Search results for: oil theft
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 76

Search results for: oil theft

16 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 132
15 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 93
14 An Analysis of Prefabricated Construction Waste: A Case Study Approach

Authors: H. Hakim, C. Kibert, C. Fabre, S. Monadizadeh

Abstract:

Construction industry is an industry saddled with chronic problems of high waste generation. Waste management that is to ensure materials are utilized in an efficient manner would make a major contribution to mitigating the negative environmental impacts of construction waste including finite resources depletion and growing occupied landfill areas to name a few. Furthermore, ‘material resource efficiency’ has been found an economically smart approach specially when considered during the design phase. One effective strategy is to utilizing off-site construction process which includes a series of prefabricated systems such as mobile, modular, and HUD construction (Department of Housing and Urban Development manufactured buildings). These types of buildings are by nature material and resource-efficient. Despite conventional construction that is exposed to adverse weather conditions, manufactured construction production line is capable of creating repetitive units in a factory controlled environment. A factory can have several parallel projects underway with a high speed and in a timely manner which simplifies the storage of excess materials and re-allocating to the next projects. The literature reports that prefabricated construction significantly helps reduce errors, site theft, rework, and delayed problems and can ultimately lead to a considerable waste reduction. However, there is not sufficient data to quantify this reduction when it comes to a regular modular house in the U.S. Therefore, this manuscript aims to provide an analysis of waste originated from a manufactured factory trend. The analysis was made possible with several visits and data collection of Homes of Merits, a Florida Manufactured and Modular Homebuilder. The results quantify and verify a noticeable construction waste reduction.

Keywords: construction waste, modular construction, prefabricated buildings, waste management

Procedia PDF Downloads 239
13 Urban Agriculture among Households of Makurdi Metropolis of Benue State, Nigeria: Key Challenges

Authors: Evangeline Mbah, Margret Okeke, Agbo Joseph

Abstract:

Agriculture was primarily a rural activity in Nigeria, but due to increasing demand for food and jobs for many urban dwellers, it became necessary for urban households to embark on farming as a means of improving household food security and additional income for economic empowerment. Urban agriculture serves as a veritable tool for poverty reduction among people living in urban areas mostly low-income earners and unemployed. The survey was conducted to identify key challenges encountered by households in Makurdi metropolis of Benue state, Nigeria who are engaged in urban agriculture. A well-structured questionnaire was used to collect data from a sample of respondents used for the study. Data were analyzed using frequency, percentage, mean score and standard deviation. Results show that a greater percentage (46.0%) of the respondents engaged in cultivation of leafy vegetable, 22.0% cultivated cassava, 21.0% planted sweet potato, 18.0% cultivated tomato while 56.0% reared poultry, 23.0% kept goat, among others. Sources of agricultural information indicated by the respondents were family members/relations (85.0%), friends/neighbours (73.0%), radio (68.0%), extension agents (57.0%), etc. Major challenges encountered by the respondents in urban agriculture include inadequate size of farmland (M= 2.72), lack of access to credit facilities (M= 2.63), lack of funds (M= 2.50), high cost of labour (M= 2.49), insecurity of lands (M= 2.46), theft of crops at maturity (M= 2.38), lack of farm inputs such as improved varieties of seeds, fertilizer and exotic breeds of livestock (M= 2.23), destruction of crops by stray farm animals (M= 1.96), among others. The study recommends that there is a need for adequate provision of farm inputs by the government at all levels at a subsidized rate in order to reduce the cost of production and enhance optimum productivity.

Keywords: urban, agriculture, household, challenges, Makurdi, Nigeria

Procedia PDF Downloads 106
12 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 101
11 An Assessment of the Performance of Local Government in Ondo State Nigeria: A Capital Budgeting Approach

Authors: Olurankinse Felix

Abstract:

Local governments in Ondo State Nigeria are the third tier of government saddled with the responsibility of providing governance and economic services at the grassroots. To be able to do this, the Constitution of the Federal Republic of Nigeria provided that a proportion of Federation Account be allocated to them in addition to their internally generated revenue. From the allocation and other incidental sources of revenue, the local governments are expected to provide basic infrastructures and other social amenities to better the lots of the rural dwellers. Nevertheless, local governments’ performances in terms of provision of social amenities are without questioning and quite not encouraging. Assessing the performance of local governments in this period of dearth and scarcity of resources is highly indispensable more so that the activities of local governments’ staff are bedeviled and characterized with fraud, corruption and mismanagement. Considering the direct impact of the consequences of their action on the living standard of the rural dwellers therefore calls for the need to evaluate their level of performances using capital budgeting approach. The paper being a time series study adopts the survey design. Data were obtained through secondary source mainly from the Annual financial statements and publication of approved budgets estimates covering the period of study (2008-2012). The use of ratio analysis was employed in analyzing the comparative level of performances of the local governments under study. The result of the study shows that less than 30% of the local governments were able to harness the budgetary allocation to provide amenities to the beneficiaries while majority of the local governments were involved in unethical conduct ranging from theft of fund, corruption, diversion of funds and extra-budgetary activities. Also, there is poor internally generated revenue to complement the statutory allocation and besides, the monthly withholding of larger portions of local government share by the state in the name of joint account were also seen as contributory factors. The study recommends the need for transparency and accountability in public fund management through the oversight function of the state house of assembly. Also local government should be made to be autonomous and independent of the state by jettisoning the idea of joint account.

Keywords: performance, transparency and accountability, capital budgeting, joint account, local government autonomy

Procedia PDF Downloads 303
10 Rural Farmers-Herdsmen Conflicts, State Mediation Failure and Prospects of Traditional Institutions’ Intervention in Southwest Nigeria

Authors: Grace Adebo

Abstract:

Rural Farmers-herdsmen conflicts have resulted in a large number of causalities in many parts of Nigeria. Herds of cattle have died, while farmers recorded inestimable losses of their crops and harvests. The overall consequences have impacted negatively on food security across the country. There are divided opinions by scholars, agricultural experts and conflict analysts on the root causes of the conflicts and why traditional institutional interventions are ineffective in resolving the crisis. The study, therefore, aims to investigate the fundamentality of the conflicts’ causes in Southwest Nigeria and the correlates between traditional institutional authorities’ intervention and farmers-herdsmen conflicts in Southwest Nigeria. A structured interview schedule and focus group discussion were employed to elicit information from 180 farmers and 48 herdsmen selected through a multistage sampling procedure from the conflict zones in Southwest Nigeria. Collected data were analyzed using frequency counts, percentages, means and the Relative Importance Index (RII). The study found that climate change effects, farmland encroachment, crop damage, theft, and competition for land and water resources and pollution were the root causes of the violent herders-rural farmer’s clashes. The quest for wealth acquisition by some traditional rulers and some notable individuals in the conflict neighborhoods, occasioned tribal-mix herds possession and, thus undermining local institutional interventions and perverting justice through weak conflict resolution strategies, therefore, fueling further conflicts. Most farmers in the conflict zones have abandoned their farms for fear of death. This coupled with physical, social, economic and psychological consequences have deepened food insecurity and impaired the economic conditions of the herdsmen and the farmers. Currently, there are no mutually established mediation mechanisms as most states are opposed to the enactment of grazing laws to protect territorial encroachments of lands and subsequent multiplication of the herdsmen. It is suggested that government and Non-Governmental Organisation (NGOs) should encourage a functional stakeholder's forum for sustainable conflict resolution and establish a compensation scheme for losses incurred while extension agents are equipped with knowledge on conflict management strategies for peace attainment with the envisioned goal of achieving sustainable livelihoods and food security in Southwest Nigeria.

Keywords: conflict resolution, food security, herdsmen-farmers conflict, sustainable livelihoods, traditional institutions

Procedia PDF Downloads 88
9 Nuclear Materials and Nuclear Security in India: A Brief Overview

Authors: Debalina Ghoshal

Abstract:

Nuclear security is the ‘prevention and detection of, and response to unauthorised removal, sabotage, unauthorised access, illegal transfer or other malicious acts involving nuclear or radiological material or their associated facilities.’ Ever since the end of Cold War, nuclear materials security has remained a concern for global security. However, with the increase in terrorist attacks not just in India especially, security of nuclear materials remains a priority. Therefore, India has made continued efforts to tighten its security on nuclear materials to prevent nuclear theft and radiological terrorism. Nuclear security is different from nuclear safety. Physical security is also a serious concern and India had been careful of the physical security of its nuclear materials. This is more so important since India is expanding its nuclear power capability to generate electricity for economic development. As India targets 60,000 MW of electricity production by 2030, it has a range of reactors to help it achieve its goal. These include indigenous Pressurised Heavy Water Reactors, now standardized at 700 MW per reactor Light Water Reactors, and the indigenous Fast Breeder Reactors that can generate more fuel for the future and enable the country to utilise its abundant thorium resource. Nuclear materials security can be enhanced through two important ways. One is through proliferation resistant technologies and diplomatic efforts to take non proliferation initiatives. The other is by developing technical means to prevent any leakage in nuclear materials in the hands of asymmetric organisations. New Delhi has already implemented IAEA Safeguards on their civilian nuclear installations. Moreover, the IAEA Additional Protocol has also been ratified by India in order to enhance its transparency of nuclear material and strengthen nuclear security. India is a party to the IAEA Conventions on Nuclear Safety and Security, and in particular the 1980 Convention on the Physical Protection of Nuclear Material and its amendment in 2005, Code of Conduct in Safety and Security of Radioactive Sources, 2006 which enables the country to provide for the highest international standards on nuclear and radiological safety and security. India's nuclear security approach is driven by five key components: Governance, Nuclear Security Practice and Culture, Institutions, Technology and International Cooperation. However, there is still scope for further improvements to strengthen nuclear materials and nuclear security. The NTI Report, ‘India’s improvement reflects its first contribution to the IAEA Nuclear Security Fund etc. in the future, India’s nuclear materials security conditions could be further improved by strengthening its laws and regulations for security and control of materials, particularly for control and accounting of materials, mitigating the insider threat, and for the physical security of materials during transport. India’s nuclear materials security conditions also remain adversely affected due to its continued increase in its quantities of nuclear material, and high levels of corruption among public officials.’ This paper would study briefly the progress made by India in nuclear and nuclear material security and the step ahead for India to further strengthen this.

Keywords: India, nuclear security, nuclear materials, non proliferation

Procedia PDF Downloads 321
8 The Convention of Culture: A Comprehensive Study on Dispute Resolution Pertaining to Heritage and Related Issues

Authors: Bhargavi G. Iyer, Ojaswi Bhagat

Abstract:

In recent years, there has been a lot of discussion about ethnic imbalance and diversity in the international context. Arbitration is now subject to the hegemony of a small number of people who are constantly reappointed. When a court system becomes exclusionary, the quality of adjudication suffers significantly. In such a framework, there is a misalignment between adjudicators' preconceived views and the interests of the parties, resulting in a biased view of the proceedings. The world is currently witnessing a slew of intellectual property battles around cultural appropriation. The term "cultural appropriation" refers to the industrial west's theft of indigenous culture, usually for fashion, aesthetic, or dramatic purposes. Selena Gomez exemplifies cultural appropriation by commercially using the “bindi,” which is sacred to Hinduism, as a fashion symbol. In another case, Victoria's Secret insulted indigenous peoples' genocide by stealing native Indian headdresses. In the case of yoga, a similar process can be witnessed, with Vedic philosophy being reduced to a type of physical practice. Such a viewpoint is problematic since indigenous groups have worked hard for generations to ensure the survival of their culture, and its appropriation by the western world for purely aesthetic and theatrical purposes is upsetting to those who practise such cultures. Because such conflicts involve numerous jurisdictions, they must be resolved through international arbitration. However, these conflicts are already being litigated, and the aggrieved parties, namely developing nations, do not believe it prudent to use the World Intellectual Property Organization's (WIPO) already established arbitration procedure. This practise, it is suggested in this study, is the outcome of Europe's exclusionary arbitral system, which fails to recognise the non-legal and non-commercial nature of indigenous culture issues. This research paper proposes a more comprehensive, inclusive approach that recognises the non-legal and non-commercial aspects of IP disputes involving cultural appropriation, which can only be achieved through an ethnically balanced arbitration structure. This paper also aspires to expound upon the benefits of arbitration and other means of alternative dispute resolution (ADR) in the context of disputes pertaining to cultural issues; positing that inclusivity is a solution to the existing discord between international practices and localised cultural points of dispute. This paper also hopes to explicate measures that will facilitate ensuring inclusion and ideal practices in the domain of arbitration law, particularly pertaining to cultural heritage and indigenous expression.

Keywords: arbitration law, cultural appropriation, dispute resolution, heritage, intellectual property

Procedia PDF Downloads 113
7 Prospective Relations of Childhood Maltreatment, Temperament and Delinquency among Prisoners: Moderated Mediation Effect of Age and Education

Authors: Razia Anjum, Zaqia Bano, Chan Wai

Abstract:

Temperament has been described as a multifaceted and potentially value-laden construct in literature but there is scarcity of research work in area of forensic psychology predominantly in south Asian countries. Present exposition explored the mediated effect of temperament towards the childhood maltreatment and delinquency. Further the moderated effect of prisoner’s age and education will be examined. Variable System for Windows 1.3 version was used to analyze the data provided by 517 prisoners (407 males, 110 females) from four districts prisons situated at Pakistan. Cross sectional research design was used in this study and representative sample was approached through purposive sampling technique. Only those prisoners were the part of study who maltreated in their childhood in form of physical abuse, psychological abuse, sexual abuse or experienced the emotional neglect. After exploration the childhood adversities through ‘Child Abuse Self-Report Scale’, then the prisoner’s temperament styles were explored through ‘Adult Temperament Scale’. Later on, the investigation with particular to the delinquent behaviors was carried out. The findings suggested that the presence of four temperamental styles (choleric, melancholic, phlegmatic, and sanguine) mediated the childhood maltreatment-delinquency relationship in late adulthood but not in early adulthood. Marked exploration was the significant moderated effect of Prisoner’s age and their level of education that effect the relationship of temperament towards the childhood maltreatment and the delinquency, in this way results are consistent with views on cumulative pathways to delinquency that undergone through the effect of childhood maltreatment. Results indicated that Choleric, Melancholic temperament was the positive predictor of delinquency, whereas. The Phlegmatic and Sanguine temperament were the negative predictor of delinquency, in this way, different types of temperament left an indelible trace on delinquency that can work out by modifying the individual temperament. On the basis of results, it could be concluded that inclination towards the delinquent behaviors including theft, drug abuse, lying, noncompliance behavior, police encounter, violence, cheating, gambling, harassment, homosexuality and heterosexuality could be minimized if properly screen out the temperament. Moreover, study determined the two other significant moderated effect of age towards the involvement in delinquent behaviors and moderated effect of education towards childhood maltreatment and the temperament. Findings suggested that with marked increase in number of years in age the probability to get involve in delinquent behaviors will decrease and the result was consistent with the assumption that education can work as buffered to maximize or minimize the effect of trauma and can shape the temperament accordingly. Results are consistent with views on cumulative disadvantage with the socio-psychological faultiness of community.

Keywords: delinquent behaviors, temperament, prisoners, moderated mediation analysis

Procedia PDF Downloads 81
6 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 60
5 Women’s Lived Expriences in Prison: A Study Conducted in Haramaya Correctional Facilities, Ethiopia. March 2023

Authors: Ramzi Bekri Umer

Abstract:

Aim: This study attempts to investigate the causes and difficulties with women’s incarceration as well as threat for their reintegration after release from prison with emphasis on the correctional facility of Haramaya city. Method and Methodology: Both quantitative and qualitative research methods were employed in this study; key informant interviews and participant observation were utilized to gather qualitative data, while crosssectional and descriptive research designs were used to gather quantitative data. Findings: This study shows that the women's incarceration was caused by their family histories, genderbased violence, illiteracy, and socioeconomic issues. The principal charges made against the female culprits were theft, vandalism, murder, and moral perversion. A poor quality of life in prison, concerns about family dissolution, emotional instability, financial difficulties, and a lack of spirituality were the main causes of unhappiness for the women behind bars, while social stigma, mistrust, and retaliation fears were the main obstacles to the women's ability to reintegrate into their families and communities. Theoretical Importance: This study involves incarcerated women at correctional center of Haramaya who committed various types of crimes. The local government sectors and non-governmental organization will gain from the study in order to create workable plans to reduce women's criminality and the growing number of female lawbreakers. Local communities and other governmental and nongovernmental partners will be able to support gender equality initiatives that seek to eradicate gender-based violence and discrimination, which worsen the criminality of women. Data Collection and Analysis Procedures: The quantitative and qualitative data were collected prospectively from a sample of 100 women prisoners. Quantitative data were analyzed using descriptive statistics, whereas, thematic analysis, were used for qualitative data. Question Answered: 1. What are the main causes women’s imprisonment in Haramaya city correctional facility. 2. What are the main obstacles of the women's ability to reintegrate into their families and communities after released from incarceration. Conclusion: The study concludes that incarcerated women experience a tremendous impact on their daily life. It highlights the importance of addressing factors such as family backgrounds, gender-based violence, illiteracy and socio-economic problem to decrease the number of women imprisonment. Detention environment, fear for family breakup, financial hardship and deprivation of spiritual life are the major sources of distress among the incarcerated women.

Keywords: Ethiopia, women prisoner, incarceration, reintegration

Procedia PDF Downloads 38
4 Articulating the Colonial Relation, a Conversation between Afropessimism and Anti-Colonialism

Authors: Thomas Compton

Abstract:

As Decolonialism becomes an important topic in Political Theory, the rupture between the colonized and the colonist relation has lost attention. Focusing on the anti-colonial activist Madhi Amel, we shall consider his attention to the permanence of the colonial relation and how it preempts Frank Wilderson’s formulation of (white) culturally necessary Anti-Black violence. Both projects draw attention away from empirical accounts of oppression, instead focusing on the structural relation which precipitates them. As Amel says that we should stop thinking of the ‘underdeveloped’ as beyond the colonial relation, Wilderson says we should stop think of the Black rights that have surpassed the role of the slave. However, Amel moves beyond his idol Althusser’s Structuralism toward a formulation of the colonial relation as source of domination. Our analysis will take a Lacanian turn in considering how this non-relation was formulated as a relation how this space of negativity became a ideological opportunity for Colonial domination. Wilderson’s work shall problematise this as we conclude with his criticisms of Structural accounts for the failure to consider how Black social death exists as more than necessity but a cite of white desire. Amel, a Lebanese activist and scholar (re)discovered by Hicham Safieddine, argues colonialism is more than the theft of land, but instead a privatization of collective property and form of investment which (re)produces the status of the capitalist in spaces ‘outside’ the market. Although Amel was a true Marxist-Leninsist, who exposited the economic determinacy of the Colonial Mode of Production, we are reading this account through Alenka Zupančič’s reformulation of the ‘invisible hand job of the market’. Amel points to the signifier ‘underdeveloped’ as buttressed on a pre-colonial epistemic break, as the Western investor (debt collector) sees the (post?) colony narcissistic image. However, the colony can never become site of class conflict, as the workers are not unified but existing between two countries. In industry, they are paid in Colonial subjectivisation, the promise of market (self)pleasure, at home, they are refugees. They are not, as Wilderson states, in the permanent social death of the slave, but they are less than the white worker. This is formulated as citizen (white), non-citizen (colonized), anti-citizen (Black/slave). Here we may also think of how indentured Indians were used as instruments of colonial violence. Wilderson’s aphorism “there is no analogy to anti-Black violence” lays bare his fundamental opposition between colonial and specifically anti-Black violence. It is not only that the debt collector, landowner, or other owners of production pleasures themselves as if their hand is invisible. The absolute negativity between colony and colonized provides a new frontier for desire, the development of a colonial mode of production. An invention inside the colonial structure that is generative of class substitution. We shall explore how Amel ignores the role of the slave but how Wilderson forecloses the history African anti-colonial.

Keywords: afropessimism, fanon, marxism, postcolonialism

Procedia PDF Downloads 124
3 The Rite of Jihadification in ISIS Modified Video Games: Mass Deception and Dialectic of Religious Regression in Technological Progression

Authors: Venus Torabi

Abstract:

ISIS, the terrorist organization, modified two videogames, ARMA III and Grand Theft Auto 5 (2013) as means of online recruitment and ideological propaganda. The urge to study the mechanism at work, whether it has been successful or not, derives (Digital) Humanities experts to explore how codes of terror, Islamic ideology and recruitment strategies are incorporated into the ludic mechanics of videogames. Another aspect of the significance lies in the fact that this is a latent problem that has not been fully addressed in an interdisciplinary framework prior to this study, to the best of the researcher’s knowledge. Therefore, due to the complexity of the subject, the present paper entangles with game studies, philosophical and religious poles to form the methodology of conducting the research. As a contextualized epistemology of such exploitation of videogames, the core argument is building on the notion of “Culture Industry” proposed by Theodore W. Adorno and Max Horkheimer in Dialectic of Enlightenment (2002). This article posits that the ideological underpinnings of ISIS’s cause corroborated by the action-bound mechanics of the videogames are in line with adhering to the Islamic Eschatology as a furnishing ground and an excuse in exercising terrorism. It is an account of ISIS’s modification of the videogames, a tool of technological progression to practice online radicalization. Dialectically, this practice is packed up in rhetoric for recognizing a religious myth (the advent of a savior), as a hallmark of regression. The study puts forth that ISIS’s wreaking havoc on the world, both in reality and within action videogames, is negotiating the process of self-assertion in the players of such videogames (by assuming one’s self a member of terrorists) that leads to self-annihilation. It tries to unfold how ludic Mod videogames are misused as tools of mass deception towards ethnic cleansing in reality and line with the distorted Eschatological myth. To conclude, this study posits videogames to be a new avenue of mass deception in the framework of the Culture Industry. Yet, this emerges as a two-edged sword of mass deception in ISIS’s modification of videogames. It shows that ISIS is not only trying to hijack the minds through online/ludic recruitment, it potentially deceives the Muslim communities or those prone to radicalization into believing that it's terrorist practices are preparing the world for the advent of a religious savior based on Islamic Eschatology. This is to claim that the harsh actions of the videogames are potentially breeding minds by seeds of terrorist propaganda and numbing them to violence. The real world becomes an extension of that harsh virtual environment in a ludic/actual continuum, the extension that is contributing to the mass deception mechanism of the terrorists, in a clandestine trend.

Keywords: culture industry, dialectic, ISIS, islamic eschatology, mass deception, video games

Procedia PDF Downloads 116
2 Assessment of Environmental Mercury Contamination from an Old Mercury Processing Plant 'Thor Chemicals' in Cato Ridge, KwaZulu-Natal, South Africa

Authors: Yohana Fessehazion

Abstract:

Mercury is a prominent example of a heavy metal contaminant in the environment, and it has been extensively investigated for its potential health risk in humans and other organisms. In South Africa, massive mercury contamination happened in1980s when the England-based mercury reclamation processing plant relocated to Cato Ridge, KwaZulu-Natal Province, and discharged mercury waste into the Mngceweni River. This mercury waste discharge resulted in high mercury concentration that exceeded the acceptable levels in Mngceweni River, Umgeni River, and human hair of the nearby villagers. This environmental issue raised the alarm, and over the years, several environmental assessments were reported the dire environmental crises resulting from the Thor Chemicals (now known as Metallica Chemicals) and urged the immediate removal of the around 3,000 tons of mercury waste stored in the factory storage facility over two decades. Recently theft of some containers with the toxic substance from the Thor Chemicals warehouse and the subsequent fire that ravaged the facility furtherly put the factory on the spot escalating the urgency of left behind deadly mercury waste removal. This project aims to investigate the mercury contamination leaking from an old Thor Chemicals mercury processing plant. The focus will be on sediments, water, terrestrial plants, and aquatic weeds such as the prominent water hyacinth weeds in the nearby water systems of Mngceweni River, Umgeni River, and Inanda Dam as a bio-indicator and phytoremediator for mercury pollution. Samples will be collected in spring around October when the condition is favourable for microbial activity to methylate mercury incorporated in sediments and blooming season for some aquatic weeds, particularly water hyacinth. Samples of soil, sediment, water, terrestrial plant, and aquatic weed will be collected per sample site from the point of source (Thor Chemicals), Mngceweni River, Umgeni River, and the Inanda Dam. One-way analysis of variance (ANOVA) tests will be conducted to determine any significant differences in the Hg concentration among all sampling sites, followed by Least Significant Difference post hoc test to determine if mercury contamination varies with the gradient distance from the source point of pollution. The flow injection atomic spectrometry (FIAS) analysis will also be used to compare the mercury sequestration between the different plant tissues (roots and stems). The principal component analysis is also envisaged for use to determine the relationship between the source of mercury pollution and any of the sampling points (Umgeni and Mngceweni Rivers and the Inanda Dam). All the Hg values will be expressed in µg/L or µg/g in order to compare the result with the previous studies and regulatory standards. Sediments are expected to have relatively higher levels of Hg compared to the soils, and aquatic macrophytes, water hyacinth weeds are expected to accumulate a higher concentration of mercury than terrestrial plants and crops.

Keywords: mercury, phytoremediation, Thor chemicals, water hyacinth

Procedia PDF Downloads 179
1 Children’s Experience of the Built Environment in the Initial Stages of a Settlement Formation: Case Study of Shahid-Keshvari New Settlement, Isfahan, Iran

Authors: Hassan Sheikh, Mehdi Nilipour, Amiraslan Fila

Abstract:

Many conventional town planning processes do little to give children and young people a voice on what is important about the urban environment. As a result of paying little attention to the children, their physical, social and mental needs are hardly met in urban environments. Therefore, urban spaces are impotent to attract children, while their recreational space has been confined to home or virtual spaces. Since children are just taking the first steps to learn the world beyond house borders, their living environment will profoundly influence almost all aspects of their lives. This puts a great deal of responsibility on the shoulders of planners, who need to balance a number of different issues in urban design to make places more child-friendly. The main purpose of present research is to analyze and plan a child-friendly environment in an on-going urban settlement development for the benefit of all residents. Assessing children’s needs and regard them in development strategies and policies will help to “plan for children”. Following this purpose, based on child-friendly environment studies, indicators of child-friendly environments were collected. Then three distinct characteristics of case study, which are being under-construction, lack of social ties between dwellers and high-rise building, determined seven indicators included basic services, Urban and environmental qualities, Family, kin, peers and community, Sense of belonging and continuity, participation, Safety, security and freedom of movement and human scale. With the survey, Informal observation and participation in small communities, essential data has been collected and analyzed by SPSS software. The field study is Shahid-Keshvari town in Isfahan, Iran. Eighty-six middle childhood, children (ages 8-13) participated. The results show Children's satisfaction is correlated with basic services and the quality of the environment, social environment and the safety and security. The considerable number of children and youth (55%) like to live somewhere other than the town. Satisfaction and sense of belonging and continuity have a strong inverse correlation with age. In other words, as age increases, satisfaction and consequently a sense of belonging will be reduced; thus children and youth consider their future somewhere out of the town. The main reason for dissatisfaction was the basic services and social environment. More than half of children (55%) expressed their wish to develop basic services in terms of availability, hierarchy, and quality. Among all recreational places, children showed more interest to the parks. About three-quarters (76%) considered building a park as a crucial item for residents. The significant number of children (54%) want to have a relationship with more friends. This could be due to the serious shortage of the leisure spaces such as parks or playgrounds. Also, the space around the house or space between the apartments has not been designed for play or children’s activities. Moreover, the presence of strangers and construction workers have a negative impact on children's sense of peace and security; 60% of children are afraid of theft and 36% of children found strangers as a menace. The analysis of children’s issues and suggestions provides an insight to plan and design of child-friendly environment in new towns.

Keywords: child-friendly city (CFC), child-friendly environment, child participation, under-construction environment, Isfahan Shahid-Keshvari Town

Procedia PDF Downloads 350