Search results for: liberty security and justice area
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11583

Search results for: liberty security and justice area

11463 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 452
11462 Perceived Organizational Justice, Trust and Employee Engagement in Bank Managers

Authors: Seemal Mazhar Khan, Tahira Mubashar

Abstract:

The present research aimed to investigate the relationship in perceived organizational justice, organizational trust and employee engagement in bank employees. It was hypothesized: there is likely to be a relationship in perceived organizational justices, organizational trust and employee engagement; perceived organizational justice and organizational trust are likely to predict employee engagement; there is likely to be effect of bank type and designation on perceived organizational justice, organizational trust and employee engagement. The sample consisted of 150 bank employees (50 from government, 50 from private and 50 from privatized banks) selected from different banks in Lahore, Pakistan. Correlational research design was used to conduct this study. Perceived Organizational Justices Questionnaire, Organizational Trust Questionnaire and Employee Engagement Scale were used for assessment. Pearson product moment correlation, hierarchical regression and multivariate analysis of covariance were applied. Results showed a positive significant relationship in perceived organizational justice and organizational engagement and there were also a positive significant relation between organizational trust and job and organizational engagement. Results showed that organizational trust predicts organizational engagement after controlling the effect of age, marital status and socio-economic status and there is a significant interaction effect of bank type and designation level on organizational trust in bank employees. The findings of the research can serve as a platform for the awareness of important antecedents of employee engagement and organizations can inculcate trust for better and improved engagement of its employees, thereby, enhancing the productivity of their employees.

Keywords: bank employees, organizational engagement, perceived organizational justice, trust

Procedia PDF Downloads 363
11461 Justice and the Juvenile: Changing Trends and Developments

Authors: Shikhar Shrivastava, Varun Khare

Abstract:

Background: We are confronted by a society that is becoming more complex, more mobile, and more dysfunctional. Teen pregnancy, suicide, elopement, and the perusal of dangerous drugs have become commonplace. In addition, children do not settle their disputes as they once did. Guns and knives are quotidian. Therefore, it has been an exigent to have a "Juvenile Code" that would provide specific substantive and procedural rules for juveniles in the justice system. However, until the twentieth century, there was little difference between how the justice system treated adults and children. Age was considered only in terms of appropriate punishment and juveniles were eligible for the same punishment as adults. Findings: The increased prevalence and legislative support for specialized courts, Juvenile Justice Boards, including juvenile drug, mental health and truancy court programs, as well as diversion programs and evidence-based approaches into the fabric of juvenile justice are just a few examples of recent advances. In India, various measures were taken to prosecute young offenders who committed violent crimes as adults. But it was argued that equating juveniles with adult criminals was neither scientifically correct nor normatively defensible. It would defeat the very purpose of the justice system. Methodology and Conclusion: This paper attempts to bring forth the results of analytical and descriptive research that examined changing trends in juvenile justice legislation. It covers the investigative and inspective practices of police, the various administrative agencies who have roles in implementing the legislation, the courts, and the detention centers. In this paper we shall discuss about how the juvenile justice system is the dumping ground for many of a youths’ problem. The changing notions of justice, from retributive to restorative and rehabilitative shall be discussed. A comparative study of the Juvenile act in India and that of the U.S has been discussed. Specific social institutions and forces that explain juvenile delinquency are identified. In addition, various influences on juvenile delinquency are noted, such as families, schools, peer groups and communities. The text concludes by addressing socialization, deterrence, imprisonments, alternatives, restitution and preventions.

Keywords: juvenile, justice system, retributive, rehabilitative, delinquency

Procedia PDF Downloads 432
11460 Food Security of Migrants in a Regional Area of Australia: A Qualitative Study

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Rosa McManamey

Abstract:

Food security indicates the ability of individuals, households and communities to acquire food that is healthy, sustainable, affordable, appropriate and accessible. Despite Australia’s current ability to produce enough food to feed a population larger than its current population, there has been substantial evidence over the last decades to demonstrate many Australians struggle to feed themselves, including those from a cultural and linguistically diverse (CALD) background. The study aimed to investigate migrants’ perceptions and experiences on food security in Tasmania. Semi-structured interviews were conducted with 33 migrants residing in North, South and North West Tasmania, who were recruited through purposive sampling. Thematic analysis was employed to analyse the interview data. Four main themes were identified from the interview data: (1) Understanding of food security; (2) Experiences with the food security in Tasmania; (3) Factors that influence migrants’ food security in Tasmania; and (4) Acculturation strategies. Various sub-themes have emerged under each of these four major themes. Though the findings indicate participants are satisfied with their current food security in Tasmania, they still encounter some challenges in food availability, accessibility, and affordability in Tasmania. Factors that influence migrants’ food security were educational background, language barrier, socioeconomic status, geographical isolation, and cultural background. By using different acculturation strategies, migrants managed to adapt to the new food culture. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. The findings indicate migrants residing in Tasmania face different challenges on food security. They use different strategies for food security while acculturating into a new environment. The findings may provide useful information for migrants in Australia and various private organisations or relevant government departments that address food security for migrants.

Keywords: experiences, food security, migrants, perceptions

Procedia PDF Downloads 393
11459 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 629
11458 Assessment of Households' Food Security and Hunger Level across Communities in Ile-Ife, Southwestern Nigeria

Authors: Adebayo-Victoria Tobi Dada, Dada Emmanuel

Abstract:

This study assessed households’ food security and hunger levels among different communities with varying educational and economic background in Ile-Ife, Nigeria, and its environment. It also examined the impacts of varying demography on the household food security level in the area. This was with a view to providing information on the food security status of the subjects within the study area. Ten different communities with varying demography (Parakin, Mokuro, Ilare, Obafemi Awolowo University (OAU) Staff Quarters, Ibadan Road, Aba-Iya Gani, Eleweran, Iraye, Boosa, and Eku-Isobo) were identified within the study area. Fieldwork was then carried out from 7th to 14th of March, 2016 in each of these communities through survey of market prices of food stuff, diet, and nutrition, social well-being, food accessibility and affordability as well as price fluctuation and variation in household’s social background. Selection of households for the survey was done using stratified random sampling method. Key informants included community heads, landlords, tenants, and household heads. Similarly, information on food security levels with respect to demographic backgrounds was obtained from the use of modified Food and Hunger Insecurity Module (FHIM) structured questionnaire. The questionnaire was administered to one percent of the households’ population per community. The results showed that communities such as Parakin and OAU Senior Staff Quarters were dominated by civil servants, while community such as Boosa was dominated by artisans. Respondents earning between ₦11,000 and ₦20,000 per month, during the study period, had the highest percentage across the selected communities. The household food security indices showed that about 41% of the investigated respondents could not guarantee their household food for a month, while 18% reduced or skipped meals. There were positive significant relationships between monthly income (F-value = 132.04), educational status (F-value = 102.30), occupation (F-value = 104.05) and food budget (F-value = 122.09), all at p < 0.05. However, there was no significant relationship between the monthly food budget and household sizes (t-value = -1.4074, p > 0.05). Food secured households’ had the household heads with a higher level of educational attainment. The study concluded that large variations which existed between socio-economic and educational background among the communities had significant effects on households’ food security level in the study area.

Keywords: food security, households, hunger level, market prices

Procedia PDF Downloads 177
11457 Enactments of Global Citizenship Education: Social Justice in Public Spheres of Education

Authors: Sabrina Jafralie

Abstract:

This proposed chapter explains how civic religious literacy is a means to promote social justice in Canada. It will first present the specific conception of global citizenship education that will undergird the discussion in the chapter. Then, it will offer a conception of civic religious literacy that explains how it promotes social justice as a form of global citizenship education. To illustrate this point, I will list specific examples of social and political inequities in Canada, such as hate crime statistics from 2013-2018 across the country and in specific provinces and cities. I will also highlight different types of discrimination, such as that towards religious minorities, Indigenous peoples, and those that conflate race and religion, and other intersections of identity that civic religious literacy can address. To conclude this initial section of the chapter, I will cite international studies that discuss religious literacy as a means to promote characteristics and aims of global citizenship education.

Keywords: Civic Literacy, Pedagogy, Quebec, Social Justice

Procedia PDF Downloads 128
11456 Impact of Contemporary Performance Measurement System and Organization Justice on Academic Staff Work Performance

Authors: Amizawati Mohd Amir, Ruhanita Maelah, Zaidi Mohd Noor

Abstract:

As part of the Malaysia Higher Institutions' Strategic Plan in promoting high-quality research and education, the Ministry of Higher Education has introduced various instrument to assess the universities performance. The aims are that university will produce more commercially-oriented research and continue to contribute in producing professional workforce for domestic and foreign needs. Yet the spirit of the success lies in the commitment of university particularly the academic staff to translate the vision into reality. For that reason, the element of fairness and justice in assessing individual academic staff performance is crucial to promote directly linked between university and individual work goals. Focusing on public research universities (RUs) in Malaysia, this study observes at the issue through the practice of university contemporary performance measurement system. Accordingly management control theory has conceptualized that contemporary performance measurement consisting of three dimension namely strategic, comprehensive and dynamic building upon equity theory, the relationships between contemporary performance measurement system and organizational justice and in turn the effect on academic staff work performance are tested based on online survey data administered on 365 academic staff from public RUs, which were analyzed using statistics analysis SPSS and Equation Structure Modeling. The findings validated the presence of strategic, comprehensive and dynamic in the contemporary performance measurement system. The empirical evidence also indicated that contemporary performance measure and procedural justice are significantly associated with work performance but not for distributive justice. Furthermore, procedural justice does mediate the relationship between contemporary performance measurement and academic staff work performance. Evidently, this study provides evidence on the importance of perceptions of justice towards influencing academic staff work performance. This finding may be a fruitful input in the setting up academic staff performance assessment policy.

Keywords: comprehensive, dynamic, distributive justice, contemporary performance measurement system, strategic, procedure justice, work performance

Procedia PDF Downloads 378
11455 Theorising Chinese as a Foreign Language Curriculum Justice in the Australian School Context

Authors: Wen Xu

Abstract:

The expansion of Confucius institutes and Chinese as a Foreign Language (CFL) education is often considered as cultural invasion and part of much bigger, if not ambitious, Chinese central government agenda among Western public opinion. The CFL knowledge and teaching practice inherent in textbooks are also harshly critiqued as failing to align with Western educational principles. This paper takes up these concerns and attempts to articulate that Confucius’s idea of ‘education without discrimination’ appears to have become synonymous with social justice touted in contemporary Australian education and policy discourses. To do so, it capitalises on Bernstein's conceptualization of classification and pedagogic rights to articulate CFL curriculum's potential of drawing in and drawing out curriculum boundaries to achieve educational justice. In this way, the potential useful knowledge of CFL constitutes a worthwhile tool to engage in a peripheral Western country’s education issues, as well as to include disenfranchised students in the multicultural Australian society. It opens spaces for critically theorising CFL curricular justice in Australian educational contexts, and makes an original contribution to scholarly argumentation that CFL curriculum has the potential of including socially and economically disenfranchised students in schooling.

Keywords: curriculum justice, Chinese as a Foreign Language curriculum, Bernstein, equity

Procedia PDF Downloads 113
11454 Using the Family Justice System to Respond to ISIS Returnees: The UK Experience

Authors: Fatima Ahdash

Abstract:

Over the last 6-7 years, the UK has resorted to using the family courts and the family justice system more generally as a way of dealing with children and young people either traveling to or returning from ISIS territories in the Middle East. This is an important innovation in counter-terrorism laws and practices in the UK: never before have the family courts been used for the purpose of preventing and countering terrorism anywhere in the world. This paper will examine this innovation; it will explore how, why, and the implications of the interaction between family law and counter-terrorism, particularly on the human rights of the parents and children involved. It will question whether the use of the family courts provides a more useful, and perhaps human rights compliant, method of tackling terrorism and extremism when compared to other more Draconian legal and administrative methods.

Keywords: counter-terrorism, family justice, law, human rights

Procedia PDF Downloads 179
11453 The Paradox of Environmental Social Governance (ESG) in Addressing Environmental Justice

Authors: Barbara Ballan

Abstract:

Environmental Justice (EJ) and Environmental Social Governance (ESG) are trending terms used to address the impacts of corporate actions and environmental and social regulations on the people and the planet. ESG is a private governance invention (though increasingly required by public law) that aims to disclose environmental and social criteria while fostering value for businesses. On the other hand, EJ was borne as a social movement that evolved into a regulatory tool employed by EJ advocates and governmental agencies to assess inequalities in environmental impacts and regulations. However, EJ usage is expanding, and private environmental governance in the form of ESG disclosure frameworks is incorporating EJ criteria, indexes, and tools as part of its metric-driven approach. There is an existing tension between (1) the notion of social justice at the heart of the environmental justice movement and (2) the nature of for-profit corporations which generate value by externalizing costs, translated to environmental injustices. This study aims to explore the paradoxical relation of ESG, including EJ criteria, despite their opposing notions, in response to the need for innovative mechanisms to address today’s pressing social and environmental challenges. To that end, this study will evaluate and critically assess the inclusion of EJ in ESG reporting. Furthermore, it identifies gaps in ESG frameworks and proposes the integration of EJ tools to address these deficiencies. This work is intended to help both businesses looking to expand their ESG frameworks and include EJ criteria to inform corporate decisions and assure long-term corporate viability, as well as EJ supporters in understanding the complex dynamic of ESG disclosure for the pursuit of EJ objectives.

Keywords: environmental justice, ESG, sustainability reporting, corporate law, environmental law, social justice

Procedia PDF Downloads 19
11452 Security Architecture for Cloud Networking: A Survey

Authors: Vishnu Pratap Singh Kirar

Abstract:

In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.

Keywords: cloud computing, cloud networking, IaaS, PaaS, SaaS, cloud security

Procedia PDF Downloads 499
11451 An Approach to Consumption of Exhaustible Resources Based on Islamic Justice and Hartwick Criteria

Authors: Hamed Najafi, Ghasem Nikjou

Abstract:

Nowadays, there is an increasing attention to the resources scarcity issues. Because of failure in present patterns in the field of the allocation of exhaustible resources between generations and the challenges related to economic justice supply, it is supposed, to present a pattern from the Islamic perspective in this essay. By using content analysis of religious texts, we conclude that governments should remove the gap which is exists between the per capita income of the poor and their minimum consumption (necessary consumption). In order to preserve the exhaustible resources for poor people) not for all), between all generations, government should invest exhaustible resources on endless resources according to Hartwick’s criteria and should spend these benefits for poor people. But, if benefits did not cover the gap between minimum consumption and per capita income of poor levels in one generation, in this case, the government is responsible for covering this gap through the direct consumption of exhaustible resources. For an exact answer to this question, ‘how much of exhaustible resources should expense to maintain justice between generations?’ The theoretical and mathematical modeling has been used and proper function has been provided. The consumption pattern is presented for economic policy makers in Muslim countries, and non-Muslim even, it can be useful.

Keywords: exhaustible resources, Islamic justice, intergenerational justice, distribution of resources, Hartwick criteria

Procedia PDF Downloads 160
11450 Tenure Security, Agricultural Diversity and Food Security

Authors: Amanuel Hadera Gebreyesus

Abstract:

In the literature, the study of tenure and food security has largely involved separate lines of inquiry. In effect, the nexus among these has received little attention; and the underinvestment in research related to the relationship between tenure and food security deters generation of tenure-related knowledge and policy guidance for improving food and nutrition security. Drawing from this motivation, we study the relationship among tenure security, agricultural diversity and food security and dietary diversity. We employ IV approaches to examine the effect of tenure security and agricultural diversity on food security and dietary diversity. We find tenure security is inversely related with food insecurity as shown by its negative association with hunger scale, hunger index and hunger category. On the other hand, results suggest that tenure security improves minimum dietary diversity of women while we find no association with child dietary diversity. Moreover, agricultural diversity is positively related with minimum dietary diversity of women, which may point to higher accessibility and consumption of dietary food groups by women. Also, findings suggest that farmers use their human (knowledge and skills) and resource (land) endowments to improve food security and dietary diversity. An implication from this is the importance of not only improving access to land but also long-term tenure security to promote agricultural diversity, food security and dietary diversity.

Keywords: tenure security, food security, agricultural diversity, dietary diversity, women

Procedia PDF Downloads 162
11449 Smuggling of Migrants as an Influential Factor on National Security, Economic and Social Life

Authors: Jordan Georgiev Deliversky

Abstract:

Human trafficking and smuggling of migrants are criminal activities, which are on the rise over recent years. The number of legal migrants arrived in Europe from outside the European Union are far less than those who want to come and settle in Europe. The objective of this paper is to present the impact on economic and social life of significant measures influencing the smuggling of migrants. The analysis is focused on various complex factors which have multiple origins and are highly influential as regard to the process of migration and the smuggling of migrants. The smuggling of migrants is a criminal activity, directly related to migration. The main results show that often the routes chosen for smuggling of migrants are circuitous, as smugglers carefully avoid strictly controlled roads, checkpoints, and countries or jurisdictions where there is efficiency of justice, with particular emphasis on the law on trafficking of persons and smuggling of migrants.

Keywords: corruption, migration, security, smuggling

Procedia PDF Downloads 233
11448 Die Away Health Workers: The Role of Psychological Factors on Burnout

Authors: Fasanmi Samuel Sunday, Awosusi Omojola

Abstract:

The aim of the present study was to investigate the effect of abusive supervision, interactional justice and supportive workplace supervision burnout among health workers in Makurdi, Benue State, Nigeria. Three hundred and twenty (320) health workers were sampled within Makurdi metropolis, Benue State, Nigeria. Standardized questionnaire on abusive supervision scale, interactional justice scale, supportive workplace supervision scale and employee burnout scale were used in the study. The research was a 2x2x2 factorial design. Four hypotheses were generated and were tested using Analysis of Variance (ANOVA). Scheffe’s post-hoc analysis was used to know the direction of the findings. Results revealed that there was a significant main effect of perceived abusive supervision on employee burnout among health workers. Also, there was a significant main effect of interactional justice on employee burnout among health workers. It was also found out that there was a significant interaction effect of supportive workplace supervision, interactional justice, and abusive supervision on employee burnout among health workers. Results were discussed in line with hypotheses; and recommendations on how to reduce employee burnout were suggested.

Keywords: employee burnout, abusive supervision, interactional justice, supportive workplace supervision

Procedia PDF Downloads 408
11447 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 454
11446 Social Technology and Youth Justice: An Exploration of Ethical and Practical Challenges

Authors: Ravinder Barn, Balbir Barn

Abstract:

This paper outlines ethical and practical challenges in the building of social technology for use with socially excluded and marginalised groups. The primary aim of this study was to design, deploy and evaluate social technology that may help to promote better engagement between case workers and young people to help prevent recidivism, and support young people’s transition towards social inclusion in society. A total of 107 practitioners/managers (n=64), and young people (n=43) contributed to the data collection via surveys, focus groups and 1-1 interviews. Through a process of co-design where end-users are involved as key contributors to social technological design, this paper seeks to make an important contribution to the area of participatory methodologies by arguing that whilst giving ‘voice’ to key stakeholders in the research process is crucial, there is a risk that competing voices may lead to tensions and unintended outcomes. The paper is contextualized within a Foucauldian perspective to examine significant concepts including power, authority and surveillance. Implications for youth justice policy and practice are considered. The authors conclude that marginalized youth and over-stretched practitioners are better served when such social technology is perceived and adopted as a tool of empowerment within a framework of child welfare and child rights.

Keywords: youth justice, social technology, marginalization, participatory research, power

Procedia PDF Downloads 426
11445 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 547
11444 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level

Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil

Abstract:

This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.

Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing

Procedia PDF Downloads 325
11443 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 397
11442 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 668
11441 Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria

Authors: Ahmadu Girgiri, Lawan Gana Ali, Mamman M. Baba

Abstract:

Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.

Keywords: application, environment, insecurity, sensor, wireless sensor network

Procedia PDF Downloads 217
11440 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations

Authors: Pratyush Vatsala, Sanjay Ahuja

Abstract:

The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.

Keywords: Kashmir, Mizoram, security, value, human right

Procedia PDF Downloads 246
11439 The Research of Weights Identify of Harbin Ecological Security Evaluation Index Based on AHP

Authors: Rong Guo, Mengshi Huang, Yujing Bai

Abstract:

With the rapid development of urbanization, the urban population increases and urban sprawl appeared. And these issues led to a sharp deterioration of the ecological environment. So, the urban ecological security evaluation was imminent. The weights identify of index was a key step of the research of ecological security evaluation. The AHP was widely used in the extensive research of weights identify of ecological security index. The characteristics of authority and quantitative can fully reflect the views of relevant experts. On the basis of building the ecological security evaluation index of Harbin, the paper combed and used the basic principle of the AHP, and calculated the weights of Harbin ecological security evaluation index through the process of the expert opinions “summary-feedback-summary”. And lay a foundation of future study of Harbin ecological security index, and guide the quantitative evaluation of Harbin ecological security.

Keywords: AHP, ecological security, evaluation Index, weights identify, harbin

Procedia PDF Downloads 466
11438 Legal Theories Underpinning Access to Justice for Victims of Sexual Violence in Refugee Camps in Africa

Authors: O. E. Eberechi, G. P. Stevens

Abstract:

Legal theory has been referred to as the explanation of why things do or do not happen. It also describes situations and why they ensue. It provides a normative framework by which things are regulated and a foundation for the establishment of legal mechanisms/institutions that can bring about a desired change in a society. Furthermore, it offers recommendations in resolving practical problems and describes what the law is, what the law ought to be and defines the legal landscape generally. Some legal theories provide a universal standard, e.g. human rights, while others are capable of organizing and streamlining the collective use, and, by extension, bring order to society. Legal theory is used to explain how the world works and how it does not work. This paper will argue for the application of the principles of legal theory in the achievement of access to justice for female victims of sexual violence in refugee camps in Africa through the analysis of legal theories underpinning the access to justice for these women. It is a known fact that female refugees in camps in Africa often experience some form of sexual violation. The perpetrators of these incidents may never be apprehended, prosecuted, convicted or sentenced. Where prosecution does occur, the perpetrators are either acquitted as a result of poor investigation, inept prosecution, a lack of evidence, or the case may be dismissed owing to tardiness on the part of the prosecutor, which accounts for the culture of impunity in refugee camps. In other words, victims do not have access to the justice that could ameliorate the plight of the victims. There is, thus, a need for a legal framework that will facilitate access to justice for these victims. This paper will start with an introduction, and be followed by the definition of legal theory, its functions and its application in law. Secondly, it will provide a brief explanation of the problems faced by female refugees who are victims of sexual violence in refugee camps in Africa. Thirdly, it will embark on an analysis of theories which will be a help to an understanding of the precarious situation of female refugees, why they are violated, the need for access to justice for these victims, and the principles of legal theory in its usefulness in resolving access to justice for these victims.

Keywords: access to justice, underpinning legal theory, refugee, sexual violence

Procedia PDF Downloads 397
11437 Praxis-Oriented Pedagogies for Pre-Service Teachers: Teaching About and For Social Justice Through Equity Literature Circles

Authors: Joanne Robertson, Awneet Sivia

Abstract:

Preparing aspiring teachers to become advocates for social justice reflects a fundamental commitment for teacher education programs in Canada to create systemic educational change. The goal is ultimately to address inequities in K-12 education for students from multiple identity groups that have historically been marginalized and oppressed in schools. Social justice is described as an often undertheorized and vague concept in the literature, which increases the risk that teaching for social justice remains a lofty goal. Another concern is that the social justice agenda in teacher education in North America ignores pedagogies related to subject-matter knowledge and discipline-based teaching methods. The question surrounding how teacher education programs can address these issues forms the basis for the research undertaken in this study. The paper focuses on a qualitative research project that examines how an Equity Literature Circles (ELC) framework within a language arts methods course in a Bachelor of Education program may help pre-service teachers better understand the inherent relationship between literacy instructional practices and teaching about and for social justice. Grounded in the Freireian (2018) principle of praxis, this study specifically seeks to understand the impact of Equity Literature Circles on pre-service teachers’ understanding of current social justice issues (reflection), their development of professional competencies in literacy instruction (practice), and their identity as advocates of social justice (action) who address issues related to student diversity, equity, and human rights within the English Language Arts program. In this paper presentation, participants will be provided with an overview of the Equity Literature Circle framework, a summary of key findings and recommendations from the qualitative study, an annotated bibliography of suggested Young Adult novels, and opportunities for questions and dialogue.

Keywords: literacy, language, equity, social justice, diversity, human rights

Procedia PDF Downloads 41
11436 Notions of Social Justice and Educational Globalization: Evaluations of Israeli Teachers and Students across Sectors

Authors: Clara Sabbagh, Nura Resh

Abstract:

The study delves into students’ and teachers’ notions of social justice (social justice judgments or SJJ), examining how they are shaped by both educational globalization and local (nation-state) conditions. Using the Israeli school setting as a case study, we discuss the status of hegemonic Zionism and two influential perspectives of educational globalization – world culture and the post-colonial critique of neo-liberalism – and derive competing hypotheses about the notions of social justice embedded in them. Against this background, we investigate how SJJ are affected by generation – Israeli teachers and students – and by educational sectors that mirror the society’s major divide: Jewish and Israeli Arab. In order to examine these issues, we used a representative sample of 2000 Israeli students, as well as a sample of 800 social studies teachers. We applied MANOVA repeated-measure for examining to what extent SSJ are dependent upon the type of resource that is distributed (repeated measures) and generational (teachers vs students) and sectorial (Jewish vs. Arab) group variables. As expected, findings revealed that the local context does matter. In other words, rather than being consistent with any of the three perspectives above, findings suggest that respondents elaborate the intersection between global and local traditions by creating various forms of mingled notions of social justice. In other words, Israeli (Jewish and Arab) teachers and students can be conceived as agents who play an important role in recreating national heritages and who differently interpret the ways educational globalization impacts their lives.

Keywords: educational globalization, social justice, teachers, Israel, Arab

Procedia PDF Downloads 201
11435 The Effect of War on Spatial Differentiation of Real Estate Values and Urban Disorder in Damascus Metropolitan Area

Authors: Mounir Azzam, Valerie Graw, Andreas Rienow

Abstract:

The Syrian war, which commenced in 2011, has resulted in significant changes in the real estate market in the Damascus metropolitan area, with rising levels of insecurity and disputes over tenure rights. The quest for spatial justice is, therefore, imperative, and this study performs a spatiotemporal analysis to investigate the impact of the war on real estate differentiation. Using the hedonic price models including 2,411 housing transactions over the period 2010-2022, this study aims to understand the spatial dynamics of the real estate market in wartime. Our findings indicate that war variables have had a significant impact on the differentiation and depreciation of property prices. Notably, property attributes have a more substantial impact on real estate values than district location, with severely damaged buildings in Damascus city resulting in an 89% decline in prices, while prices in Rural Damascus districts have decreased by 50%. Additionally, this study examines the urban texture of Damascus using correlation and homogeneity statistics derived from the gray-level co-occurrence matrix obtained from Google Earth Engine. We monitored 250 samples from hedonic datasets within three different years of the Syrian war (2015, 2019, and 2022). Our findings show that correlation values were highly differentiated, particularly among Rural Damascus districts, with a total decline of 87.2%. While homogeneity values decreased overall between 2015 and 2019, they improved slightly after 2019. The findings have valuable implications, not only for investment prospects in setting up a successful reconstruction strategy but also for spatial justice of property rights in strongly encouraging sustainable real estate development.

Keywords: hedonic price, real estate differentiation, reconstruction strategy, spatial justice, urban texture analysis

Procedia PDF Downloads 48
11434 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 392