Search results for: cyber security strategic
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4104

Search results for: cyber security strategic

3924 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 316
3923 Team Cognitive Heterogeneity and Strategic Decision-Making Flexibility: The Role of Transactive Memory System and Task Complexity

Authors: Rui Xing, Baolin Ye, Nan Zhou, Guohong Wang

Abstract:

Drawing upon a perspective of cognitive interaction, this study explores the relationship between team cognitive heterogeneity and team strategic decision-making flexibility, treating the transactive memory system as a mediator and task complexity as a moderator. The hypotheses were tested in linear regression models by using data gathered from 67 strategic decision-making teams in the new-energy vehicle industry. It is found that team cognitive heterogeneity has a positive impact on strategic decision-making flexibility through the mediation of specialization and coordination of the transactive memory system, which is positively moderated by task complexity.

Keywords: strategic decision-making flexibility, team cognitive heterogeneity, transactive memory system, task complexity

Procedia PDF Downloads 43
3922 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware

Authors: Azita Ramezani, Atousa Ramezani

Abstract:

In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.

Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection

Procedia PDF Downloads 35
3921 COVID-19: A Thread to the Security System of Foreign Investment

Authors: Mehdi Ghaemi

Abstract:

In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.

Keywords: foreign investment, FPS standard, host country, public health, COVID-19

Procedia PDF Downloads 68
3920 Impact of Strategic Leadership on Corporate Performance

Authors: Adesina Nathaniel Olanrewaju

Abstract:

The motivation behind this study is the need to see strategic leadership as one of the key driving forces for improving corporate performance. Strategic leadership is seen as a potent source of management development and sustained competitive advantage for both employee and organizational performance. There is currently a charge on leaders as a major cause of organizational failure. Stakeholders give what they can afford, not necessarily what the organization needs and impose operational and financial decisions on the leaders, 200 respondents were fit for the analysis from the six geo-political regions in Nigeria. The selection was done equally among various parastatals through random sampling technique from the south-south, south-east, south-west, north-east, north-west and north-central. A descriptive research of the survey was employed. The data were subjected to t-test analysis and correlation and regression were used for the analysis. The findings revealed that there is a strong relationship and impact between a strategic leader and corporate performance. Recommendations were made based on the findings that strategic leaders should be given the blueprint, company’s policy and the stakeholders’ expectation within a time frame the work is to be carried out.

Keywords: time, strategic, organization, stakeholder, leader, performance

Procedia PDF Downloads 276
3919 The Role of Strategic Alliances, Innovation Capability, Cost Reduction in Enhancing Customer Loyalty and Firm’s Competitive Advantage

Authors: Soebowo Musa

Abstract:

Mining industries are known to be very volatile due to their sensitive nature toward changes in the environment, particularly coal mining. Heavy equipment distributors and coal mining contractors are among heavily affected by such volatility. They are facing more uncertainty on the sustainability of the coal mining industry. Strategic alliances and organizational capabilities such as innovation capability have long been seen as ways to stay competitive with a focus more on the strategic alliances partner-to-partner in serving their customers. In today’s rapid change in the environment, a shift in consumer behaviors, and the human-centric business approach, this study looks at the strategic alliance partner-to-customer relationship in both the industrial organization and resource-based theories. This study was conducted based on 250 respondents from the strategic alliances partner-to-customer between heavy equipment distributors and coal mining contractors in Indonesia. This study finds strategic alliances have the highest association toward cost reduction, a proxy of operational efficiency followed by its association toward innovation capability. Further, strategic alliances and innovation capability have a positive relationship with customer loyalty, while innovation capability and customer loyalty have no significant relationships toward the firm’s competitive advantage. This study also indicates that cost reduction is not a condition to develop customer loyalty in the strategic alliance partner-to-customer relationship. It confirms strategic alliances are a strategy that creates a firm’s operational efficiency, innovation capability that develops customer loyalty, and competitive advantage.

Keywords: strategic alliance, innovation capability, cost reduction, customer loyalty, competitive advantage

Procedia PDF Downloads 88
3918 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 452
3917 The Effect of Artificial Intelligence on Human Rights Obligations and Theories

Authors: Sameh Sarwat Melek Mikheal

Abstract:

The relationship between development and human rights has long been the subject of academic debate. To understand the dynamics between these two concepts, various principles are adopted, from the right to development to development-based human rights. Despite the initiatives taken, the relationship between development and human rights remains unclear. However, the overlap between these two views and the idea that efforts should be made in the field of human rights have increased in recent years. It is then evaluated whether the right to sustainable development is acceptable or not. This article concludes that the principles of sustainable development are directly or indirectly recognized in various human rights instruments, and this is a good answer to the question posed above. This book therefore cites regional and international human rights agreements such as , as well as the jurisprudence and interpretative guidelines of human rights institutions, to prove this hypothesis.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation sustainable development, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 12
3916 Development of Strategic Cooperation in Managing Thailand-Myanmar Borders: Roles of Education in Enhancing Sustainability

Authors: Rungrot Trongsakul

Abstract:

This paper was aimed to study the strategic cooperation development of Thailand in accordance with the door open policy of Myanmar, by use of DIMES Model: Diplomacy, Information, Military and Economics, Socio-Culture. This research employed qualitative method, aiming to study, analyze and synthesize the content of laws, policies, relevant research papers and documents, and relevant theories, and to study external environment and national power based on DIMES Model. The five steps of strategic development utilized in this study included (1) conceptual framework and definition; (2) environmental scanning; (3) assessing; (4) determining; and (5) drafting strategic plan. The suggested strategies were based on the concept of 'Soft Power'. Therefore, the determination of measures, action plans or projects as strategic means of public and private organizations should be based on sincere participation among people and communities living on the borders shared by both countries. Adoption of education, learning and sharing process is a key to building sustainability of the countries’ strategic cooperation, while an application of 'Soft Power' in all dimensions of the cooperation between the two countries was suggested.

Keywords: education, strategic cooperation, Thailand-Myanmar borders, sustainability

Procedia PDF Downloads 327
3915 Impact of Organizational Culture and Strategic Leadership on Organizational Resilience

Authors: Anyia Nduka, Aslan Bin Amad Senin

Abstract:

Organizational culture, strategic leadership and organizational resilience have gained significant attention in recent years. This study aims to examine the relationship between these factors and their combined influence on an organization's ability to adapt and thrive in the face of challenges and disruptions. A mixed-methods approach, combining quantitative survey data and qualitative interviews with leaders and employees from cohort organizations within the industry. The quantitative phase involves measuring organizational culture, strategic leadership behaviours, and organizational resilience using standardized scales. This study highlighted the significance of organizational culture and strategic leadership in building and sustaining organizational resilience. Preliminary findings suggest a strong positive relationship between a resilient organizational culture and strategic leadership practices. Secondly, Organizations can enhance their capacity to respond to disruptions, exploit opportunities, and achieve long-term success in a rapidly changing business environment. Furthermore, the qualitative analysis reveals several key themes that elucidate the link between organizational culture, strategic leadership, and resilience. This study contributes to the growing body of knowledge on organizational resilience and strategic leadership, providing insights and practical implications for leaders and practitioners seeking to strengthen their organizations' resilience capabilities. Further research is needed to explore the specific mechanisms and contextual factors that influence the relationship between these variables in different organizational contexts and industries.

Keywords: organizational culture, strategic leadership, organizational resilience, leadership

Procedia PDF Downloads 32
3914 Relationship between Strategic Management and Organizational Culture in Sport Organization (Case Study: Selected Sport Federations of Islamic Republic of Iran)

Authors: Mohammad Ali Ghareh, Habib Honari, Alireza Ahmadi

Abstract:

The aim of this study was to investigate the relationship between strategic management and organizational culture in sport federations of Islamic Republic of Iran. Strategic management is a set of decisions and actions which define the long term performance of an organization. Organizational culture can be considered as an identity for every organization and somehow gives an identification to organization members. Organizational culture result in a certain commitments in organization members which is more valuable than individual profits and interests. The method of research was descriptive and correlational, conducted as a field study. The statistical population consisted of the employees of 10 sports federations and 170 persons were selected as sample. For data gathering, Barringer and Bluedorn’s strategic management questionnaire (1999) and Sakyn’s organizational culture questionnaire (2001) were used. The reliability of the questionnaires were 0.82 and 0.80 respectively, and the validity was approved by 8 experienced professors in sport management. To analyze data, KS (Kolmogorov–Smirnov) test and Pearson's coefficient were used. The results have shown that there is a significant meaningful relationship between strategic management and organizational culture (p < 0.05, r= 0.62). Beside this, there is a positive relationship between strategic management variables including scanning intensity, planning flexibility, locus of planning, planning horizon, strategic controls, and organizational culture (p < 0.05). Based on this research result it can be derived that strategic management planning and operation in terms of appropriate organizational culture is more applicable. By agreeing on their values and beliefs, adaptation to changes, caring about the individualities, coordination in tasks, modifying the individual and organizational goals, the federations will be able to achieve their strategic goals.

Keywords: strategic management, organizational culture, sports federations, Islamic Republic of Iran

Procedia PDF Downloads 335
3913 Ranking Effective Factors on Strategic Planning to Achieve Organization Objectives in Fuzzy Multivariate Decision-Making Technique

Authors: Elahe Memari, Ahmad Aslizadeh, Ahmad Memari

Abstract:

Today strategic planning is counted as the most important duties of senior directors in each organization. Strategic planning allows the organizations to implement compiled strategies and reach higher competitive benefits than their competitors. The present research work tries to prepare and rank the strategies form effective factors on strategic planning in fulfillment of the State Road Management and Transportation Organization in order to indicate the role of organizational factors in efficiency of the process to organization managers. Connection between six main factors in fulfillment of State Road Management and Transportation Organization were studied here, including Improvement of Strategic Thinking in senior managers, improvement of the organization business process, rationalization of resources allocation in different parts of the organization, coordination and conformity of strategic plan with organization needs, adjustment of organization activities with environmental changes, reinforcement of organizational culture. All said factors approved by implemented tests and then ranked using fuzzy multivariate decision-making technique.

Keywords: Fuzzy TOPSIS, improvement of organization business process, multivariate decision-making, strategic planning

Procedia PDF Downloads 374
3912 Modeling and Analyzing Controversy in Large-Scale Cyber-Argumentation

Authors: Najla Althuniyan

Abstract:

Online discussions take place across different platforms. These discussions have the potential to extract crowd wisdom and capture the collective intelligence from a different perspective. However, certain phenomena, such as controversy, often appear in online argumentation that makes the discussion between participants heated. Heated discussions can be used to extract new knowledge. Therefore, detecting the presence of controversy is an essential task to determine if collective intelligence can be extracted from online discussions. This paper uses existing measures for estimating controversy quantitatively in cyber-argumentation. First, it defines controversy in different fields, and then it identifies the attributes of controversy in online discussions. The distributions of user opinions and the distance between opinions are used to calculate the controversial degree of a discussion. Finally, the results from each controversy measure are discussed and analyzed using an empirical study generated by a cyber-argumentation tool. This is an improvement over the existing measurements because it does not require ground-truth data or specific settings and can be adapted to distribution-based or distance-based opinions.

Keywords: online argumentation, controversy, collective intelligence, agreement analysis, collaborative decision-making, fuzzy logic

Procedia PDF Downloads 96
3911 Understanding Cyber Kill Chains: Optimal Allocation of Monitoring Resources Using Cooperative Game Theory

Authors: Roy. H. A. Lindelauf

Abstract:

Cyberattacks are complex processes consisting of multiple interwoven tasks conducted by a set of agents. Interdictions and defenses against such attacks often rely on cyber kill chain (CKC) models. A CKC is a framework that tries to capture the actions taken by a cyber attacker. There exists a growing body of literature on CKCs. Most of this work either a) describes the CKC with respect to one or more specific cyberattacks or b) discusses the tools and technologies used by the attacker at each stage of the CKC. Defenders, facing scarce resources, have to decide where to allocate their resources given the CKC and partial knowledge on the tools and techniques attackers use. In this presentation CKCs are analyzed through the lens of covert projects, i.e., interrelated tasks that have to be conducted by agents (human and/or computer) with the aim of going undetected. Various aspects of covert project models have been studied abundantly in the operations research and game theory domain, think of resource-limited interdiction actions that maximally delay completion times of a weapons project for instance. This presentation has investigated both cooperative and non-cooperative game theoretic covert project models and elucidated their relation to CKC modelling. To view a CKC as a covert project each step in the CKC is broken down into tasks and there are players of which each one is capable of executing a subset of the tasks. Additionally, task inter-dependencies are represented by a schedule. Using multi-glove cooperative games it is shown how a defender can optimize the allocation of his scarce resources (what, where and how to monitor) against an attacker scheduling a CKC. This study presents and compares several cooperative game theoretic solution concepts as metrics for assigning resources to the monitoring of agents.

Keywords: cyber defense, cyber kill chain, game theory, information warfare techniques

Procedia PDF Downloads 113
3910 The Connection Between the International Law and the Legal Consultation on the Social Media

Authors: Amir Farouk Ahmed Ali Hussin

Abstract:

Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues.

Keywords: international legal, consultation mix, legal research, small and medium-sized enterprises, strategic International law, strategy alignment, house of laws, deployment, production strategy, legal strategy, business strategy

Procedia PDF Downloads 20
3909 Screening of Strategic Management Criterions in Hospitals Using Delphi-Fuzzy Method

Authors: Helia Moayedi, Mahdi Moaidi

Abstract:

Nowadays, the managing and planning of hospitals is facing many problems. Failure to recognize the main criteria for strategic management to ensure long-term hospital performance can lead to many health problems. To achieve this goal, a qualitative-quantitate method titled Delphi-Fuzzy has been applied. This strategy makes it possible for experts to screen among the most important criteria in strategic management. To conduct this operation, a statistical society consisting of 20 experts in Ahwaz hospitals has been questioned. The final model confirms the key criterions after three stages of Delphi. This model provides the possibility to focus on the basic criteria and can determine the organization’s main orientation.

Keywords: Delphi-fuzzy method, hospital management, long-term planning, qualitative-quantitate method, screening of strategic criteria, strategic planning

Procedia PDF Downloads 98
3908 Information Technology and the Challenges Facing the Legal Profession in Nigeria

Authors: Odoh Ben Uruchi

Abstract:

Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.

Keywords: information technology, challenges, legal profession, Nigeria

Procedia PDF Downloads 493
3907 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 241
3906 Empowering Girls and Youth in Bangladesh: Importance of Creating Safe Digital Space for Online Learning and Education

Authors: Md. Rasel Mia, Ashik Billah

Abstract:

The empowerment of girls and youth in Bangladesh is a demanding issue in today's digital age, where online learning and education have become integral to personal and societal development. This abstract explores the critical importance of creating a secure online environment for girls and youth in Bangladesh, emphasizing the transformative impact it can have on their access to education and knowledge. Bangladesh, like many developing nations, faces gender inequalities in education and access to digital resources. The creation of a safe digital space not only mitigates the gender digital divide but also fosters an environment where girls and youth can thrive academically and professionally. This manuscript draws attention to the efforts through a mixed-method study to assess the current digital landscape in Bangladesh, revealing disparities in phone and internet access, online practices, and awareness of cyber security among diverse demographic groups. Moreover, the study unveils the varying levels of familial support and barriers encountered by girls and youth in their quest for digital literacy. It emphasizes the need for tailored training programs that address specific learning needs while also advocating for enhanced internet accessibility, safe online practices, and inclusive online platforms. The manuscript culminates in a call for collaborative efforts among stakeholders, including NGOs, government agencies, and telecommunications companies, to implement targeted interventions that bridge the gender digital divide and pave the way for a brighter, more equitable future for girls and youth in Bangladesh. In conclusion, this research highlights the undeniable significance of creating a safe digital space as a catalyst for the empowerment of girls and youth in Bangladesh, ensuring that they not only access but excel in the online space, thereby contributing to their personal growth and the advancement of society as a whole.

Keywords: collaboration, cyber security, digital literacy, digital resources, inclusiveness

Procedia PDF Downloads 22
3905 Security Architecture for Cloud Networking: A Survey

Authors: Vishnu Pratap Singh Kirar

Abstract:

In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.

Keywords: cloud computing, cloud networking, IaaS, PaaS, SaaS, cloud security

Procedia PDF Downloads 499
3904 Islamic Social Security: A Discourse

Authors: Safiyya A. Abba, Shehu U. R. Aliyu

Abstract:

This paper deals with Islamic social security: a discourse explores the meaning and nature of Islamic social security system. The paper reviews the social security framework and operations during the early period. The paper further identifies the instruments of Islamic social security discusses its principles and objectives. The paper discovers that Islamic social security is a personification of a comprehensive welfare approach in view of its varied instruments that are deeply rooted in the Islamic law, unique principles and realistic and achievable objectives. Furthermore, the Islamic social security system has far reaching socioeconomic implications; social justice, cohesion, equity, a catalyst for poverty eradication, income redistribution, economic growth and development.

Keywords: Islamic social security, basic needs, zakat, socioeconomic justice, equity

Procedia PDF Downloads 403
3903 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East

Authors: Zahra Bakhtiari

Abstract:

Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.

Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy

Procedia PDF Downloads 50
3902 Effectiveness of School Strategic Planning: The Case of Fijian Schools

Authors: G. Lingam, N. Lingam, K. Raghuwaiya

Abstract:

In Fiji, notable among the recent spate of educational reforms has been the Ministry of Education’s (MoEs) requirement that all schools undertake a process of school strategic planning. This preliminary study explores perceptions of a sample of Fijian teachers on the way this exercise has been conducted in their schools. The analysis of both quantitative and qualitative data indicates that school leaders’ lack of knowledge and skills in school strategic planning is a major limitation. As an unsurprising consequence, the process(es) schools adopted did not conform to what the literature suggests as best planning practices. School leaders need more training to ensure they are better prepared to carry out this strategic planning effectively, especially in widening the opportunities for all who have a stake in education to contribute to the process. Implications of the findings are likely to be pertinent to other developing contexts within and beyond the Pacific region for the training of school leaders to ensure they are better equipped to orchestrate and benefit from educational reforms thrust upon them.

Keywords: school strategic planning, educational reforms, Fijian schools, Ministry of Education

Procedia PDF Downloads 341
3901 Cyber-Softbook: A Platform for Collaborative Content Development and Delivery for Cybersecurity Education

Authors: Eniye Tebekaemi, Martin Zhao

Abstract:

The dichotomy between the skills set of newly minted college graduates and the skills required by cybersecurity employers is on the rise. Colleges are struggling to cope with the rapid pace of technology evolution using outdated tools and practices. Industries are getting frustrated due to the need to retrain fresh college graduates on skills they should have acquired. There is a dire need for academic institutions to develop new tools and systems to deliver cybersecurity education to meet the ever-evolving technology demands of the industry. The Cyber-Softbook project’s goal is to bridge the tech industry and tech education gap by providing educators a framework to collaboratively design, manage, and deliver cybersecurity academic courses that meet the needs of the tech industry. The Cyber-Softbook framework, when developed, will provide a platform for academic institutions and tech industries to collaborate on tech education and for students to learn about cybersecurity with all the resources they need to understand concepts and gain valuable skills available on a single platform.

Keywords: cybersecurity, education, skills, labs, curriculum

Procedia PDF Downloads 57
3900 Strategic Alliances and Creative Synergy within European Union: A Theoretical Perspective

Authors: Maha Tichetti, Barzi Redouane, Selim Kanat

Abstract:

In the European Union (EU), where economic, political, and cultural ties converge, strategic alliances play a pivotal role in shaping the collaborative landscape. This paper embarks on a journey into the EuroSphere, offering a comprehensive analysis review that unravels the dynamics of these alliances within the European context. The focus is specifically directed towards understanding their profound impact on creative synergy and innovation among teams. In our analysis, we provide theoretical explanations for key terms such as "creative synergy" and "strategic alliances." We outline various types of competitive strategies, delve into the motivations prompting the formation of strategic alliances, and critically examine the success and failure factors in these kinds of collaboration. Additionally, we explore the goals achievable through strategic alliances, especially in the context of external growth. A central focus of this paper focus on how strategic alliances can significantly impact creative synergy within the European landscape. Through a theoretical lens, we explore the interplay between collaborative strategies and the enhancement of creative thinking within teams engaged in strategic alliances. The article goes beyond theoretical frameworks to present a tangible example of a strategic alliance emerging in the European market. This case study illuminates how such alliances have empowered European companies to enhance their competitive positions on the global stage while concurrently fostering creative synergy among their teams. This comprehensive review not only contributes to the theoretical understanding of strategic alliances and creative synergy but also offers practical insights for businesses navigating the collaborative landscape within the EuroSphere. As we unravel the complexities of these alliances, we uncover valuable lessons and opportunities for future research, providing a roadmap for those seeking to harness the full potential of strategic collaborations in the dynamic European context.

Keywords: European Union, strategic alliances, creative synergy, competitiveness

Procedia PDF Downloads 31
3899 Tenure Security, Agricultural Diversity and Food Security

Authors: Amanuel Hadera Gebreyesus

Abstract:

In the literature, the study of tenure and food security has largely involved separate lines of inquiry. In effect, the nexus among these has received little attention; and the underinvestment in research related to the relationship between tenure and food security deters generation of tenure-related knowledge and policy guidance for improving food and nutrition security. Drawing from this motivation, we study the relationship among tenure security, agricultural diversity and food security and dietary diversity. We employ IV approaches to examine the effect of tenure security and agricultural diversity on food security and dietary diversity. We find tenure security is inversely related with food insecurity as shown by its negative association with hunger scale, hunger index and hunger category. On the other hand, results suggest that tenure security improves minimum dietary diversity of women while we find no association with child dietary diversity. Moreover, agricultural diversity is positively related with minimum dietary diversity of women, which may point to higher accessibility and consumption of dietary food groups by women. Also, findings suggest that farmers use their human (knowledge and skills) and resource (land) endowments to improve food security and dietary diversity. An implication from this is the importance of not only improving access to land but also long-term tenure security to promote agricultural diversity, food security and dietary diversity.

Keywords: tenure security, food security, agricultural diversity, dietary diversity, women

Procedia PDF Downloads 162
3898 Society-Centric Warfare: Lessons from Afghanistan

Authors: Amin Tarzi

Abstract:

The government of the Islamic Republic of Afghanistan was expected to keep the Taliban insurgents at bay after the departure of North Atlantic Treaty Organization (NATO)-led forces in 2021, especially given the two decades of effort to establish security forces to safeguard Western-backed governing institutions. This articles reviews the reasons for the failure of the much larger and better-equipped Afghan National Security Forces (ANSF) to stop the Taliban from taking over the Afghan capital of Kabul in a few days and analyzes the often-forgotten dimension of strategic calculations in this dialogue—namely the societal dimension. In this article, the author argues that this is one of the primary reasons that the ANSF and the Afghan government collapsed.

Keywords: societal warfare, Afghanistan, NATO, Taliban, military strategy

Procedia PDF Downloads 74
3897 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 454
3896 Strategic Business Solutions for an Ageing SME

Authors: N. G. Teik Hiang, Fathyah Hashim

Abstract:

This is a case of how strategic management techniques can be used to help resolving problems faced by an ageing Small and Medium Enterprise (SME). Strategic way of resolving problems had been proven to be possible in this case despite general thought that strategic management is useful mostly for large corporations. Small and Medium Enterprises (SMEs) can also use strategic management in managing their business and determining their future cause of action and strategies in order to survive in this ever competent world. Strategic orientation is the key to survival and development of small and medium enterprises. In order to adapt to the fierce market competition, ageing SMEs should improve competitiveness and operational efficiency. They must therefore establish a sense of strategic management to improve the strategic management skills, combined with its own unique characteristics, and work out practical strategies to develop core competitiveness of enterprises in the fierce market competition in order to be sustainable. In this case, internal strengths and weaknesses of an SME had been identified. Strategic internal factors and external factors had been classified and further utilized to formulate potential strategies to encounter various problems faced by the SME. These strategies had been further match to take advantages of the opportunities and to overcome the weaknesses and minimize the threats it is facing. Tan, a consultant who was given the opportunity to formulate a plan for the business started with the environmental scanning (internal and external environmental analysis), assessing strengths and weaknesses for the company, strategies generation, analysis and evaluation. He had numerous discussions with the owner of the business and the senior management in order to match the key internal and external factors to formulate alternative strategies for solving the problems that the company facing. Some of the recommendations or solutions are generated from the inspiration of the owner of the business who is a very enterprising and experience businessman.

Keywords: strategic orientation, strategic management, SME, core competitiveness, sustainable

Procedia PDF Downloads 387
3895 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 547