Search results for: advanced persistent threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3471

Search results for: advanced persistent threat

3381 A Study on How Insider Fraud Impacts FinTechs

Authors: Claire Norman-Maillet

Abstract:

Insider fraud is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including Board members and part-time staff. Insider fraud can take many forms, including an employee working alone or in collusion with others. Insider fraud has been on the rise since the Coronavirus pandemic and shows no signs of slowing. The objective of the research is to better understand how FinTechs are impacted by insider fraud and, therefore, how to stop it. This research will make an original contribution to the financial crime field, given the timing of this research being intertwined with the cost-of-living crisis in the UK and the global Coronavirus pandemic. This research focuses on insider fraud within FinTechs specifically, as they are arguably a modern phenomenon in the financial institutions space and have cutting-edge technology at their disposal. To achieve the research objective, the researcher held semi-structured interviews with over 20 individuals who deal with insider fraud perpetration in a practitioner, recruitment, or advisory capacity. The interviews were subsequently transcribed and analysed thematically. Main findings in the research suggest that FinTechs are arguably in the best position to combat insider fraud, given their focus on using recent technologies, as this can be used to combat the threat. However, insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer, as well as the idea that external fraud is the most important threat. The research concludes that, whilst the technology is understandably prioritised by FinTechs for providing an agreeable customer experience, insider fraud needs to be given a platform upon which to be recognised as a significant threat to any company. Moreover, insider fraud needs to be given the same level of weighting and attention by Executive Committees and Boards as the customer experience.

Keywords: insider fraud, occupational fraud, COVID-19, COVID, Coronavirus, pandemic, internal fraud, financial crime, economic crime

Procedia PDF Downloads 32
3380 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 111
3379 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware

Authors: Azita Ramezani, Atousa Ramezani

Abstract:

In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.

Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection

Procedia PDF Downloads 37
3378 Urban Vegetation as a Mitigation Strategy for Urban Heat Island Effect a Case of Kerala

Authors: Athul T.

Abstract:

Kerala cities in India are grappling with an alarming rise in temperatures fueled by the Urban Heat Island (UHI) effect. This phenomenon, exacerbated by rapid urbanization and climate change, poses a significant threat to public health and environmental well-being. In response to this growing concern, this study investigates the potential of urban vegetation as a powerful mitigation strategy against UHI. The study delves into the intricate relationship between micro-climate changes, UHI intensity, and the strategic placement of greenery in alleviating these effects. Utilizing advanced simulation software, the most effective vegetation types and configurations for maximizing UHI reduction will be identified. By analyzing the current state of Kozhikode's urban vegetation and its influence on microclimates, this study aims to tailor actionable strategies for Kerala cities, potentially paving the way for a more sustainable and thermally comfortable urban future.

Keywords: urban heat island, climate change, micro climate, urban vegetation

Procedia PDF Downloads 32
3377 COVID-19: A Thread to the Security System of Foreign Investment

Authors: Mehdi Ghaemi

Abstract:

In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.

Keywords: foreign investment, FPS standard, host country, public health, COVID-19

Procedia PDF Downloads 72
3376 Survivability of Maneuvering Aircraft against Air to Air Infrared Missile

Authors: Ji-Yeul Bae, Hyung Mo Bae, Jihyuk Kim, Hyung Hee Cho

Abstract:

An air to air infrared missile poses a significant threat to the survivability of an aircraft due to an advanced sensitivity of sensor and maneuverability of the missile. Therefore, recent military aircraft is equipped with MAW (Missile Approach Warning) to take an evasive maneuver and to deploy countermeasures like chaff and flare. In this research, an effect of MAW sensitivity and resulting evasive maneuver on the survivability of the fighter aircraft is studied. A single engine fighter jet with Mach 0.9 flying at an altitude of 5 km is modeled in the research and infrared signature of the aircraft is calculated by numerical simulation. The survivability is assessed in terms of lethal range. The MAW sensitivity and maneuverability of an aircraft is used as variables. The result showed that improvement in survivability mainly achieved when the missile approach from the side of the aircraft. And maximum 30% increase in survivability of the aircraft is achieved when existence of the missile is noticed at 7 km distance. As a conclusion, sensitivity of the MAW seems to be more important factor than the maneuverability of the aircraft in terms of the survivability.

Keywords: air to air missile, missile approach warning, lethal range, survivability

Procedia PDF Downloads 526
3375 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 404
3374 Investigating the Use of Advanced Manufacturing Technologies in the Assembly Type Manufacturing Companies in Trinidad and Tobago

Authors: Nadine Sangster, Akil James, Rondell Duke, Aaron Ameerali, Terrence Lalla

Abstract:

The market place of the 21st century is evolving into one of merging national markets, fragmented consumer markets, and rapidly changing product technologies. The use of new technologies has become vital to the manufacturing industry for their survival and sustainability. This work focused on the assembly type industry in a small developing country and aimed at identifying the use of advanced manufacturing technologies and their impact on this sector of the manufacturing industry. It was found that some technologies were being used and that they had improved the effectiveness of those companies but there was still quite a bit of room for improvements. Some of the recommendations included benchmarking against international standards, the adoption of a “made in TT” campaign and the effective utilisation of the technologies to improve manufacturing effectiveness and thus improve competitive advantages and strategies.

Keywords: advanced manufacturing technology, Trinidad and Tobago, manufacturing, industrial engineering

Procedia PDF Downloads 463
3373 Advanced Manufacturing Technology Adoption and Organizational Structure

Authors: George Nyori Makari

Abstract:

Data on 92 industrial organizations point to the existence of relationships between advanced manufacturing technology (AMT) adoption and some aspects of organizational structure, including the number of specialized sub-units, the number of levels of authority, span of control, degree of role programming specification, degree of communication programming specification and the degree of output programming. Primary finding is that as the investments and integration of AMTs increases, the more likely the foregoing aspects of structure increase. The findings hold with size and a number of other organizational variables controlled. The results indicate that a company’s capacity to assimilate technology depends on its organizational capabilities. The study encapsulates the need for companies to increase their organizational capabilities during investment and integration of AMTs.

Keywords: advanced manufacturing technology, adoption, organizational structure, Kenya

Procedia PDF Downloads 425
3372 Refinement of Existing Benzthiazole lead Targeting Lysine Aminotransferase in Dormant Stage of Mycobacterium tuberculosis

Authors: R. Reshma srilakshmi, S. Shalini, P. Yogeeswari, D. Sriram

Abstract:

Lysine aminotransferase is a crucial enzyme for dormancy in M. tuberculosis. It is involved in persistence and antibiotic resistance. In present work, we attempted to develop benzthiazole derivatives as lysine aminotransferase inhibitors. In our attempts, we also unexpectedly arrived at an interesting compound 21 (E)-4-(5-(2-(benzo[d]thiazol-2-yl)-2-cyanovinyl)thiophen-2-yl)benzoic acid which even though has moderate activity against persistent phase of mycobacterium, it has significant potency against active phase. In the entire series compound 22 (E)-4-(5-(2-(benzo[d]thiazol-2-yl)-2-cyanovinyl)thiophen-2-yl)isophthalic acid emerged as potent molecule with LAT IC50 of 2.62 µM. It has a significant log reduction of 2.9 and 2.3 fold against nutrient starved and biofilm forming mycobacteria. It was found to be inactive in MABA assay and M.marinum induced zebra fish model. It is also devoid of cytotoxicity. Compound 22 was also found to possess bactericidal effect which is independent of concentration and time. It was found to be effective in combination with Rifampicin in 3D granuloma model. The results are very encouraging as the hit molecule shows activity against active as well as persistent forms of tuberculosis. The identified hit needs further more pharmacokinetic and dynamic screening for development as new drug candidate.

Keywords: benzothiazole, latent tuberculosis, LAT, nutrient starvation

Procedia PDF Downloads 304
3371 Role of Ologen in Previously Failed Trabeculectomy in Advanced Glaucoma

Authors: Reetika Sharma, Lalit Tejwani, Himanshu Shekhar, Arun Singhvi

Abstract:

Purpose: Advanced Glaucoma with Failed trab is not an uncommon sight in glaucoma clinic, and such cases usually tend to present with high intraocular pressure (IOP) and advanced cupping, or even glaucomatous atrophy stage. Re-surgery is needed for such cases, and wound modulation poses a major challenge in these cases. We share our experience in this case series with the use of Ologen (collagen matrix implant) along with MMC 0.04% used in surgery. The purpose of the study was to evaluate the efficacy and outcome of collagen matrix implant in re-trabeculectomy in advanced glaucoma cases. Methodology: Eleven eyes of 11 patients (one eye of one patient) underwent re-trabeculectomy surgery with MMC and Ologen. Ologen implant was used in sub scleral and subconjunctival space, as a spacer and wound modulator. In five cases, triple modulation with implant soaked in anti-VEGF was used. Results: All patients had cupping more than 0.9, and one case was GOA. All cases were on maximal medication at presentation and majority were on systemic anti-glaucoma therapy also. Post-surgery, follow-up ranged from 13 – 34 months, and all cases had a follow longer than the gap between previous surgery (which was failed) and re-trab. One case needed AC reformation and one needling was done. Phaco was done at same sitting in four cases. All cases had their IOP lowered post surgery, and vision was maintained in all, however one case was considered as failed re-surgery case. Topical medication was needed in seven cases post-surgery also. Conclusion: Ologen as adjuvant should be considered in all re-trab cases and all high risk and advanced cases, and triple modulation can be next step in these cases. Aggressive IOP control and non- reluctance to continue topical medications post second surgery should be considered in such cases, to give them best possible vision.

Keywords: failed trabeculectomy, ologen, trabeculectomy, advanced glaucoma

Procedia PDF Downloads 298
3370 Securitization of Illegal Fishing Cases in Natuna Waters by Indonesian Government: Study Case of Chinese Vessels Shootouts 2016

Authors: Ray Maximillian, Idil Syawfi

Abstract:

Indonesia’s Exclusive Economic Zone and the infamous China’s nine-dash line are intersected in Natuna waters. Even though from Indonesia perspective, that line does not possess any legal basis, China treat that line as their national boundaries, therefore allowing Chinese fishermen to fish in the area. Under President Joko Widodo leadership, Indonesia which now focusing to suppress illegal fishing cases while emphasizing their maritime sovereignty is facing an imminent threat from China’s presence in Natuna. Tension between these countries spiked after three incident happened on 2016, especially after Indonesian navy shot Chinese fishermen vessel that suspected doing illegal fishing activity. This action seen as an attempt to secure Indonesia’s law enforcement in their waters after several months before such attempt was intervened by Chinese coast guard. Indonesia tries to securitize this issue to justify the shooting they done to Chinese vessels. In the process of securitization, it is imperative to identify the existential threat that leads to implementation of emergency measures which responded by units in the cases. Chinese coast guard presence in Natuna perceived as an existential threat to Indonesia, therefore, responded by shooting to Chinese vessels on the next encounter. This action then responded by Chinese government who said that there is overlapping claim between them and Indonesia in Natuna.

Keywords: China, illegal fishing, Indonesia, natuna, securitization

Procedia PDF Downloads 191
3369 Protecting Privacy and Data Security in Online Business

Authors: Bilquis Ferdousi

Abstract:

With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.

Keywords: privacy, data security, legislation, online business

Procedia PDF Downloads 75
3368 A Qualitative Case Study Exploring Zambian Mathematics Teachers' Content Knowledge of Functions

Authors: Priestly Malambo, Sonja Van Putten, Hanlie Botha, Gerrit Stols

Abstract:

The relevance of what is content is taught in tertiary teacher training has long been in question. This study attempts to understand how advanced mathematics courses equip student teachers to teach functions at secondary school level. This paper reports on an investigation that was conducted in an African university, where preservice teachers were purposefully selected for participation in individual semi-structured interviews after completing a test on functions as taught at secondary school. They were asked to justify their reasoning in the test and to explain functions in a way that might bring about understanding of the topic in someone who did not know how functions work. These were final year preservice mathematics teachers who had studied advanced mathematics courses for three years. More than 50% of the students were not able to explain concepts or to justify their reasoning about secondary school functions in a coherent way. The results of this study suggest that the study of advanced mathematics does not automatically enable students to teach secondary school functions, and that, although these students were able to do advanced mathematics, they were unable to explain the working of functions in a way that would allow them to teach this topic successfully.

Keywords: secondary school, mathematical reasoning, student-teachers, functions

Procedia PDF Downloads 237
3367 Advanced Nurse Practitioners in Clinical Practice - a Leadership Challenge

Authors: Mette Kjerholt, Thora Grothe Thomsen, Connie Bøttcher Berthelsen, Bibi Hølge Hazelton

Abstract:

Academic nursing is a relatively new phenomenon in Denmark. Leadership and management training in nursing does not prepare Danish nurse leaders to become leaders for nurses with academic background, and some leaders may feel estranged with including this kind of nursing staff in clinical settings. Currently there is a debate regarding what academic nurses can contribute with in clinical practice, and some managers express concern regarding whether this will lead to less focus on clinical practice and more focus on theoretical issues that may not seem so relevant in a busy everyday clinical setting. The paper will present the experiences of integrating three advanced nurse practitioners with Ph.D. degrees (ANP) in three different clinical departments at a regional hospital in Denmark with no prior experiences with such profiles among its staff.

Keywords: leadership, advanced nurse practitioners, clinical practice, academic nursing

Procedia PDF Downloads 547
3366 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 235
3365 Design and Performance Analysis of Advanced B-Spline Algorithm for Image Resolution Enhancement

Authors: M. Z. Kurian, M. V. Chidananda Murthy, H. S. Guruprasad

Abstract:

An approach to super-resolve the low-resolution (LR) image is presented in this paper which is very useful in multimedia communication, medical image enhancement and satellite image enhancement to have a clear view of the information in the image. The proposed Advanced B-Spline method generates a high-resolution (HR) image from single LR image and tries to retain the higher frequency components such as edges in the image. This method uses B-Spline technique and Crispening. This work is evaluated qualitatively and quantitatively using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). The method is also suitable for real-time applications. Different combinations of decimation and super-resolution algorithms in the presence of different noise and noise factors are tested.

Keywords: advanced b-spline, image super-resolution, mean square error (MSE), peak signal to noise ratio (PSNR), resolution down converter

Procedia PDF Downloads 375
3364 The Limits to Self-Defense Claims in Case of Domestic Violence Homicides

Authors: Maria Elisabete Costa Ferreira

Abstract:

Domestic violence is a serious social issue in which victims are mostly women. Domestic violence develops in cycles, starting with the building of tension, passing through the incident of abuse and ending with reconciliation, also known as honeymoon. As time goes by, the shorter these phases become, and the greater and more severe the attacks, rarely leading to the death of the victim of abuse. Sometimes, the victim stops the abuse by killing the aggressor, usually after the immediate aggression has taken place. This poses an important obstacle to the claim of self-defense by the victim of domestic violence pending trial for the homicide of her long-time abuser. The main problem with self-defense claims in such cases is that the law requires the act of aggression to be present or imminent (imminent threat or immediate danger) so that it permits the victim to take her defense into her own hands. If the episode of aggression has already taken place, this general requirement for the admissibility of self-defense is not satisfied. This paper sheds new light on the concept of the actuality of the aggression, understanding that, since domestic violence is a permanent offense, for as long as the victim stays under the domain of the aggressor, imminent threat will be present, allowing the self-defense claim of a woman who kills her abuser in such circumstances to be admissible. An actualist interpretation of the requirement of the necessity of the means used in self-defense will be satisfied when evaluated from the subjective perspective of the intimate partner victim. Necessity will be satisfied if it is reasonable for the victim to perceive the use of lethal force as the only means to release herself from the abuser.

Keywords: domestic violence, homicide, self-defense, imminent threat, necessity of lethal force

Procedia PDF Downloads 34
3363 Treatment of Sanitary Landfill Leachate by Advanced Oxidation Techniques

Authors: R. Kerbachi , Y. Medkour, F. Sahnoune

Abstract:

The integrated waste management is an important aspect in the implementation of sustainable development. Leachate generated by sanitary landfills is a high-strength wastewater that is likely to contain large amounts of organic and inorganic matter, with humic substances, as well as ammonia nitrogen, heavy metals, chlorinated organic and inorganic salts. Untreated leachates create a great potential for harm to the environment, they can permeate ground water or mix with surface water and contribute to the pollution of soil, ground water, and surface water. In Algeria, the treatment of landfill leachate is the weakest link in the solid waste management. This study focuses on the evaluation of the pollution load carried by leachate produced in a former sanitary landfill located to the west of Algiers and the implementation of advanced oxidation treatment (advanced oxidation process, AOP), Fenton, electro-Fenton etc. The characterization of these leachates shows that they have a high organic load, mineral and nitrogen. Measured COD reaches very high values of the order of 5000 to 20,000 mg O2 / L. On this non-biodegradable leachate, treatment tests have been carried out by the methods of coagulation-flocculation, Fenton oxidation, electrocoagulation and electro-Fenton. The removal efficiencies of pollution obtained for each of these modes of treatment are respectively 69, 80, 84 and 97%. The study shows that advanced oxidation processes are very suitable for the treatment of poorly biodegradable leachate.

Keywords: advanced oxidation processes, electrocoagulation, electro-Fenton, leachates treatment, sanitary landfill

Procedia PDF Downloads 265
3362 Management Opposition, Strikes, and Union Threats

Authors: Patrick Nüß

Abstract:

I estimate management opposition against unions in terms of hiring discrimination by a large scale field experiment in the German labor market. The results show that callback rates for union members decrease significantly in the presence of high sectoral union density and large firm size. I further explore how this effect varies with regional and sectoral labor dispute intensity and find that management opposition is stronger when a sector is exposed to an intense labor dispute. There is evidence that the observed management opposition can be explained by sectoral union threat effects. Sectors with lower hiring discrimination have lower coverage of collective agreements, and in the absence of a collective agreement, they are less likely to follow the collective agreement wage setting.

Keywords: trade unions, Industrial relations, management opposition, union threat, labor disputes, field experiments

Procedia PDF Downloads 155
3361 Study of Petroleum Hydrocarbons Biodegradation and the Role of Biosurfactants Produced by Bacteria Isolated from the Lagoon of Mar Chica in This Process

Authors: Ikram Kamal, Mohamed Blaghen

Abstract:

Petroleum hydrocarbons are serious problems and global pollutants in the environment due to their toxicity, carcinogenicity and persistent organic pollutant properties. One of the approaches to enhance biodegradation of petroleum hydrocarbons is to use biosurfactant. Biosurfactants are amphiphilic biomolecules produced as metabolic by-products from microorganisms they received considerable attention in the field of environmental remediation processes such as bioremediation. Biosurfactants have been considered as a desirable alternative to synthetic surfactants in various applications particularly in the environmental field. In comparison with their synthetic counterparts, biosurfactants have been reported to be less toxic, biodegradable and persistent. In this study we have investigated the potential of bacterial strains collected aseptically from the lagoon Marchika (water and soil) in Nador, Morocco; for the production of biosurfactants. This study also aimed to optimize the biosurfactant production process by changing the variables that influence the type and amount of biosurfactant produced by these microorganisms such as: carbon sources and also other physical and chemical parameters such as temperature and pH. Emulsification index, methylene blue test and thin layer chromatography (TLC) revealed the ability of strains used in this study to produce compounds that could emulsify gasoline. In addition, a HPLC/MS was used to separate and identify different biosurfactants purified.

Keywords: petroleum hydrocarbons, biosurfactants, biodegradation, lagoon marchika, emulsification index

Procedia PDF Downloads 234
3360 Financial and Human Resources of Terrorism

Authors: Abdurrahman Karacabey

Abstract:

Threat paradigm has shifted throughout the history. Considering conjuncture of our time, a major threat for humanity is terrorism. Although variety of reasons are influential, financial, and human resources are the vital needs for terrorist groups. It is known that terrorism is a significant term while taking decisions in diplomatic, politic, and military issues. Even though the methods to provide resources for terrorism are quite similar, there are still some differences for deterrent terrorist groups being active in various regions of the globe. Due to social and psychological reasons activists have generally similar excuses to join terrorist groups.At the same time, terrorists’ fiscal activities to secure permanence of terrorism, occupy the politics of the countries. Besides, preventive actions are expensive creating huge burdens in host nation’s economy. This paper elaborates on how ISIS is providing human and economic resources, course of actions to overcome ISIS is on the agenda of all countries.

Keywords: financial resources, human resources, isis, terrorism

Procedia PDF Downloads 382
3359 A Robust Software for Advanced Analysis of Space Steel Frames

Authors: Viet-Hung Truong, Seung-Eock Kim

Abstract:

This paper presents a robust software package for practical advanced analysis of space steel framed structures. The pre- and post-processors of the presented software package are coded in the C++ programming language while the solver is written by using the FORTRAN programming language. A user-friendly graphical interface of the presented software is developed to facilitate the modeling process and result interpretation of the problem. The solver employs the stability functions for capturing the second-order effects to minimize modeling and computational time. Both the plastic-hinge and fiber-hinge beam-column elements are available in the presented software. The generalized displacement control method is adopted to solve the nonlinear equilibrium equations.

Keywords: advanced analysis, beam-column, fiber-hinge, plastic hinge, steel frame

Procedia PDF Downloads 284
3358 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 69
3357 Exploring Spiritual Needs of Taiwanese Inpatients with Advanced Cancer and Their Family Caregivers

Authors: Szu Mei Hsiao

Abstract:

This study explores the spiritual needs of inpatients with advanced cancer and their family caregivers in one southern regional teaching hospital in Taiwan and elucidates the differences and similarities of spiritual needs between them. Little research reports the different phases of spiritual needs and the potential impact of Chinese cultural values on the spiritual needs. Qualitative inquiry was used. Twenty-one patients with advanced cancer and twenty-two family caregivers were recruited. During hospitalization, all participants identified spiritual needs both the palliative phase and the dying phase: (a) the need to foster faith/confidence and hope for medicine and/or God; (b) to understand the meaning and values of life; (c) to experience more reciprocal human love and forgiveness; and (d) to obey God’s/Heaven will. Furthermore, the differences of spiritual needs between patients with advanced cancer and their family caregivers are as follows: (a) family caregivers emphasized the need to inform relatives and say goodbye in order to die peacefully; (b) patients highlighted a need to maintain a certain physical appearance in order to preserve their dignity; nurture one’s willpower; learn about the experiences of cancer survivors; and identify one’s own life experience for understanding the meaning and values of life. Moreover, the dissimilarity of spiritual needs is that the patients pointed out the need to understand God’s will during the palliative treatment phase. However, the family caregivers identified the need to forgive each other, and inform relatives and say goodbye to patients in the dying phase. This research has shown that the needs of meaning/values of life and facing death peacefully are different between two groups. Health professionals will be encouraged to detect and to develop individualized care strategies to meet spiritual needs.

Keywords: advanced cancer, Chinese culture, family caregivers, qualitative research, spiritual needs

Procedia PDF Downloads 310
3356 Quantification of Polychlorinated Biphenyls (PCBs) in Soil Samples of Electrical Power Substations from Different Cities in Nigeria

Authors: Omasan Urhie Urhie, Adenipekun C. O, Eke W., Ogwu K., Erinle K. O

Abstract:

Polychlorinated Biphenyls (PCBs) are Persistent organic pollutants (POPs) that are very toxic; they possess ability to accumulate in soil and in human tissues hence resulting in health issues like birth defect, reproductive disorder and cancer. The air is polluted by PCBs through volatilization and dispersion; they also contaminate soil and sediments and are not easily degraded. Soil samples were collected from a depth of 0-15 cm from three substations (Warri, Ughelli and Ibadan) of Power Holding Company of Nigeria (PHCN) where old transformers were dumped in Nigeria. Extraction and cleanup of soil samples were conducted using Accelerated Solvent Extraction (ASE) with Pressurized Liquid extraction (PLE). The concentration of PCBs was determined using gsas chromatography/mass spectrometry (GC/MS). Mean total PCB concentrations in the soil samples increased in the order Ughelli ˂ Ibadan˂ Warri, 2.457757ppm Ughelli substation 4.198926ppm, for Ibadan substation and 14.05065ppm at Warri substation. In the Warri samples, PCB-167 was the most abundant at about 30% (4.28086ppm) followed by PCB-157 at about 20% (2.77871), of the total PCB concentrations (14.05065ppm). Of the total PCBs in the Ughelli and Ibadan samples, PCB-156 was the most abundant at about 44% and 40%, respectively. This study provides a baseline report on the presence of PCBs in the vicinity of abandoned electrical power facilities in different cities in Nigeria.

Keywords: polychlorintated biphenyls, persistent organic pollutants, soil, transformer

Procedia PDF Downloads 111
3355 Countering Terrorism through Social Media: Case Study in Indonesia

Authors: Mauly Budiyanti, Aisyah M. Anggiana

Abstract:

Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.

Keywords: Indonesia, national security, social media, terrorism.

Procedia PDF Downloads 191
3354 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 475
3353 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 46
3352 Environmental and Safety Studies for Advanced Fuel Cycle Fusion Energy Systems: The ESSENTIAL Approach

Authors: Massimo Zucchetti

Abstract:

In the US, the SPARC-ARC projects of compact tokamaks are being developed: both are aimed at the technological demonstration of fusion power reactors with cutting-edge technology but following different design approaches. However, they show more similarities than differences in the fuel cycle, safety, radiation protection, environmental, waste and decommissioning aspects: all reactors, either experimental or demonstration ones, have to fulfill certain "essential" requirements to pass from virtual to real machines, to be built in the real world. The paper will discuss these "essential" requirements. Some of the relevant activities in these fields, carried out by our research group (ESSENTIAL group), will be briefly reported, with the aim of showing some methodology aspects that have been developed and might be of wider interest. Also, a non-competitive comparison between our results for different projects will be included when useful. The question of advanced D-He3 fuel cycles to be used for those machines will be addressed briefly. In the past, the IGNITOR project of a compact high-magnetic field D-T ignition experiment was found to be able to sustain limited D-He3 plasmas, while the Candor project was a more decisive step toward D-He3 fusion reactors. The following topics will be treated: Waste management and radioactive safety studies for advanced fusion power plants; development of compact high-field advanced fusion reactors; behavior of nuclear materials under irradiation: neutron-induced radioactivity due to side DT reactions, radiation damage; accident analysis; reactor siting.

Keywords: advanced fuel fusion reactors, deuterium-helium3, high-field tokamaks, fusion safety

Procedia PDF Downloads 60