Search results for: global food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10117

Search results for: global food security

9877 Urban Agriculture in a Scandinavian Context as a Tool for Climate Adaption and for Empowering Communities through Food Production

Authors: Signe Voltelen, Kristin Astrup Aas

Abstract:

In the Scandinavian cities, there is a raised focus on the potential of using urban agriculture in city development, both as a tool for handling challenges provoked by climate change and to develop new, and stronger social communities. During the last couple of years, Copenhagen has experienced an increase in extreme weather resulting in dramatical floods with huge humanitarian and economic consequences. As an approach for climate adaption and mitigation the government has made a strategy for changing a significant amount of the cities hard surfaces into green and absorbing surfaces. Including urban farms and gardens. In close collaboration with the municipality, it has been possible to implement citizen-run gardens under the different concepts climate adaption and food literacy. Like other European cities, Copenhagen has a historical tradition of small-scale farming for food security inside the city, and in the outskirts of the urban area. Lately, this tradition has gotten new relevance, and new initiatives are popping up. In addition to providing local food, the urban farm becomes a semi-public, semi-private room that invites to community and integration across ethnicity, social background, and age. The direct interaction in the process of farming creates a connection between the urban and the rural and are educational for people growing up and living their whole life in the dense city. In the paper, three local example models of urban agriculture are presented, and the experiences of their potential as tools for developing social and environmental sustainable cities is examined.

Keywords: city development, climate mitigation, community building, urban agriculture, urban- rural transition, food security

Procedia PDF Downloads 256
9876 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 454
9875 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 533
9874 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 547
9873 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 395
9872 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 666
9871 Socio-Economic Influences on Soilless Agriculture

Authors: George Vernon Byrd, Bhim Bahadur Ghaley, Eri Hayashi

Abstract:

In urban farming, research and innovation are taking place at an unprecedented pace, and soilless growing technologies are emerging at different rates motivated by different objectives in various parts of the world. Local food production is ultimately a main objective everywhere, but adoption rates and expressions vary with socio-economic drivers. Herein, the status of hydroponics and aquaponics is summarized for four countries with diverse socio-economic settings: Europe (Denmark), Asia (Japan and Nepal) and North America (US). In Denmark, with a strong environmental ethic, soilless growing is increasing in urban agriculture because it is considered environmentally friendly. In Japan, soil-based farming is being replaced with commercial plant factories using advanced technology such as complete environmental control and computer monitoring. In Nepal, where rapid loss of agriculture land is occurring near cities, dozens of hydroponics and aquaponics systems have been built in the past decade, particularly in “non-traditional” sites such as roof tops to supplement family food. In the US, where there is also strong interest in locally grown fresh food, backyard and commercial systems have proliferated. Nevertheless, soilless growing is still in the research and development and early adopter stages, and the broad contribution of hydroponics and aquaponics to food security is yet to be fully determined. Nevertheless, current adoption of these technologies in diverse environments in different socio-economic settings highlights the potential contribution to food security with social and environmental benefits which contribute to several Sustainable Development Goals.

Keywords: aquaponics, hydroponics, soilless agriculture, urban agriculture

Procedia PDF Downloads 56
9870 The Impact of Legislation on Waste and Losses in the Food Processing Sector in the UK/EU

Authors: David Lloyd, David Owen, Martin Jardine

Abstract:

Introduction: European weight regulations with respect to food products require a full understanding of regulation guidelines to assure regulatory compliance. It is suggested that the complexity of regulation leads to practices which result to over filling of food packages by food processors. Purpose: To establish current practices by food processors and the financial, sustainable and societal impacts on the food supply chain of ineffective food production practices. Methods: An analysis of food packing controls with 10 companies of varying food categories and quantitative based research of a further 15 food processes on the confidence in weight control analysis of finished food packs within their organisation. Results: A process floor analysis of manufacturing operations focussing on 10 products found over fill of packages ranging from 4.8% to 20.2%. Standard deviation figures for all products showed a potential for reducing average weight of the pack whilst still retain the legal status of the product. In 20% of cases, an automatic weight analysis machine was in situ however weight packs were still significantly overweight. Collateral impacts noted included the effect of overfill on raw material purchase and added food miles often on a global basis with one raw material alone creating 10,000 extra food miles due to the poor weight control of the processing unit. A case study of a meat and bakery product will be discussed with the impact of poor controls resulting from complex legislation. The case studies will highlight extra energy costs in production and the impact of the extra weight on fuel usage. If successful a risk assessment model used primarily on food safety but adapted to identify waste /sustainability risks will be discussed within the presentation.

Keywords: legislation, overfill, profile, waste

Procedia PDF Downloads 376
9869 Assessment on the Level of Development of Macedonia and Iran Organic Agriculture as Compared to Nigeria: A Review

Authors: Y. A. Sani., A. A. Yakubu., A. A. Jamilu., J. Omeke, I. J. Sambo

Abstract:

With the rising global threat of food security, cancer, and related diseases (carcinogenic) because of increased usage of inorganic substances in agricultural food production, the Ministry of Food Agriculture and Livestock of the Republic of Turkey organized an International Workshop on Organic Agriculture between 8–12th December 2014 at the International Agricultural Research and Training Center, Izmir. About 21 countries, including Nigeria, were invited to attend the training workshop. Several topics on organic agriculture were presented by renowned scholars, ranging from regulation, certification, crop, animal, seed production, pest and disease management, soil composting, and marketing of organic agricultural products, among others. This paper purposely selected two countries (Macedonia and Iran) out of the 21 countries to assess their level of development in terms of organic agriculture as compared to Nigeria. Macedonia, with a population of only 2.1 million people as of 2014, started organic agriculture in 2005 with only 266ha of land and has grown significantly to over 5,000ha in 2010, covering such crops as cereals (62%), forage (20%) fruit orchard (7%), vineyards (5%), vegetables (4%), oil seed and industrial crops (1%) each. Others are organic beekeeping from 110 hives to over 15,000 certified colonies. As part of government commitment, the level of government subsidy for organic products was 30% compared to the direct support for conventional agricultural products. About 19 by-laws were introduced on organic agricultural production that was fully consistent with European Union regulations. The republic of Iran, on the other hand, embarked on organic agriculture for the fact, that the country recorded the highest rate of cancer disease in the world, with over 30,000 people dying every year and 297 people diagnosed every day. However, the host country, Turkey, is well advanced in organic agricultural production and now being the largest exporter of organic products to Europe and other parts of the globe. A technical trip to one of the villages that are under the government scheme on organic agriculture reveals that organic agriculture was based on market-demand-driven and the support of the government was very visible, linking the farmers with private companies that provide inputs to them while the companies purchase the products at harvest with a high premium price. However, in Nigeria, research on organic agriculture was very recent, and there was very scanty information on organic agriculture due to poor documentation and very low awareness, even among the elites. The paper, therefore, recommends that the government should provide funds to NARIs to conduct research on organic agriculture and to establish clear government policy and good pre-conditions for sustainable organic agricultural production in the country.

Keywords: organic agriculture, food security, food safety, food nutrition

Procedia PDF Downloads 33
9868 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations

Authors: Pratyush Vatsala, Sanjay Ahuja

Abstract:

The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.

Keywords: Kashmir, Mizoram, security, value, human right

Procedia PDF Downloads 245
9867 The Research of Weights Identify of Harbin Ecological Security Evaluation Index Based on AHP

Authors: Rong Guo, Mengshi Huang, Yujing Bai

Abstract:

With the rapid development of urbanization, the urban population increases and urban sprawl appeared. And these issues led to a sharp deterioration of the ecological environment. So, the urban ecological security evaluation was imminent. The weights identify of index was a key step of the research of ecological security evaluation. The AHP was widely used in the extensive research of weights identify of ecological security index. The characteristics of authority and quantitative can fully reflect the views of relevant experts. On the basis of building the ecological security evaluation index of Harbin, the paper combed and used the basic principle of the AHP, and calculated the weights of Harbin ecological security evaluation index through the process of the expert opinions “summary-feedback-summary”. And lay a foundation of future study of Harbin ecological security index, and guide the quantitative evaluation of Harbin ecological security.

Keywords: AHP, ecological security, evaluation Index, weights identify, harbin

Procedia PDF Downloads 466
9866 Agriroofs and Agriwalls: Applications of Food Production in Green Roofs and Green Walls

Authors: Eman M. Elmazek

Abstract:

Green roofs and walls are a rising technology in the global sustainable architectural industry. The idea takes great steps towards the future of sustainable design due to its many benefits. However, there are many barriers and constraints. Economical, structural, and knowledge barriers prevent the spread of the usage of green roofs and living walls. Understanding the benefits and expanding them will spread the idea. Benefits provided by these green spots interrupt and maintain the current urban cover. Food production is one of the benefits of green roofs. It can save money and energy spent in food transportation. The goal of this paper is to put a better understanding of implementing green systems. The paper aims to identify gains versus challenges facing the technology. It surveys with case studies buildings with green roofs and walls used for food production.

Keywords: green roof, green walls, urban farming, roof herb garden

Procedia PDF Downloads 489
9865 Integration of FMEA and Human Factor in the Food Chain Risk Assessment

Authors: Mohsen Shirani, Micaela Demichela

Abstract:

During the last decades, a number of food crises such as Bovine Spongiform Encephalopathy (BSE), Mad-Cow disease, Dioxin in chicken food, Food-and-Mouth Disease (FMD), have certainly inflicted the reliability of the food industry. Consequently, the trend in applying different scientific methods of risk assessment in food safety has obtained more attentions in the academic and practice. However, lack of practical approach considering entire food supply chain is tangible in the academic literature. In this regard, this paper aims to apply risk assessment tool (FMEA) with integration of Human Factor along the entire supply chain of food production and test the method in a case study of Diary production, and analyze its results.

Keywords: FMEA, food supply chain, risk assessment, human factor

Procedia PDF Downloads 403
9864 Learning from TikTok Food Pranks to Promote Food Saving Among Adolescents

Authors: Xuan (Iris) Li, Jenny Zhengye Hou, Greg Hearn

Abstract:

Food waste is a global issue, with an estimated 30% to 50% of food created never being consumed. Therefore, it is vital to reduce food waste and convert wasted food into recyclable outputs. TikTok provides a simple way of creating and duetting videos in just a few steps by using templates with the same sound/vision/caption effects to produce personalized content – this is called a duet, which is revealing to study the impact of TikTok on wasting more food or saving food. The research focuses on examining food-related content on TikTok, with particular attention paid to two distinct themes, food waste pranks and food-saving practices, to understand the potential impacts of these themes on adolescents and their attitudes toward sustainable food consumption practices. Specifically, the analysis explores how TikTok content related to food waste and/or food saving may contribute to the normalization and promotion of either positive or negative food behaviours among young viewers. The research employed content analysis and semi-structured interviews to understand what factors contribute to the difference in popularity between food pranks and food-saving videos and insights from the former can be applied to the latter to increase their communication effectiveness. The first category of food content on TikTok under examination pertains to food waste, including videos featuring pranks and mukbang. These forms of content have the potential to normalize or even encourage food waste behaviours among adolescents, exacerbating the already significant food waste problem. The second category of TikTok food content under examination relates to food saving, for example, videos teaching viewers how to maximize the use of food to reduce waste. This type of content can potentially empower adolescents to act against food waste and foster positive and sustainable food practices in their communities. The initial findings of the study suggest that TikTok content related to pranks appears to be more popular among viewers than content focused on teaching people how to save food. Additionally, these types of videos are gaining fans at a faster rate than content promoting more sustainable food practices. However, we argue there is a great potential for social media platforms like TikTok to play an educative role in promoting positive behaviour change among young people by sharing engaging content suitable to target audiences. This research serves as the first to investigate the potential utility of TikTok in food waste reduction and underscores the important role social media platforms can play in promoting sustainable food practices. The findings will help governments, organizations, and communities promote tailored and effective interventions to reduce food waste and help achieve the United Nations’ sustainable development goal of halving food waste by 2030.

Keywords: food waste reduction, behaviour, social media, TikTok, adolescents

Procedia PDF Downloads 44
9863 Unveiling the Potential of Hydroponics as a Climate-Smart Technology for Small-Scale Farming and Food Security in Africa

Authors: Margaret S. Gumisiriza, Ernest. R. Mbega, Patrick Ndakidemi, Businge K. Edward

Abstract:

The purpose of the paper was to assess existing literature regarding hydroponics in both the developing and developed countries. Furthermore, relate it to the context of African countries, how they can implement it and benefit from it in the face of climate change, high population growth rates, and reduced food production. Agriculture remains the major economic activity for a number of African countries. It is the source of income for most peasants, and still contributes to the Gross Domestic Product in most of these African countries. Unfortunately, climate change coupled with the increasing rates of population growth; rural-urban migration; and urbanization have led to food insecurity due to a reduction of available land for agriculture. This has further intensified the food security dilemma in Africa, especially in urban areas, where land is already limited. Considering the aforementioned state of affairs, there is an increasing demand for interventions that can help farmers in Africa to cope with climate change and increase food production. This review explores hydroponic farming and how it can be used as a climate-smart farming system in Africa’s rural and urban areas. Specifically, the review focuses on hydroponics, requirements for hydroponic farming and the state of hydroponic farming in LDCs and Developed countries (DCs). From the review, it was observed that African countries especially those that receive a lot of sunlight would highly benefit from the solar-powered hydroponic farming systems. Further, still, this farming system will help African countries cope with the challenges of high population pressure in urban areas and climate change as it qualifies to be an urban farming system.

Keywords: Africa, climate-smart agriculture, solar-powered-hydroponics, urban-farming

Procedia PDF Downloads 241
9862 Land-Use Transitions and Its Implications on Food Production Systems in Rural Landscape of Southwestern Ghana

Authors: Evelyn Asante Yeboah, Kwabena O. Asubonteng, Justice Camillus Mensah, Christine Furst

Abstract:

Smallholder-dominated mosaic landscapes in rural Africa are relevant for food production, biodiversity conservation, and climate regulation. Land-use transitions threaten the multifunctionality of such landscapes, especially the production capacity of arable lands resulting in food security challenges. Using land-cover maps derived from maximum likelihood classification of Landsat satellite images for the years 2002, 2015, and 2020, post-classification change detection, landscape metrics, and key informant interviews, the study assessed the implications of rubber plantation expansion and oil business development on the food production capacity of Ahanta West District, Ghana. The analysis reveals that settlement and rubber areas expanded by 5.82% and 10.33% of the landscape area, respectively, between 2002 and 2020. This increase translates into over twice their initial sizes (144% in settlement change and 101% in rubber change). Rubber plantation spread dominates the north and southwestern areas, whereas settlement is widespread in the eastern parts of the landscape. Rubber and settlement expanded at the expense of cropland, palm, and shrublands. Land-use transitions between cropland, palm, and shrubland were targeting each other, but the net loss in shrubland was higher (-17.27%). Isolation, subdivision, connectedness, and patch adjacency indices showed patch consolidation in the landscape configuration from 2002 to 2015 and patch fragmentation from 2015 to 2020. The study also found patches with consistent increasing connectivity in settlement areas indicating the influence of oil discovery developments and fragmentation tendencies in rubber, shrubland, cropland, and palm, indicating springing up of smaller rubber farms, the disappearance of shrubland, and splitting up of cropland and palm areas respectively. The results revealed a trend in land-use transitions in favor of smallholder rubber plantation expansion and oil discovery developments, which suggest serious implications on food production systems and poses a risk for food security and landscape multifunctional characteristics. To ensure sustainability in land uses, this paper recommends the enforcement of legislative instruments governing spatial planning and land use in Ghana as embedded in the 2016 land-use and spatial planning act.

Keywords: food production systems, food security, Ghana’s west coast, land-use transitions, multifunctional rural landscapes

Procedia PDF Downloads 118
9861 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 487
9860 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 392
9859 Evaluation of Scenedesmus obliquus Carotenoids as Food Colorants, and Antioxidant Activity in Functional Cakes

Authors: Hanaa H. Abd El Baky, Gamal S. El Baroty, Eman A. Ibrahem

Abstract:

Microalgae Scenedesmus obliquus, the carotenoides (astaxanine and β-caroteine) were identified as the major bioactive constituents. In this work we prepared functional pre-biotic cakes to increase general mental health. Functional cakes were formulated by adding algal caroteinods at 2 and 4 mg/100g to flower and the cakes were storage for 20 days. Oxidative stability of both function cakes products were examined during storage periods by DPPH and TBA assays, and the results revealed that both values in function food products were significantly much low than that in untreated food products. Data of sensory evaluation revealed that treated biscuit and cakes with algae or algae extracts were significantly acceptable as control for main sensory characteristics (colour, odour/aroma, flavour, texture, the global appreciation, and overall acceptability). Thus, it could be concluded that functional biscuits and cakes (very popular and well balanced nutritional food) had good sensory and nutritional profiles and can be developed as new niche food market.

Keywords: Scenedesmus obliquus, carotenoids, functional cakes antioxidant, nutritional profiles

Procedia PDF Downloads 252
9858 Innovative Food Production and Food Consumption Entrepreneurship: a Recipe for Delivering Global Sustainable Goals in South Africa

Authors: Faith Samkange, Juliet Chipumuro, Henry Wanyama

Abstract:

Business development and entrepreneurship constitute a major part of economic and human development for many countries within the Southern Africa Development Communities (SADC). While a marked increase in entrepreneurship activity has been registered, more than 70% of these business enterprises are still failing particularly in their conceptual years. One of the major reasons for this failure is that project process trends have tended to be fragmented and linear in approach while focusing primarily on isolated articulation of development aspects such as marketing, operations, accounting and human resources management with limited integration. Given the complexity of environmental, economic and human development issues in the SADC region, a multi-disciplinary, transformative, systematic and coordinated approach towards entrepreneurship development may be a more useful approach. This paper develops a proposed conceptual framework for an innovative and sustainable food production and food consumption Agritech entrepreneurship project in the Eastern Cape Province of South Africa based on a systematic review of existing literature. A thematic analysis of the literature reviewed is applied to develop this theoretical contribution to knowledge. The conceptual framework will be tested in a research driven intervention project designed to improve the quality of life for marginalized indigenous African communities by addressing poverty alleviation, unemployment and gender inequality as stipulated in the global sustainable development goals by the United Nations in 2018.

Keywords: innovative entrepreneurship, sustainability, food production and consumption, marginalised communities, poverty alleviation

Procedia PDF Downloads 100
9857 Promoting Biofuels in India: Assessing Land Use Shifts Using Econometric Acreage Response Models

Authors: Y. Bhatt, N. Ghosh, N. Tiwari

Abstract:

Acreage response function are modeled taking account of expected harvest prices, weather related variables and other non-price variables allowing for partial adjustment possibility. At the outset, based on the literature on price expectation formation, we explored suitable formulations for estimating the farmer’s expected prices. Assuming that farmers form expectations rationally, the prices of food and biofuel crops are modeled using time-series methods for possible ARCH/GARCH effects to account for volatility. The prices projected on the basis of the models are then inserted to proxy for the expected prices in the acreage response functions. Food crop acreages in different growing states are found sensitive to their prices relative to those of one or more of the biofuel crops considered. The required percentage improvement in food crop yields is worked to offset the acreage loss.

Keywords: acreage response function, biofuel, food security, sustainable development

Procedia PDF Downloads 274
9856 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 90
9855 Soil Nutrient Management Implications of Growing Food Crops within the Coffee Gardens

Authors: Pennuel P. Togonave, Bartholomew S. Apis, Emma Kiup, Gure Tumae, Johannes Pakatul, Michael Webb

Abstract:

Interplanting food crops in coffee gardens has increased in recent years. The purpose of this study was to quantify the nutrient management implications of growing food crops within the coffee garden and to investigate the sustainability of this practice through field surveys in two accessible sites (Asaro and Bena) and two remote sites (Marawaka and Baira), in Eastern Highlands Province of Papua New Guinea. Coffee gardens were selected at each site and surveys were conducted to assess the status of intercropping in each of the smallholder coffee gardens. Food crops in the coffee gardens were sampled for nutrient analysis Survey results indicate intercropping as a common practice in coffee gardens and entailed mixed cropping of food crops in an irregular pattern and spacing. More than 40% of the farmers used 40-60% of their total coffee garden area for intercropping. In remote sites, more than 50% of the coffee garden areas closest to the house were intercropped with food crops compared to 40% of inaccessible sites. In both remote and accessible sites, the most common intercropped food crops were 90% banana (Musa spp) varieties and 50% sugarcane (Saccharum spp). Nutrient analysis of the by-products and residuals of some common intercrops shows the potential to replenish the coffee plant's deficient nutrients like Potassium, Magnesium, Phosphorus, Boron and Zinc. Intercropping of coffee gardens is increasing due to land pressure, marketing opportunities, food security and labor supply

Keywords: by-products, coffee, crops, intercropping, nutrients, soil

Procedia PDF Downloads 49
9854 Nuclear Materials and Nuclear Security in India: A Brief Overview

Authors: Debalina Ghoshal

Abstract:

Nuclear security is the ‘prevention and detection of, and response to unauthorised removal, sabotage, unauthorised access, illegal transfer or other malicious acts involving nuclear or radiological material or their associated facilities.’ Ever since the end of Cold War, nuclear materials security has remained a concern for global security. However, with the increase in terrorist attacks not just in India especially, security of nuclear materials remains a priority. Therefore, India has made continued efforts to tighten its security on nuclear materials to prevent nuclear theft and radiological terrorism. Nuclear security is different from nuclear safety. Physical security is also a serious concern and India had been careful of the physical security of its nuclear materials. This is more so important since India is expanding its nuclear power capability to generate electricity for economic development. As India targets 60,000 MW of electricity production by 2030, it has a range of reactors to help it achieve its goal. These include indigenous Pressurised Heavy Water Reactors, now standardized at 700 MW per reactor Light Water Reactors, and the indigenous Fast Breeder Reactors that can generate more fuel for the future and enable the country to utilise its abundant thorium resource. Nuclear materials security can be enhanced through two important ways. One is through proliferation resistant technologies and diplomatic efforts to take non proliferation initiatives. The other is by developing technical means to prevent any leakage in nuclear materials in the hands of asymmetric organisations. New Delhi has already implemented IAEA Safeguards on their civilian nuclear installations. Moreover, the IAEA Additional Protocol has also been ratified by India in order to enhance its transparency of nuclear material and strengthen nuclear security. India is a party to the IAEA Conventions on Nuclear Safety and Security, and in particular the 1980 Convention on the Physical Protection of Nuclear Material and its amendment in 2005, Code of Conduct in Safety and Security of Radioactive Sources, 2006 which enables the country to provide for the highest international standards on nuclear and radiological safety and security. India's nuclear security approach is driven by five key components: Governance, Nuclear Security Practice and Culture, Institutions, Technology and International Cooperation. However, there is still scope for further improvements to strengthen nuclear materials and nuclear security. The NTI Report, ‘India’s improvement reflects its first contribution to the IAEA Nuclear Security Fund etc. in the future, India’s nuclear materials security conditions could be further improved by strengthening its laws and regulations for security and control of materials, particularly for control and accounting of materials, mitigating the insider threat, and for the physical security of materials during transport. India’s nuclear materials security conditions also remain adversely affected due to its continued increase in its quantities of nuclear material, and high levels of corruption among public officials.’ This paper would study briefly the progress made by India in nuclear and nuclear material security and the step ahead for India to further strengthen this.

Keywords: India, nuclear security, nuclear materials, non proliferation

Procedia PDF Downloads 320
9853 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 502
9852 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 329
9851 Advancing Energy Security Through Regional Cooperation in Southern Africa: An Assessment of the Challenges and Opportunities

Authors: Loide Sambo

Abstract:

Achieving energy security has, in the past few decades, become one of the main goals in the security agenda of every country around the world. For Southern African Countries (SAC) the aim is not different, yet these countries face a particular challenge in the pursuit of their energy security. More than just secure enough energy sources to fuel their industrial and societal needs, SAC have as well to ensure that they trade their rich energy resources to the global market in a way that promotes and safeguards their economic development objectives. Considering the relevance of this issue to the SAC, the present paper explores the possibility of these countries to achieve energy security through regional cooperation, under the Southern Africa Development Community (SADC) platform. It discusses the challenges and opportunities for advancing energy security in this region through cooperation. After analyzing the data through the documentary analysis method, it was found that regional cooperation among SAC to improve energy security is not effective since cooperation in the region is still very susceptible to a plethora of challenges, such as political instability, lack of development of infrastructure and expertise, lack of good governance, lack of sense of cohesiveness, and most important lack of political commitment. It was also found that significant commitment on regional cooperation had been centered on the electricity sub-sector due to the region’s huge electricity deficit. Thus less commitment is dedicated to the development and policy harmonization of the other sub-sectors such as the one of natural gas and oil, for instance. Hence, it is recommended that the leadership of the SAC is fully committed to cooperate and harmonize the policies, the strategic plans, as well as the infrastructure concerning to all the natural energy resources and its respective sub-sectors. This would provide the SAC significant leverage to negotiate for the energy market access, ensuring that the region’s energy commodities are traded, while the countries themselves retain enough energy to sustain their economic growth and development, improving, therefore, their energy security.

Keywords: regional cooperation, energy security, economic development, political commitment

Procedia PDF Downloads 229
9850 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 517
9849 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 404
9848 Contribution of Home Gardens to Rural Household Income in Raymond Mhlaba Local Municipality, Eastern Cape Province, South Africa

Authors: K. Alaka, A. Obi

Abstract:

Home garden has proved to be significant to rural inhabitants by providing a wide range of useful products such as fruits, vegetables and medicine. There is need for quantitative information on its benefits and contributions to rural household. The main objective of this study is to investigate contributions of home garden to income of rural households in Raymond Mhlaba Local Municipality, formerly Nkonkobe Local Municipality of Eastern Cape Province South Africa. The stratified random sampling method was applied in order to choose a sample of 160 households.The study was conducted among 80 households engaging in home gardens and 80 non- participating households in the study area. Data analysis employed descriptive statistics with the use of frequency table and one way sample T test to show actual contributions. The overall model shows that social grant has the highest contribution to total household income for both categories while income generated from home garden has the second largest share to total household income, this shows that the majority of rural households in the study area rely on social grant as their source of income. However, since most households are net food buyers, it is essential to have policies that are formulated with an understanding that household food security is not only a function of the food that farming households produce for their own consumption but more so a function of total household income. The results produced sufficient evidence that home gardens contribute significantly to income of rural household.

Keywords: food security, home gardening, household, income

Procedia PDF Downloads 195