions for effectively managing intellectual property rights conflicts across borders within the European Union, which encompasses the utilization of alternative methods for resolving disputes. The article highlights the significance of comprehending the relevant jurisdiction in the European Union for Intellectual Property Rights (IPR). It also offers optimal approaches for enterprises and individuals who aim to safeguard their intellectual property beyond national boundaries. The primary objective of this article is to furnish a thorough comprehension of Intellectual Property Rights (IPR) and the relevant jurisdiction in the European Union (EU). Additionally, it endeavors to provide pragmatic recommendations for managing cross-border IPR conflicts in this intricate and ever-changing legal milieu.

Keywords: intellectual property rights (IPR), cross-border jurisdiction, applicable laws and regulations, dispute resolution, best practices

Procedia PDF Downloads 51
4151 Impact of International Student Mobility on European and Global Identity: A Case Study of Switzerland

Authors: Karina Oborune

Abstract:

International student mobility involves a unique spatio-temporal context and exploring the various aspects of mobile students’ experience can lead to new findings within identity studies. The previous studies have mainly focused on student mobility within Europe and its impact on European identity arguing that students who participate in intra-European mobility already feel European before exchange. Contrary to previous studies, in this paper student mobility is analyzed from different point of view. In order to see whether a true Europeanization of identities is taking place, it is necessary to contrast European identity with alternative supranational identity which could similarly result from student mobility and in particular a global identity. Besides, in the paper there is explored whether geographical constellation (host country continental location during mobility- Europe vs. outside of Europe) plays a role. Based on newly developed model of multicultural, social and socio-demographic variables there is argued that after intra-European mobility only global identity of students could be increased (H1), but the mobility to countries outside of Europe causes changes in European identity (H2). The quantitative study (survey, n=1440, 22 higher education institutions, experimental group of former and future/potential mobile students and control group of non-mobile students) was held in Switzerland where is equally high number of students who participate in intra-European and outside of Europe mobility. The results of multivariate linear regression showed that students who participate in exchange in Europe increase their European identity due to having close friends from Europe, as well as due to length of the mobility experience had impact, but students who participate in exchange outside of Europe increase their global identity due to having close friends from outside of Europe and proficiency in foreign languages.

Keywords: student mobility, European identity, global identity, global identity

Procedia PDF Downloads 683
4150 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 547
4149 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 399
4148 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 668