Search results for: british security strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6447

Search results for: british security strategy

6237 Forecasting Future Society to Explore Promising Security Technologies

Authors: Jeonghwan Jeon, Mintak Han, Youngjun Kim

Abstract:

Due to the rapid development of information and communication technology (ICT), a substantial transformation is currently happening in the society. As the range of intelligent technologies and services is continuously expanding, ‘things’ are becoming capable of communicating one another and even with people. However, such “Internet of Things” has the technical weakness so that a great amount of such information transferred in real-time may be widely exposed to the threat of security. User’s personal data are a typical example which is faced with a serious security threat. The threats of security will be diversified and arose more frequently because next generation of unfamiliar technology develops. Moreover, as the society is becoming increasingly complex, security vulnerability will be increased as well. In the existing literature, a considerable number of private and public reports that forecast future society have been published as a precedent step of the selection of future technology and the establishment of strategies for competitiveness. Although there are previous studies that forecast security technology, they have focused only on technical issues and overlooked the interrelationships between security technology and social factors are. Therefore, investigations of security threats in the future and security technology that is able to protect people from various threats are required. In response, this study aims to derive potential security threats associated with the development of technology and to explore the security technology that can protect against them. To do this, first of all, private and public reports that forecast future and online documents from technology-related communities are collected. By analyzing the data, future issues are extracted and categorized in terms of STEEP (Society, Technology, Economy, Environment, and Politics), as well as security. Second, the components of potential security threats are developed based on classified future issues. Then, points that the security threats may occur –for example, mobile payment system based on a finger scan technology– are identified. Lastly, alternatives that prevent potential security threats are proposed by matching security threats with points and investigating related security technologies from patent data. Proposed approach can identify the ICT-related latent security menaces and provide the guidelines in the ‘problem – alternative’ form by linking the threat point with security technologies.

Keywords: future society, information and communication technology, security technology, technology forecasting

Procedia PDF Downloads 442
6236 Model of Production and Marketing Strategies in Alignment with Business Strategy using QFD Approach

Authors: Hamed Saremi, Suzan Taghavy, Shahla Saremi

Abstract:

In today's competitive world, organizations are expected to surpass the competitors and benefit from the resources and benefits. Therefore, organizations need to improve the current performance is felt more than ever that this requires to identify organizational optimal strategies, and consider all strategies simultaneously. In this study, to enhance competitive advantage and according to customer requirements, alignment between business, production and marketing strategies, House of Quality (QFD) approach has been used and zero-one linear programming model has been studied. First, the alignment between production and marketing strategies with business strategy, independent weights of these strategies is calculated. Then with using QFD approach the aligned weights of optimal strategies in each production and marketing field will be obtained and finally the aligned marketing strategies selection with the purpose of allocating budget and specialist human resource to marketing functions will be done that lead to increasing competitive advantage and benefit.

Keywords: strategy alignment, house of quality deployment, production strategy, marketing strategy, business strategy

Procedia PDF Downloads 406
6235 Policy Compliance in Information Security

Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran

Abstract:

In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.

Keywords: information technology, information security, involvement theory, policies, social bond theory

Procedia PDF Downloads 346
6234 Migrant Workers and the Challenge for Human Security in Southeast Asia since 1997

Authors: Hanen Khaldi

Abstract:

This paper aims to study the impact of international migration on human security in the Southeastern region of Asia, especially after Asian Financial Crisis 1997-98. International migration has impacts on many dimensions of security: the state security (sovereignty and autonomy); international relationships security (conflicts, terrorism, etc); and immigrants security. The paper aims to improve our comprehension of the impact of international migration on immigrant security in the region of Southeast Asia, particularly “vulnerable workers’’ whose number is growing very fast in the region. The literature review carried out on this matter led us to ask the following two question: 1) Did the creation of ASEAN Community matter on the evolution of immigrants in the region? And How governments try to resolve the gap between economic objectifs and security of immigrants in the region? To answer these two questions, the paper is subdivided in three parts: Firstly, we will show how the creation of the ASEAN Community, especially ASEAN Economic Community, had a significant impact on the pattern of evolution of immigration in this region. Secondly, we will paint a portrait illustrating the vulnerability of immigrants in Southeast Asia, particularly unskilled workers. Finally, using the theories of regional integration, we will assess how governments try to ensure the security and safety of the immigrants. Overall, our analysis illustrate the significant change of the official discourse of the leaders of the ASEAN member states, now more conciliator and especially more open to cooperation, as well as the proliferation of meetings and initiatives between these countries to control mobility flows in the region, and the ensure immigrants security.

Keywords: migrant workers, human security, human rights

Procedia PDF Downloads 145
6233 Effects of Jigsaw Strategy on Senior Secondary School Students’ Achievement in Ecology in Maitagari, Jigawa State, Nigeriaind Out the Effect of Jigsaw Strategy on Students’ Achievement in Ecology

Authors: Ozoji Bernadette, Sa’Ad-Abdullahi Abdulhafiz, Izundu Chike Leo

Abstract:

The study investigated the effect of Jigsaw strategy on senior secondary school students’ achievement in Maitagari, Jigawa State, Nigeria. The pre-test, post-test quasi experimental design was employed in the study. The sample for the study comprised 120 students from two public schools from the study area. An instrument namely, Ecological Achievement Test (EAT) was used to collect data from students. The data were analyzed using SPSS version 26.0. The EAT was validated by two experts, one, in Science Education unit and the other in Research, Measurement and Evaluation unit, both in the Faculty of Education, University of Jos, Nigeria. The reliability coefficient of the EAT was established as 0.85 using Kuder Richardson Formular 20. Mean and standard deviation were used to answer two research questions while Analysis of Covariance was used to test two hypotheses that guided the study. Results showed that students taught using jigsaw strategy achieved significantly better than their counterparts taught using the conventional method in ecology. Furthermore, it was revealed that gender had no significant influence on achievement of students exposed to jigsaw strategy. It was concluded that jigsaw strategy was effective in improving students’ achievement in ecology. The study recommended that teachers should incorporate jigsaw strategy into science classrooms for improved achievement outcome and gender equality.

Keywords: achievement, ecology, jigsaw strategy, lecture strategy

Procedia PDF Downloads 82
6232 High-Rises and Urban Design: The Reasons for Unsuccessful Placemaking with Residential High-Rises in England

Authors: E. Kalcheva, A. Taki, Y. Hadi

Abstract:

High-rises and placemaking is an understudied combination which receives more and more interest with the proliferation of this typology in many British cities. The reason for studying three major cities in England: London, Birmingham and Manchester, is to learn from the latest advances in urban design in well-developed and prominent urban environment. The analysis of several high-rise sites reveals the weaknesses in urban design of contemporary British cities and presents an opportunity to study from the implemented examples. Therefore, the purpose of this research is to analyze design approaches towards creating a sustainable and varied urban environment when high-rises are involved. The research questions raised by the study are: what is the quality of high-rises and their surroundings; what facilities and features are deployed in the research area; what is the role of the high-rise buildings in the placemaking process; what urban design principles are applicable in this context. The methodology utilizes observation of the researched area by structured questions, developed by the author to evaluate the outdoor qualities of the high-rise surroundings. In this context, the paper argues that the quality of the public realm around the high-rises is quite low, missing basic but vital elements such as plazas, public art, and seating, along with landscaping and pocket parks. There is lack of coherence, the rhythm of the streets is often disrupted, and even though the high-rises are very aesthetically appealing, they fail to create a sense of place on their own. The implications of the study are that future planning can take into consideration the critique in this article and provide more opportunities for urban design interventions around high-rise buildings in the British cities.

Keywords: high-rises, placemaking, urban design, townscape

Procedia PDF Downloads 294
6231 Political Economy of Internal Dispalcement, Migration and Human Security in Zimbabwe: 1800 to Present Day

Authors: Chupicai Manuel

Abstract:

The purpose of this article is to examine the political economy and history of internal displacement, migration and human security in Zimbabwe from 1800 to present day. The article gives a timeline of major internal displacement, migration trends that took place in Zimbabwe before colonialism, through the colonial period up to the present day and examines the human security context of such periods. In view of the above, a political economy analysis will be employed to examine the different factors that promoted internal displacement and human movements from 1800 to the present day and explore the architecture of human security in Zimbabwe. The ultimate goal of this literature review is to provide a longitudinal analysis of internal displacement, migration and human security regimes that existed in Zimbabwe with the view of promoting social cohesion and nation building.

Keywords: human security, internal displacement, migration, political economy

Procedia PDF Downloads 323
6230 Eating Patterns and Food Coping Strategy for Students of Prof. Dr. Hamka University During Covid-19 Pandemic

Authors: Chica Riska Ashari, Yoli Farradika

Abstract:

Background: Nutritional problems arise due to food security problems in the family, such as the ability of families to obtain food which is common in poor people due to lack of economic access to buy food. For this reason, it is hoped that there will be actions or behaviors that can be taken to fulfill their food or known as the Food Coping Strategy. The purpose of this study is to identify the eating patterns and Food Coping strategies of household students of prof. DR. HAMKA Muhammadiyah University Jakarta during the covid-19 pandemic. Methods: This study is a quantitative observational study with a cross-sectional approach. The dependent variable in this study is food coping strategies and eating patterns. The location of this research is Prof. DR. Hamka Muhammadiyah University. The population in this study were all students of Prof. DR. HAMKA Muhammadiyah University. The sampling technique is purposive sampling. The minimum number of samples in this study is 97 people with a response rate or drop out an estimate of 10%, so the total number of samples was 107 people. Statistical analysis with descriptive analysis. Results: The results showed that most of the food coping strategies were carried out by the students of the household of Prof. DR. HAMKA Muhammadiyah University, were buying the cheaper food (91.6%), then changing the priority of buying food (75.7%) and household members who carry out this food coping strategy are mothers (59.8%) then followed by students themselves (57, 9%). The diet of most students at the Prof. DR. HAMKA Muhammadiyah University in a day was fond of consuming sugar and foods containing sugar (candy, sugar, honey, sweet drinks) (98.1%) then eggs (97.2%). Conclusion: Food coping strategies are mostly used by households students at Prof. DR. HAMKA Muhammadiyah University who were buying the cheaper food and the member who did this behavior the most were the mothers. The diet of most students at Prof. DR. HAMKA Muhammadiyah University in a day was fond of consuming sugar and foods containing sugar (candy, sugar, honey, sweet drinks).

Keywords: behavior, eating patterns, food coping strategies, food security, students

Procedia PDF Downloads 150
6229 A Pattern Practise for Awareness Educations on Information Security: Information Security Project

Authors: Fati̇h Apaydin

Abstract:

Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics.

Keywords: computer, information security, education, technology, development

Procedia PDF Downloads 563
6228 The Role of Female Population as a Consumer in Modern Marketing Strategy and Management

Authors: Jana Aleksić, Marijana Petković

Abstract:

Female population has an increasing role when it comes to purchase. Consequently, the female population has a greater role in modern marketing. Although it is thought that women buy more than men, marketing strategy was not directed specifically towards women. The thing that has changed regarding women’s role in modern marketing is the fact that the female population has a leading position when it comes to decision making in various fields and various sectors, which was not the case in the past. Marketing should be directed towards women but it should be done in the right way. Compared to men, women buy in a different way, and they look for more various advantages in the product itself, than men do. This paper aims to show the importance of the female role in the modern marketing and management and to redirect marketing in some way towards female population through new marketing strategies and management systems. Hypothesis is that women have an important role in marketing, and marketing strategy of modern society could and should be based on and directed towards female population and their tastes when it comes to purchasing. It is necessary and desirable to apply marketing strategy with a special strategy that has an emphasis on women and their purchase or in a word to apply WS- woman strategy. This research was carried out as a random sample research, where were obtained 212 valid surveys whose results serve as a basis for drawing conclusions about the research as well as to verify the formulated hypotheses. The research was carried out during 2011 and 2012. The study has shown a significant role of the female population in the marketing process.

Keywords: marketing, management, female, purchase, strategy

Procedia PDF Downloads 412
6227 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 50
6226 To What Extent Does Physical Activity and Standard of Competition Affect Quantitative Ultrasound (QUS) Measurements of Bone in Accordance with Muscular Strength and Anthropometrics in British Young Males?

Authors: Joseph Shanks, Matthew Taylor, Foong Kiew Ooi, Chee Keong Chen

Abstract:

Introduction: Evidences of relationship between bone, muscle and standard of competition among young British population is limited in literature. The current literature recognises the independent and synergistic effects of fat free and fat mass as the stimulus for osteogenesis. This study assessed the extent to which physical activity (PA) and standard of competition (CS) influences quantitative ultrasound (QUS) measurements of bone on a cross-sectional basis accounting for muscular strength and anthropometrics in British young males. Methods: Pre-screening grouped 66 males aged 18-25 years into controls (n=33) and district level athletes (DLAs) (n=33) as well as low (n=21), moderate (n=23) and high (n=22) physical activity categories (PACs). All participants underwent QUS measurements of bone (4 sites, i.e. dominant distal radius (DR), dominant mid-shaft tibia (DT), non-dominant distal radius (NR) and non-dominant mid-shaft tibia (NT)), isokinetic strength tests (dominant and non-dominant knee flexion and extension) and anthropometric measurements. Results: There were no significant differences between any of the groups with respect to QUS measurements of bone at all sites with regards to PACs or CS. Significant higher isokinetic strength values were observed in DLAs than controls (p < 0.05), and higher than low PACs (p < 0.05) at 60o.s-1 of concentric and eccentric measurements. No differences in subcutaneous fat thickness were found between all the groups (CS or PACs). Percentages of body fat were significantly higher (p < .05) in low than high PACs and CS groups. There were significant positive relationships between non dominant radial speed of sound and fat free mass at both DR (r=0.383, p=0.001) and NR (r=0.319, p=0.009) sites in all participants. Conclusion: The present study findings indicated that muscular strength and body fat are closely related to physical activity level and standard of competition. However, bone health status reflected by quantitative ultrasound (QUS) measurements of bone is not related to physical activity level and standard of competition in British young males.

Keywords: bone, muscular strength, physical activity, standard of competition

Procedia PDF Downloads 491
6225 Future Outlook and Current Situation for Security of Gas Supply in Eastern Baltic Region

Authors: Ando Leppiman, Kati Kõrbe Kaare, Ott Koppel

Abstract:

The growing demand for gas has rekindled a debate on gas security of supply due to supply interruptions, increasing gas prices, transportation and distribution bottlenecks and a growing reliance on imports over longer distances. Security of supply is defined mostly as an infrastructure package to satisfy N-1 criteria. In case of Estonia, Finland, Latvia, and Lithuania all the gas infrastructure is built to supply natural gas only from one single supplier, Russia. In 2012, almost 100% of natural gas to the Eastern Baltic Region was supplied by Gazprom. under such circumstances infrastructure N-1 criteria does not guarantee security of supply. In the Eastern Baltic Region, the assessment of risk of gas supply disruption has been worked out by applying the method of risk scenarios. There are various risks to be tackled in Eastern Baltic States in terms of improving security of supply, such as single supplier risk, physical infrastructure risk, regulatory gap, fair price, and competition. The objective of this paper is to evaluate the energy security of the Eastern Baltic Region within the framework of the European Union’s policies and to make recommendations on how to better guarantee the energy security of the region.

Keywords: security of supply, supply routes for natural gas, energy balance, diversified supply options, common regulative package

Procedia PDF Downloads 233
6224 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 62
6223 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 47
6222 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 211
6221 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 328
6220 Exploring the Dark Side of IT Security: Delphi Study on Business’ Influencing Factors

Authors: Tizian Matschak, Ilja Nastjuk, Stephan Kühnel, Simon Trang

Abstract:

We argue that besides well-known primary effects of information security controls (ISCs), namely confidentiality, integrity, and availability, ISCs can also have secondary effects. For example, while IT can add business value through impacts on business processes, ISCs can be a barrier and distort the relationship between IT and organizational value through the impact on business processes. By applying the Delphi method with 28 experts, we derived 27 business process influence dimensions of ISCs. Defining and understanding these mechanisms can change the common understanding of the cost-benefit valuation of IT security investments and support managers' effective and efficient decision-making.

Keywords: business process dimensions, dark side of information security, Delphi study, IT security controls

Procedia PDF Downloads 79
6219 State of Conservation of the British Colonial Architectural Heritage of Karachi: Case Study of Damage Mapping of Empress Market Building

Authors: Tania Ali Soomro

Abstract:

In 1839, the British, after the annexation of the port city of Karachi, established a new urban centre consisting of various quarters and introduced new settlements there. These quarters were out of the boundaries of fortified native old area and now contain much of the oldest parts of the city and signify the colonial history of Karachi, in particular the Saddar Bazaar and the neighboring areas of Kharadar and Mithadar. These quarters bestow a mix of functional typology built in a hybrid form of construction - an adaptation of the western architectural attributes to regional requirements and characteristics. This approach is referred to as the Anglo Vernacular, Colonial or the Domestic Gothic architectural form. This research paper investigates the historical and architectural value of one such property: the Empress Market designed by then Municipal Architect, Ar. James Strachan in 1889 as a commemorative monument for the jubilee of Her Majesty the Queen Victoria; Empress of British India, at that time. This paper presents information on the present conservation status of the market building and highlights its role as a catalyst to the community interconnection. This building has survived to present day and functioned well, despite undergoing numerous transformations. A detailed analysis of the bio-degradation (Natural-Chemical dissolution of material) and the bio-deterioration (Manmade-Negative state change of the material) of the building, based on the examination of the prevailing causes of these bio-alterations is carried out, and is presented in form of a damage atlas containing both the categories of bio-alteration/ changes occurred to the building over the time. The research methodology followed in this paper starts with the available archival analysis, physical observation, photographic documentation, the statistics review and the interviews with the direct and indirect stakeholders. The results and findings of this research portray that these bio-alterations and changes are the essential part of the life cycle of Empress Market building which illustrate the historic development of the premise and therefore ought to be given due importance (depending upon their condition) while developing the conservation plan for the building.

Keywords: British colonial architecture, bio-alteration, bio-degradation, bio-deterioration, domestic gothic architectural form

Procedia PDF Downloads 126
6218 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 273
6217 Effects of Dimensional Sizes of Mould on the Volumetric Shrinkage Strain of Lateric Soil

Authors: John E. Sani, Moses George

Abstract:

The paper presents the result of a laboratory study carried out on lateritic soil to determine the effects of dimensional size on the volumetric shrinkage strain (VSS) using three mould sizes i.e. split former mould, proctor mould and California bearing ratio (CBR) mould at three energy levels; British standard light (BSL), West African standard (WAS) and British standard heavy (BSH) respectively. Compactions were done at different molding water content of -2 % to +6 % optimum moisture content (OMC). At -2% to +2% molding water content for the split former mould the volumetric shrinkage strain met the requirement of not more than 4% while at +4% and +6% only the WAS and BSH met the requirement. The proctor mould and the CBR mould on the other hand gave a lower value of volumetric shrinkage strain in all compactive effort and the values are lower than the 4% safe VSS value.

Keywords: lateritic soil, volumetric shrinkage strain, molding water content, compactive effort

Procedia PDF Downloads 502
6216 Effects of the Treatment by Polypill Combinations vs Identical Monopill Therapies in Patients with Cardiovascular Comorbid Diseases

Authors: Denys Sebov, Viktoriia Korotaieva, Kateryna Markina

Abstract:

The clinical advantage of the multipill combination drugs administration (polypill-strategy) over single-component drugs (monopill-strategy) has been established in patients with comorbid arterial hypertension, heart failure, chronic coronary syndrome, diabetes. It was found that polypill-strategy provides better treatment adherence in 33.4% of the patients. It was proven a significant decrease in systolic and diastolic blood pressure, as well as a decrease in dispersion index due to the stability of the blood pressure profile in patients with the polypill-strategy treatment.

Keywords: polypill, artetial hypertension, cardiovascular disease, compliance

Procedia PDF Downloads 22
6215 India’s Emigration Act: Its Emergence and Changes

Authors: Sudhaveni Naresh

Abstract:

Emigration is not a new phenomenon in India but globalization has reinforced it. India has been a source of emigrants for many countries for a long period. Over 25 million Indian diaspora is spread across the world. Historically, during the British rule indenture labour from India was sent to other colonies. To regulate indentured emigration and to provide a mechanism for emigration, the British India government enacted Emigration Act, 1922. After independence, a majority of unskilled and semi-skilled labour emigrated to Gulf and South-East Asia, whereas white-collar workers preferred North America, Europe and Australia. They are contributing to both the economies in origin and destination. Due to increasing quantum of emigration, the Ministry of Labour enacted Emigration Act, 1983, which deals with the emigration of Indian workers for overseas employment on contractual basis, seeks to safeguard emigrants’ interest and ensures their welfare. The paper explains the reason behind enacting Emigration Act, 1983, and the changes in the form of an Emigration (Amendment) Rules, 2009. This paper examines the current status, effectiveness of the Act and rules.

Keywords: economic growth, emigrants, Emigration Act 1983, remittance

Procedia PDF Downloads 308
6214 The Antecedents of Customer-to-Customer Interaction to Brand and Communication Strategy: A Marketer’s Perspective

Authors: Kartina Sury Kariman

Abstract:

Brand-to-customer (B2C) engagement has been well established through the traditional platform such as direct sales, advertising, customer service center, customer hotline as well as brand usage experiences. Increasingly, interest to B2C has evolved to include customer-to-customer (C2C) interaction analysis aligned with the vast growth of web 2.0. Hence, discussion on C2C interaction and brand strategy have captured social media as it enables brands and C2C interaction to be connected in various ways, providing opportunities for marketers to shape their brand engagement strategy while reaching C2C as the targeted outcomes. The objective here is to provide a preliminary review of C2C interaction consisting the antecedents and consequences while highlighting areas of research interest within the context from marketers perspective and the business outcomes. This paper discusses how C2C interaction defines marketers’ brand and communication strategy and how social media trend shapes the strategy when promoting the awareness of life insurance industry and educating the target market.

Keywords: social media, brand engagement, customer interaction, customer engagement, brand strategy, life insurance

Procedia PDF Downloads 434
6213 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 182
6212 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 71
6211 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 305
6210 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 379
6209 Environmental Refugees in Africa: A Case Study of Sahel Region

Authors: Ahlem Setrallah

Abstract:

Environment has become a phenomenon directly linked to security in recent decades. This security aspect of environment is justified by the challenges that environment problems can have on human life and thus security especially within the scope of human security that is based mainly on the individual rather than on the state. Because Africa is not safe from the global warming and all its consequences on environment, this continent has witnessed many crises related to environment and that have had direct impact on security in Africa. One of those crises is environmental displacement or immigration which was caused by natural disasters like draught, desertification and food shortage to name but a few. This paper aims at shedding light at some important cases in the Africa focusing mainly on the Sahel region. The main research questions that we are trying to answer are the following: 1-What is the relationship between environment and forced immigration in the Sahel region? 2-What is the impact of environmental immigration on Security in the region? 3-How have the states in this region reacted to this crisis? 4-Is the measures taken by those states adequate or not? 5- How to remedy for the limitations of those measures? The paper is based on case study methodology as a way to better understand the relationship between security and environment using library research for data collection and analysis. This paper aims also at presenting some suggesting regarding possible ways of reducing the negative impact of environmental immigration.

Keywords: environment, refugees, Sahel region, security

Procedia PDF Downloads 438
6208 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 435