Search results for: intellectual security immunization
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3321

Search results for: intellectual security immunization

3141 Intellectual Property Implications in the Context of Space Exploration with a Special Focus on ESA Rules and Regulations

Authors: Linda Ana Maria Ungureanu

Abstract:

This article details the manner in which European law establishes the protection and ownership rights over works created in off-world environments or in relation to space exploration. In this sense, the analysis is focused on identifying the legal treatment applicable to creative works based on the provisions regulated under the International Space Treaties, on one side, and the International IP Treaties and subsequent EU legislation, on the other side, with a special interest on ESA Rules and Regulations. Furthermore, the article analyses the manner in which ESA regulates the ownership regime applicable for creative works, taking into account the relationship existing between the inventor/creator and ESA and the environment in which the creative work was developed. Moreover, the article sets a series of de lege ferenda proposals for the regulation of intellectual property matters in the context of space exploration, the main purpose being to identify legal measures and steps that need to be taken in order to ensure that creative activities are fostered and understood as a significant catalyst for encouraging space exploration.

Keywords: intellectual property law, ESA guidelines, international IP treaties, EU legislation

Procedia PDF Downloads 154
3140 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 568
3139 Re-Imagining and De-Constructing the Global Security Architecture

Authors: Smita Singh

Abstract:

The paper develops a critical framework to the hegemonic discourses resorted to by the dominant powers in the global security architecture. Within this framework, security is viewed as a discourse through which identities and threats are represented and produced to legitimize the security concerns of few at the cost of others. International security have long been driven and dominated by power relations. Since the end of the Cold War, the global transformations have triggered contestations to the idea of security at both theoretical and practical level. These widening and deepening of the concept of security have challenged the existing power hierarchies at the theoretical level but not altered the substance and actors defining it. When discourses are introduced into security studies, several critical questions erupt: how has power shaped security policies of the globe through language? How does one understand the meanings and impact of those discourses? Who decides the agenda, rules, players and outliers of the security? Language as a symbolic system and form of power is fluid and not fixed. Over the years the dominant Western powers, led by the United States of America have employed various discursive practices such as humanitarian intervention, responsibility to protect, non proliferation, human rights, war on terror and so on to reorient the constitution of identities and interests and hence the policies that need to be adopted for its actualization. These power relations are illustrated in this paper through the narratives used in the nonproliferation regime. The hierarchical security dynamics is a manifestation of the global power relations driven by many factors including discourses.

Keywords: hegemonic discourse, global security, non-proliferation regime, power politics

Procedia PDF Downloads 292
3138 Considering Climate Change in Food Security: A Sociological Study Investigating the Modern Agricultural Practices and Food Security in Bangladesh

Authors: Hosen Tilat Mahal, Monir Hossain

Abstract:

Despite being a food-sufficient country after revolutionary changes in agricultural inputs, Bangladesh still has food insecurity and undernutrition. This study examines the association between agricultural practices (as social practices) and food security concentrating on the potential impact of sociodemographic factors and climate change. Using data from the 2012 Bangladesh Integrated Household Survey (BIHS), this study shows how modifiedagricultural practices are strongly associated with climate change and different sociodemographic factors (land ownership, religion, gender, education, and occupation) subsequently affect the status of food security in Bangladesh. We used linear and logistic regression models to analyze the association between modified agricultural practices and food security. The findings indicate that socioeconomic statuses are significant predictors of determining agricultural practices in a society like Bangladesh and control food security at the household level. Moreover, climate change is adversely impactingeven the modified agricultural and food security association version. We conclude that agricultural practices must consider climate change while boosting food security. Therefore, future research should integrate climate change into the agriculture and food-related mitigation and resiliency models.

Keywords: food security, agricultural productivity, climate change, bangladesh

Procedia PDF Downloads 85
3137 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 317
3136 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 134
3135 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 28
3134 The Research of Hand-Grip Strength for Adults with Intellectual Disability

Authors: Haiu-Lan Chin, Yu-Fen Hsiao, Hua-Ying Chuang, Wei Lee

Abstract:

An adult with intellectual disability generally has insufficient physical activity which is an important factor leading to premature weakness. Studies in recent years on frailty syndrome have accumulated substantial data about indicators of human aging, including unintentional weight loss, self-reported exhaustion, weakness, slow walking speed, and low physical activity. Of these indicators, hand-grip strength can be seen as a predictor of mortality, disability, complications, and increased length of hospital stay. Hand-grip strength in fact provides a comprehensive overview of one’s vitality. The research is about the investigation on hand-grip strength of adults with intellectual disabilities in facilities, institutions and workshops. The participants are 197 male adults (M=39.09±12.85 years old), and 114 female ones (M=35.80±8.2 years old) so far. The aim of the study is to figure out the performance of their hand-grip strength, and initiate the setting of training on hand-grip strength in their daily life which will decrease the weakening on their physical condition. Test items include weight, bone density, basal metabolic rate (BMR), static body balance except hand-grip strength. Hand-grip strength was measured by a hand dynamometer and classified as normal group ( ≧ 30 kg for male and ≧ 20 kg for female) and weak group ( < 30 kg for male, < 20 kg for female)The analysis includes descriptive statistics, and the indicators of grip strength fo the adults with intellectual disability. Though the research is still ongoing and the participants are increasing, the data indicates: (1) The correlation between hand-grip strength and degree of the intellectual disability (p ≦. 001), basal metabolic rate (p ≦ .001), and static body balance (p ≦ .01) as well. Nevertheless, there is no significant correlation between grip strength and basal metabolic rate which had been having significant correlation with hand-grip strength. (2) The difference between male and female subjects in hand-grip strength is significant, the hand-grip strength of male subjects (25.70±12.81 Kg) is much higher than female ones (16.30±8.89 Kg). Compared to the female counterparts, male participants indicate greater individual differences. And the proportion of weakness between male and female subjects is also different. (3) The regression indicates the main factors related to grip strength performance include degree of the intellectual disability, height, static body balance, training and weight sequentially. (4) There is significant difference on both hand-grip and static body balance between participants in facilities and workshops. The study supports the truth about the sex and gender differences in health. Nevertheless, the average hand-grip strength of left hand is higher than right hand in both male and female subjects. Moreover, 71.3% of male subjects and 64.2% of female subjects have better performance in their left hand-grip which is distinctive features especially in low degree of the intellectual disability.

Keywords: adult with intellectual disability, frailty syndrome, grip strength, physical condition

Procedia PDF Downloads 152
3133 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry

Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht

Abstract:

Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.

Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628

Procedia PDF Downloads 136
3132 The Sustainable Blue Economy Innovation and Growth: Data Based on China for 2006-2015 Years

Authors: Mingbao Chen

Abstract:

The blue economy is a new comprehensive marine economy integrated with resources, industries, and regions, and is an upgraded version of the marine economy. The blue economy attaches great importance to the coordinated development of the ecological environment and the economy, which is an emerging economic form advocated by all countries in the world. This paper constructs the model including four variables:natural capital, economic capital, intellectual capital, cultural capital. Theoretically, this paper deduces the function mechanism of variables on economic growth, and empirically calculates the driving force and influence of the blue economy on the national economy by using data of China's 2006-2015 year. The results show that natural capital and economic capital remain the main factors of blue growth in the blue economy. And with the development of economic society and technological progress, the role of intellectual capital and cultural capital is bigger and bigger. Therefore, promoting the development of marine science and technology and culture is the focus of the future blue economic development.

Keywords: blue growth, natural capital, intellectual capital, cultural capital

Procedia PDF Downloads 129
3131 A Review of Food Security Policy Research in Central Asia

Authors: Mergen Dyussenov

Abstract:

Food security has become a prominent issue on the global policy agenda. Yet, one particular region that remains understudied is a cohort of Central Asian countries. To shed light onto the issue, the paper looks into a review of existing literature related to food security policies in Central Asia. In so doing, it seeks to systematize the context analyzed, key findings, and recommendations. Furthermore, it analyzes the role of key actors in promoting the food security policies across Central Asian nations. Finally, the paper attempts to set the agenda for further research.

Keywords: food security, central Asia, the role of actors, policy analysis

Procedia PDF Downloads 290
3130 Enhancing Civil Aviation Safety and Security: A Comprehensive Approach

Authors: J. Waldon

Abstract:

The civil aviation industry plays a crucial role in global transportation, connecting people and goods across the world. Ensuring the safety and security of passengers, crew, and aircraft is of paramount importance. This paper aims to address the aspect of training and human factors, amongst others, necessary for enhancing civil aviation safety and security. In this context, we are focusing on the level of attention exhibited in the checking of luggage and travel credentials, with the aim to identify areas of improvement and avoid compromising security and safety at the Nsimalen Airport Yaoundé, Cameroon. We found that there is a lack of proper awareness among both travelers and some staff on the safety and security of goods and passengers. We suggest that improved training and handling, and sensitization in the form of legible billboards are important. Thus, we recommend refresher courses like this one for staff to keep abreast with the fast-changing security landscape in air transport as well as proper sensitization, including health-related issues. In conclusion, we established that the human factors, as well as the frequency of training and refresher courses, have a positive outlook on safety and security in air transport.

Keywords: safety, security, passengers, cargo

Procedia PDF Downloads 39
3129 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 63
3128 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems

Authors: Mirko Sailio

Abstract:

Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.

Keywords: border automation, cyber-security, threat actors, border cyber-security

Procedia PDF Downloads 173
3127 Protecting Privacy and Data Security in Online Business

Authors: Bilquis Ferdousi

Abstract:

With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.

Keywords: privacy, data security, legislation, online business

Procedia PDF Downloads 75
3126 The Difficulties Witnessed by People with Intellectual Disability in Transition to Work in Saudi Arabia

Authors: Adel S. Alanazi

Abstract:

The transition of a student with a disability from school to work is the most crucial phase while moving from the stage of adolescence into early adulthood. In this process, young individuals face various difficulties and challenges in order to accomplish the next venture of life successfully. In this respect, this paper aims to examine the challenges encountered by the individuals with intellectual disabilities in transition to work in Saudi Arabia. For this purpose, this study has undertaken a qualitative research-based methodology; wherein interpretivist philosophy has been followed along with inductive approach and exploratory research design. The data for the research has been gathered with the help of semi-structured interviews, whose findings are analysed with the help of thematic analysis. Semi-structured interviews were conducted with parents of persons with intellectual disabilities, officials, supervisors and specialists of two vocational rehabilitation centres providing training to intellectually disabled students, in addition to that, directors of companies and websites in hiring those individuals. The total number of respondents for the interview was 15. The purposive sampling method was used to select the respondents for the interview. This sampling method is a non-probability sampling method which draws respondents from a known population and allows flexibility and suitability in selecting the participants for the study. The findings gathered from the interview revealed that the lack of awareness among their parents regarding the rights of their children who are intellectually disabled; the lack of adequate communication and coordination between various entities; concerns regarding their training and subsequent employment are the key difficulties experienced by the individuals with intellectual disabilities. Training in programmes such as bookbinding, carpentry, computing, agriculture, electricity and telephone exchange operations were involved as key training programmes. The findings of this study also revealed that information technology and media were playing a significant role in smoothing the transition to employment of individuals with intellectual disabilities. Furthermore, religious and cultural attitudes have been identified to be restricted for people with such disabilities in seeking advantages from job opportunities. On the basis of these findings, it can be implied that the information gathered through this study will serve to be highly beneficial for Saudi Arabian schools/ rehabilitation centres for individuals with intellectual disability to facilitate them in overcoming the problems they encounter during the transition to work.

Keywords: intellectual disability, transition services, rehabilitation centre, employment

Procedia PDF Downloads 127
3125 Making a Resilient Livable City: Explorations of Smart Management Mechanism for Aging Society’s Disaster Prevention

Authors: Wei-Kuang Liu, Ya-Hsu Chiang

Abstract:

In the coming of an aging society, the issues of living quality, health care, and social security for the elderly have been gradually taken seriously. In order to maintain favorable living condition, urban societies are also facing the challenge of disasters caused by extreme climate change. However, in the practice of disaster prevention, elderly people are always weak due to their physiological conditions. That is to say, in the planning of resilient urbanism, the aging society is relatively in need of more care. Thus, this research aims to map areas where have high-density elderly population and fragile environmental condition in Taiwan, and to understand the actual situation of disaster prevention management in these areas, so as to provide suggestions for the development of intellectual resilient urban management. The research takes the cities of Taoyuan and Taichung as examples for explorations. According to GIS mapping of areas with high aging index, high-density population and high flooding potential, the communities of Sihai and Fuyuan in Taoyuan and the communities of Taichang and Nanshih in Taichung are highlighted. In these communities, it can be found that there are more elderly population and less labor population with high-density living condition. In addition, they are located in the areas where they have experienced severe flooding in the recent past. Based on a series of interviews with community organizations, there is only one community out of the four using flood information mobile app and Line messages for the management of disaster prevention, and the others still rely on the traditional approaches that manage the works of disaster prevention by their community security patrol teams and community volunteers. The interview outcome shows that most elderly people are not interested in learning the use of intellectual devices. Therefore, this research suggests to keep doing the GIS mapping of areas with high aging index, high-density population and high flooding potential for grasping the high-risk communities and to help develop smart monitor and forecast systems for disaster prevention practice in these areas. Based on case-study explorations, the research also advises that it is important to develop easy-to-use bottom-up and two-way immediate communication mechanism for the management of aging society’s disaster prevention.

Keywords: aging society, disaster prevention, GIS, resilient, Taiwan

Procedia PDF Downloads 98
3124 The Influence of an Occupation as a Calling on the Value of Job Security and Its Connection with Wage Levels

Authors: Malul Miki, Rafi Bar-El, Eithan Hourie

Abstract:

In this article, we test the influence of an occupation as a calling on the value of job security and its connection with wage levels. Our sample consists of 495 workers in Israel from 10 occupations in the public sector, who are assumed to have a relatively high level of job security, and the private sector, who are assumed to have less job security or none at all. These 10 occupations are social workers, lecturers, lawyers, administration workers, accountants, high school teachers, bank workers, high-tech worker, nurses and psychologists. Using regression analysis, we find that those who have occupations that the literature has defined as a calling value job security less than those in ordinary employment. In addition, salary level has no effect on this relationship. Finally, those who work in occupations that are regarded as a calling have less status quo bias than those in ordinary employment.

Keywords: calling, loss aversion, job security, status quo bias

Procedia PDF Downloads 78
3123 Examining the Impact of Intelligence Quotients on Balance and Coordination in Adolescents with Intellectual Disability

Authors: Bilge B. Calik, Ummuhan B. Aslan, Suat Erel, Sehmus Aslan

Abstract:

Objective: Intellectual disability (ID) is characterized by limitations in both intellectual functioning and adaptive behavior, which covers many everyday social and practical skills. The aim of this study was to evaluate the balance and coordination performance determined between mild and moderate ID adolescents who regularly play sport. Methods: The study comprised a total of 179 participants, of which 135 were male adolescents with mild and moderate-level ID who regularly play sports (16.52 ± 2.17 years) and 44 age-matched male adolescents with typical development without ID who do not do any sports (16.52 ± 0.99 years). The participants with ID were students of Special Education Schools for the mentally disabled and had been diagnosed with ID at a Ministry of Health Hospital. The adolescents with mild and moderate ID had been playing football in their school teams at least 2 days a week, for at least one year. Balance and coordination of adolescents were assessed by Bilateral coordination and balance subtests of Short Form Bruininks-Oseretsky Test of Motor Proficiency (BOT-2 SF). Results: As a result of the evaluations comparing coordination and balance scores significant differences were determined between all three groups in favor of the peers without ID (p<0.05). Conclusions: It was observed that balance and coordination levels of adolescents with mild ID were better than those of adolescents with moderate-level ID but lower than those of peers without ID. These results indicate a relationship between IQ level and motor performance. Further comparative studies are needed on individuals with ID who play and do not play sports in order to examine the impact of participation in sports on the motor skills of individuals with ID.

Keywords: balance, coordination, intellectual disability, motor skills, sport

Procedia PDF Downloads 304
3122 A Doctrinal Research and Review of Hashtag Trademarks

Authors: Hetvi Trivedi

Abstract:

Technological escalation cannot be negated. The same is true for the benefits of technology. However, such escalation has interfered with the traditional theories of protection under Intellectual Property Rights. Out of the many trends that have disrupted the old-school understanding of Intellectual Property Rights, one is hashtags. What began modestly in the year 2007 has now earned a remarkable status, and coupled with the unprecedented rise in social media the hashtag culture has witnessed a monstrous growth. A tiny symbol on the keypad of phones or computers is now a major trend which also serves companies as a critical investment measure in establishing their brand in the market. Due to this a section of the Intellectual Property Rights- Trademarks is undergoing a humungous transformation with hashtags like #icebucket, #tbt or #smilewithacoke, getting trademark protection. So, as the traditional theories of IP take on the modern trends, it is necessary to understand the change and challenge at a theoretical and proportional level and where need be, question the change. Traditionally, Intellectual Property Rights serves the societal need for intellectual productions that ensure its holistic development as well as cultural, economic, social and technological progress. In a two-pronged effort at ensuring continuity of creativity, IPRs recognize the investment of individual efforts that go into creation by way of offering protection. Commonly placed under two major theories- Utilitarian and Natural, IPRs aim to accord protection and recognition to an individual’s creation or invention which serve as an incentive for further creations or inventions, thus fully protecting the creative, inventive or commercial labour invested in the same. In return, the creator by lending the public the access to the creation reaps various benefits. This way Intellectual Property Rights form a ‘social contract’ between the author and society. IPRs are similarly attached to a social function, whereby individual rights must be weighed against competing rights and to the farthest limit possible, both sets of rights must be treated in a balanced manner. To put it differently, both the society and the creator must be put on an equal footing with neither party’s rights subservient to the other. A close look through doctrinal research, at the recent trend of trademark protection, makes the social function of IPRs seem to be moving far from the basic philosophy. Thus, where technology interferes with the philosophies of law, it is important to check and allow such growth only in moderation, for none is superior than the other. The human expansionist nature may need everything under the sky that can be tweaked slightly to be counted and protected as Intellectual Property- like a common parlance word transformed into a hashtag, however IP in order to survive on its philosophies needs to strike a balance. A unanimous global decision on the judicious use of IPR recognition and protection is the need of the hour.

Keywords: hashtag trademarks, intellectual property, social function, technology

Procedia PDF Downloads 101
3121 Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups

Authors: Erhan Turgut, Salih Ergün, Abdülkadir Öz

Abstract:

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed.

Keywords: terrorism, counter-terrorism, military status law-enforcement, terrorist groups

Procedia PDF Downloads 431
3120 Intelligent Recognition Tools for Industrial Automation

Authors: Amin Nazerzadeh, Afsaneh Nouri Houshyar , Azadeh Noori Hoshyar

Abstract:

With the rapid growing of information technology, the industry and manufacturing systems are becoming more automated. Therefore, achieving the highly accurate automatic systems with reliable security is becoming more critical. Biometrics that refers to identifying individual based on physiological or behavioral traits are unique identifiers provide high reliability and security in different industrial systems. As biometric cannot easily be transferred between individuals or copied, it has been receiving extensive attention. Due to the importance of security applications, this paper provides an overview on biometrics and discuss about background, types and applications of biometric as an effective tool for the industrial applications.

Keywords: Industial and manufacturing applications, intelligence and security, information technology, recognition; security technology; biometrics

Procedia PDF Downloads 126
3119 Housing Security System and Household Entrepreneurship: Evidence from China

Authors: Wangshi Yong, Wei Shi, Jing Zou, Qiang Li, Yilin Tian

Abstract:

With the advancement of the reform of China’s housing security system, the impact is becoming increasingly profound. This paper explores the relationship between the housing security system and household entrepreneurship on the 2017 China Household Finance Survey (CHFS) and conducts a large number of robustness checks, including PSM and IV estimation. The results show that the assistance of the housing security system will significantly promote family entrepreneurship, increasing the probability of entrepreneurship by 2%. Its internal mechanism is mainly achieved by relaxing liquidity constraints and increasing household social capital. However, the risk preference effect has not existed. Heterogeneity analysis shows that the positive impact of the housing security system on family entrepreneurship is mainly reflected in areas with high housing prices and incomes, as well as households with long-term security and social or commercial insurance. Meanwhile, it also verifies that the positive externalities of the housing security system will also positively affect active entrepreneurial motivation, entrepreneurial intensity, and entrepreneurial innovation.

Keywords: the housing security system, household entrepreneurship, social capital, liquidity constraints, risk preference

Procedia PDF Downloads 47
3118 A Proposal for Systematic Mapping Study of Software Security Testing, Verification and Validation

Authors: Adriano Bessa Albuquerque, Francisco Jose Barreto Nunes

Abstract:

Software vulnerabilities are increasing and not only impact services and processes availability as well as information confidentiality, integrity and privacy, but also cause changes that interfere in the development process. Security test could be a solution to reduce vulnerabilities. However, the variety of test techniques with the lack of real case studies of applying tests focusing on software development life cycle compromise its effective use. This paper offers an overview of how a Systematic Mapping Study (MS) about security verification, validation and test (VVT) was performed, besides presenting general results about this study.

Keywords: software test, software security verification validation and test, security test institutionalization, systematic mapping study

Procedia PDF Downloads 358
3117 Venezuela in the US Oil Geopolitics: An Analysis in the Light of the New Oil Landscape

Authors: William Clavijo, Edmar Almeida

Abstract:

The article analyzes the importance of Venezuela in the US geopolitics of oil considering the new oil landscape. To this end, the importance of oil in the geopolitics of the United States is discussed from the perspective of energy security as well as considering a broader view of national security. Based on this discussion, the relevance of Venezuelan oil reserves on US geopolitical agenda is analyzed. Among the results, the article shows that the transformations in the supply structure of the international oil market during the last decade have allowed the United States to achieve greater levels of independence from oil imports from other producing countries. This new reality has profoundly changed the US interest in Venezuelan oil to a broader subject that involves sensitive issues of its national security agenda.

Keywords: oil geopolitics, Venezuela, United States, energy security, national security

Procedia PDF Downloads 135
3116 Human Security through Human Rights in the Contemporary World

Authors: Shilpa Bagade Poharkar

Abstract:

The basis for traditional notion of security was the use of force to preserve vital interest which based on either realism or power politics. The modern approach to security extends beyond the traditional notions of security which focus on issues as development and respect for human rights. In global politics, the issue of human security plays a vital role in most of the policy matter. In modern era, the protection of human rights is now recognized as one of the main functions of any legitimate modern state. The research paper will explore the relationship between human rights and security. United Nations is facing major challenges like rampant poverty, refugee outflows, human trafficking, displacement, conflicts, terrorism, intra-inter ethnic conflicts, proliferation of small arms, genocide, piracy, climate change, health issues and so on. The methodology is observed in this paper is doctrinaire which includes analytical and descriptive comparative method. The hypothesis of the paper is the relationship between human rights and a goal of United Nations to attain peace and security. Although previous research has been done in this field but this research paper will try to find out the challenges in the human security through human rights in the contemporary world and will provide measures for it. The study will focus on the following research questions: What are the issues and challenges United Nations facing while advancing human security through human rights? What measures the international community would take for ensuring the protection of human rights while protecting state security and contribute in the attainment of goals of United Nations?

Keywords: human rights, human security, peace, security, United Nations

Procedia PDF Downloads 218
3115 Rethinking Confucianism and Democracy

Authors: He Li

Abstract:

Around the mid-1980s, Confucianism was reintroduced into China from Taiwan and Hong Kong as a result of China’s policies of reform and openness. Since then, the revival of neo-Confucianism in mainland China has accelerated and become a crucial component of the public intellectual sphere. The term xinrujia or xinruxue, loosely translated as “neo-Confucianism,” is increasingly understood as an intellectual and cultural phenomenon of the last four decades. The Confucian scholarship is in the process of restoration. This paper examines the Chinese intellectual discourse on Confucianism and democracy and places it in comparative and theoretical perspectives. With China’s rise and surge of populism in the West, particularly in the US, the leading political values of Confucianism could increasingly shape both China and the world at large. This state of affairs points to the need for more systematic efforts to assess the discourse on neo-Confucianism and its implications for China’s transformation. A number of scholars in the camp of neo-Confucianism maintain that some elements of Confucianism are not only compatible with democratic values and institutions but actually promote liberal democracy. They refer to it as Confucian democracy. By contrast, others either view Confucianism as a roadblock to democracy or envision that a convergence of democracy with Confucian values could result in a new hybrid system. The paper traces the complex interplay between Confucianism and democracy. It explores ideological differences between neo-Confucianism and liberal democracy and ascertains whether certain features of neo-Confucianism possess an affinity for the authoritarian political system. In addition to printed materials such as books and journal articles, a selection of articles from the website entitled Confucianism in China will be analyzed. The selection of this website is due to the fact that it is the leading website run by Chinese scholars focusing on neo-Confucianism. Another reason for selecting this website is its accessibility and availability. In the past few years, quite a few websites, left or right, were shut down by the authorities, but this website remains open. This paper explores the core components, dynamics, and implications of neo-Confucianism. My paper is divided into three parts. The first one discusses the origins of neo-Confucianism. The second section reviews the intellectual discourse among Chinese scholars on Confucian democracy. The third one explores the implications of the Chinese intellectual discourse on neo-Confucianism. Recently, liberal democracy has entered more conflict with official ideology. This paper, which is based on my extensive interviews in China prior to the pandemic and analysis of the primary sources in Chinese, will lay the foundation for a chapter on neo-Confucianism and democracy in my next book-length manuscript, tentatively entitled Chinese Intellectual Discourse on Democracy.

Keywords: China, confucius, confucianism, neo-confucianism, democracy

Procedia PDF Downloads 51
3114 Tempo-Spatial Pattern of Progress and Disparity in Child Health in Uttar Pradesh, India

Authors: Gudakesh Yadav

Abstract:

Uttar Pradesh is one of the poorest performing states of India in terms of child health. Using data from the three round of NFHS and two rounds of DLHS, this paper attempts to examine tempo-spatial change in child health and care practices in Uttar Pradesh and its regions. Rate-ratio, CI, multivariate, and decomposition analysis has been used for the study. Findings demonstrate that child health care practices have improved over the time in all regions of the state. However; western and southern region registered the lowest progress in child immunization. Nevertheless, there is no decline in prevalence of diarrhea and ARI over the period, and it remains critically high in the western and southern region. These regions also poorly performed in giving ORS, diarrhoea and ARI treatment. Public health services are least preferred for diarrhoea and ARI treatment. Results from decomposition analysis reveal that rural area, mother’s illiteracy and wealth contributed highest to the low utilization of the child health care practices consistently over the period of time. The study calls for targeted intervention for vulnerable children to accelerate child health care service utilization. Poor performing regions should be targeted and routinely monitored on poor child health indicators.

Keywords: Acute Respiratory Infection (ARI), decomposition, diarrhea, inequality, immunization

Procedia PDF Downloads 275
3113 Activities for Increasing Childhood Vaccination Coverage of the Refugee and Migrant Population, Greece, European Program PHILOS, 2017

Authors: C. Silvestros, K. Mellou, T. Georgakopoulou, A. Koustenis, E. Kokkinou, C. Botsi, A. Terzidis

Abstract:

'PHILOS – Emergency health response to refugee crisis' is a programme of the Greek Ministry of Health, implemented by the Hellenic Center for Disease Control and Prevention (HCDCP) funded by the Asylum, Migration and Integration Fund (AMIF) of EU’s DG Migration and Home Affairs. One of the main objectives of the program is the immunization coverage of the target – population to assure the prevention of vaccine-preventable diseases. The program foresees vaccination needs assessment of children hosted at camps at the mainland and implementation of interventions to cover the vaccination gaps in co-operation with the Ministry of Health. The National Immunization Advisory Committee in Greece recommended that MMR (Measles, Mumps, and Rubella), PCV (Pneumococcal conjugate vaccine) and HEXA (diphtheria, tetanus, pertussis, polio, hepatitis B and Haemophilus influenzae type b) vaccines should be performed in priority. Recording was completed at 24 camps (May - June 2017); 3381 children (0-18 years) were recorded. The median number of children hosted at each camp was 95 (range: 5-553). For 68% of the children, the WHO vaccination booklet was available. 44%, 48.5% and 61% of the children were vaccinated with at least one dose of PCV, HEXA, and MMR, respectively. The proportion of vaccinated children for the three vaccines mentioned above is significantly lower for the remaining doses; PCV (second dose 8%, third dose 1.3%), HEXA (second dose 13%, third dose 2.7%, forth dose 0.1%) and MMR (second dose 23%). None of the 37 (10 from Afghanistan, 3 from Bangladesh, 23 from Pakistan, 1 from Syria) recorded unaccompanied children did not have a WHO vaccination booklet and were considered unvaccinated. There is no differentiation in vaccination coverage among different ethnicities. Massive catch up vaccination was performed at 4 camps, and 671 vaccinations were performed (245 PCV, 307 HEXA, and 119 MMR). Similar interventions are planned for all camps of the country. Recording reveled gaps in vaccination coverage of the population, mainly because of the mobility of the population, the influx of refugees- which is still ongoing- and new births. Mass vaccination campaigns are considered vital in order to increase vaccination coverage, and continuous efforts are needed in order all children living at the camps to have full access to the National Childhood Immunization Program.

Keywords: vaccine preventable, refugee–migrants camps, vaccination coverage, PCV, MMR, HEXA

Procedia PDF Downloads 157
3112 A History of Knowledge Management: A Chronological Account from the 1970s to 2017

Authors: Alexslis N. Maindze

Abstract:

Knowledge management (KM) has become an imperative to modern business growth, competitive edge, and sustainability. Though there has been extensive research in the field, this literature overview showcases massive gaps that exist on the coverage of the field’s rich and fascinating history. Particularly, accounts of the history of KM are inconsistent and fragmentary in breadth and depth. This paper presents new insights into the history of KM from the early 70s when the actual coinage ‘knowledge management’ entered the literature. It reveals how knowledge over the years was shrouded in secrecy and subsumed by technology. It makes a clear distinction between the histories of the debate around knowledge and that of KM. The paper also finds a history of KM filled with skepticisms and engulfed by an ‘intellectual paradox’.

Keywords: knowledge management history, secrecy, skepticism, intellectual paradox

Procedia PDF Downloads 191