Search results for: peace and security council
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3333

Search results for: peace and security council

3213 Reversing Community Relationship From the I-It to I-Thou as a Tool for Conflict Resolution and Peace Building in Ethiopia

Authors: Sisaye Tamrat Ayalew

Abstract:

The study focuses on the nature of community relationships in Ethiopia, specifically the I-Thou and I-It relationships, and how they contribute to conflict resolution and peacebuilding. It highlights the importance of genuine dialogue and mutual understanding in creating a unified and peaceful society. It analyzes the nature of community relationships in Ethiopia and evaluate how these relationships either contribute to conflict resolution or exacerbate conflicts. It aims to understand the role of genuine dialogue (I-Thou relationship) versus monologue (I-It relationship) in building lasting peace in the country. The study adopts a qualitative approach, specifically hermeneutics, to explore and understand the nature of community relationships in Ethiopia. It involves analyzing the characteristics of both I-Thou and I-It relationships and examining how the political elites shape these relationships within the community. The findings of the study indicate that the predominant type of relationship in Ethiopian society is the I-It relationship, referred to as "com-animation". This relationship is characterized by mutual mistrust, prejudice, hostility, and misunderstanding. As a result, conflicts, mass killings, displacement, and human rights violations have occurred. The study emphasizes the importance of shifting from com-animation to communication (I-Thou relationship) in order to address conflicts and establish lasting peace.

Keywords: dialogue, I-thou relationship, peace building, I-It relationship

Procedia PDF Downloads 48
3212 Bringing Ethics to a Violent System

Authors: Zeynep Selin Acar

Abstract:

In international system, there has always been a cycle of violence, war and peace. As there travels the time, after Christianity and later Just War theorists, international relations theorists have been tried to limit violence and war. As pieces of international law, Peace of Augsburg, Kellog-Briand Pact, League of Nations Covenant and UN Charter were and are still not effective to prevent war. Moreover, in order to find a way around these rules, it is believed that a new excuse started to be used instead of violence or war, humanitarian intervention. However, it has neither a legal nor a universally accepted framework. As a result, it is open to be manipulated by states. In order to prevent this, Responsibility to Protect (RtoP) which gives a state the responsibility to protect its citizens against violence, is created. Additionally, RtoP transfers this responsibility to regional or international group of states at the time when a state is the origin of violence. In the lights of these, this paper analyzes RtoP as an ethical approach to war and peace studies because it provides other states as guardians and care-takers of people who do not belong to them or do not share any togetherness.

Keywords: ethics, humanitarian intervention, responsibility to protect, UN charter

Procedia PDF Downloads 292
3211 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 547
3210 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 396
3209 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 667
3208 The Research of Weights Identify of Harbin Ecological Security Evaluation Index Based on AHP

Authors: Rong Guo, Mengshi Huang, Yujing Bai

Abstract:

With the rapid development of urbanization, the urban population increases and urban sprawl appeared. And these issues led to a sharp deterioration of the ecological environment. So, the urban ecological security evaluation was imminent. The weights identify of index was a key step of the research of ecological security evaluation. The AHP was widely used in the extensive research of weights identify of ecological security index. The characteristics of authority and quantitative can fully reflect the views of relevant experts. On the basis of building the ecological security evaluation index of Harbin, the paper combed and used the basic principle of the AHP, and calculated the weights of Harbin ecological security evaluation index through the process of the expert opinions “summary-feedback-summary”. And lay a foundation of future study of Harbin ecological security index, and guide the quantitative evaluation of Harbin ecological security.

Keywords: AHP, ecological security, evaluation Index, weights identify, harbin

Procedia PDF Downloads 466
3207 Collective Actions of the Women in Black of the Gaza Strip

Authors: Lina Fernanda González

Abstract:

Through this essay, an attempt will be made to make visible the work of the international network of the Women in Black (henceforth WB), on the one hand. On the other hand, the work of Women International Courts as a political practice will be showed as well, focusing their work into generating a collective identity - becoming thusly a peace building space, rescuing in this way the symbolic value of their practices consisting in peaceful resistance as political scenarios, that serve, too, a pedagogical and healing purposes.

Keywords: collective actions, women, peace, human rights and humanitarian international law

Procedia PDF Downloads 367
3206 Nation Building versus Self Determination: Thai State’s Response to Insurgency in South

Authors: Sunaina Sunaina

Abstract:

The emergence of Thailand as a modern nation was amalgamation of several minority groups. Eventually, the nation tried to mitigate these diversities in the name of nationalism in the backdrop of colonial powers presence in neighboring nations. However, the continued imposition of modern nation building processes (which is a western concept) in the post-colonial era deepen the feelings of alienation among the minority groups and leads to separatist conflicts. It is significant that whatever form these conflicts take, will impact the security of nation as well as the region of Southeast Asia. This paper tries to explore the possible factors behind the state policies adopted by the government of Thailand to manage the insurgency in Southern provinces in the south. The protracted insurgency in the South has historical roots as Pattani kingdom had glorious period whether it was trade or commerce or education and its assimilation was never accepted by the leaders of these areas. But after assimilation of southern provinces in the state, it has been the state policy as an important factor in promoting or mitigating the insurgency. Initial protests from the elite class of southern provinces inflated into a more organized and violent uprising after Second World War. It was only the decade of 1990s that a relative peace could prevail for some time. The violence reemerged in 2004 with more intensity and till today this area is suffering with violence. Period of different Prime Ministers dealt this insurgency in different ways sometimes very hard line approach had been adopted especially under Primeminstership of Thaksin Shinawatra. Recently, the peace talks which were started during the period of Yinglunck Shinawatra and were carried forward by Junta government also halted. And again, the region stays in a very volatile state. Violence in these provinces not only questions the capability of government to provide political solution to the problem, but also emerges as a major threat to the internal security of the state. The current era where global terrorism is spreading fast, such vulnerable areas may work as a new ground for its proliferation in Southeast Asia. The paper attempts to understand how Thailand’s historical experience of security determines a different approach to national unity which limits the prospects for autonomy in the South. In conjunction with this experience it is nature of national politics and leadership that influences the nature of policies on the ground in Southern Thailand. The paper also tries to bring out conflict between state sovereignty and self-determination as demanded by many in the southern provinces.

Keywords: insurgency, southern Thailand, security, nation building

Procedia PDF Downloads 100
3205 Moving Towards Zero Waste in a UK Local Authority Area: Challenges to the Introduction of Separate Food Waste Collections

Authors: C. Cole, M. Osmani, A. Wheatley, M. Quddus

Abstract:

EU and UK Government targets for minimising and recycling household waste has led the responsible authorities to research the alternatives to landfill. In the work reported here the local waste collection authority (Charnwood Borough Council) has adopted the aspirational strategy of becoming a “Zero Waste Borough” to lead the drive for public participation. The work concludes that the separate collection of food waste would be needed to meet the two regulatory standards on recycling and biologically active wastes. An analysis of a neighbouring Authority (Newcastle-Under-Lyne Borough Council (NBC), a similar sized local authority that has a successful weekly food waste collection service was undertaken. Results indicate that the main challenges for Charnwood Borough Council would be gaining householder co-operation, the extra costs of collection and organising alternative treatment. The analysis also demonstrated that there was potential offset value via anaerobic digestion for CBC to overcome these difficulties and improve its recycling performance.

Keywords: England, food waste collections, household waste, local authority

Procedia PDF Downloads 384
3204 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 487
3203 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 392
3202 The Evolution of Domestic Terrorism: Global Contemporary Models

Authors: Bret Brooks

Abstract:

As the international community has focused their attention in recent times on international and transnational terrorism, many nations have ignored their own domestic terrorist groups. Domestic terrorism has significantly evolved over the last 15 years and as such nation states must adequately understand their own individual issues as well as the broader worldwide perspective. Contemporary models show that obtaining peace with domestic groups is not only the end goal, but also very obtainable. By evaluating modern examples and incorporating successful strategies, countries around the world have the ability to bring about a diplomatic resolution to domestic extremism and domestic terrorism.

Keywords: domestic, evolution, peace, terrorism

Procedia PDF Downloads 479
3201 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 90
3200 Vision of Justice in the Future of Humanity

Authors: Morteza Khorrami

Abstract:

The idea of final triumph of peace and justice on evil force, conflict and global spread of the religious faith, the full deployment of human values, constitute a utopia and the ideal society is discussed by many of religions. Thus, mankind has always been waiting for a savior and has received good tidings for coming of Great Savior at the end of Time. Of course, various persons were introduced as the Promised Saviors by different religions, but all of the religions share in this fact that the future of humanity is very bright and promising and the future will belong to the righteous and justice. In this article which is written with a descriptive and analytic method, the author tries to show the vision of global justice at the end of time. The opinion of various religions such as Judaism, Christianity, Zoroastrianism, Islam and even idolatry about the great savior as well as the justice status in his era in the world will be discussed. Also the viewpoint of Muslims and specially Shiites, which is explained clearly in their scripts, will be depicted. Current human responsibility towards this golden era will be discussed, too. Based on paper findings, religious doctrine promises that a heaven person and sacred character will come as a reformer of the world. In his era, humanity will be saved from tyranny, oppression and inequality, and the earth will be filled with peace, security, justice, and equity. Moreover promoting justice, truth and spreading religion in the world, economic, scientific, political and moral development will be happened.

Keywords: future of humanity, global justice, islam, religions

Procedia PDF Downloads 339
3199 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 502
3198 Counter-Terrorism and Civil Society in Nigeria

Authors: Emeka Thaddues Njoku

Abstract:

Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.

Keywords: counter-terrorism, civil society organizations, freedom, terrorism

Procedia PDF Downloads 354
3197 In Exile but Not at Peace: An Ethnography among Rwandan Army Deserters in South Africa

Authors: Florence Ncube

Abstract:

This paper examines the military and post-military experiences of soldiers who deserted from the Rwanda Defence Force (RDF) and tried to make a living in South Africa. Because they are deserters, they try to hide their military identity, yet it is simultaneously somewhat coercively ascribed to them by the Rwandan state and can put them in potential danger. The paper attends to the constructions, experiences, practices, and subjective understanding of the deserters’ being in exile to examine how, under circumstances of perceived threat, these men navigate real or perceived state-sponsored surveillance and threat in non-military settings in South Africa where they have become potential political and disciplinary targets. To make sense of the deserters’ experiences in these circumstances, the paper stitches together a number of useful theoretical concepts, including Bourdieu’s (1992) theory of practice and Vigh’s (2009; 2018) concept of social navigation because no single approach can coherently analyze the specificity of this study. Conventional post-military literature privileges an understanding of army desertion as a malignancy and somewhat problematic. Little is known about the military and post-military experiences of deserters who believe that army desertion is in fact a building block towards achieving subjective peace, even in the context of exile. The paper argues that the presence of Rwandan state agents in South Africa strips the context of the exile of its capacity to provide the deserters with peace, safety, and security. This paper recenters army desertion in analyses of militarism, soldiering, and transition in African contexts and complicates commonsense understandings of army desertion which assume that it is entirely problematic. This paper is drawn from an ethnography conducted among 30 junior-rank Rwandan army deserters exiled in Johannesburg and Cape Town. The researcher employed life histories, in-depth interviews, and deep hangouts to collect data.

Keywords: army deserter, military, identity, exile, peacebuilding, South Africa

Procedia PDF Downloads 43
3196 Understanding Strategic Engagement on the Conversation Table: Countering Terrorism in Nigeria

Authors: Anisah Ari

Abstract:

Effects of organized crime permeate all facets of life, including public health, socio-economic endeavors, and human security. If any element of this is affected, it impacts large-scale national and global interest. Seeking to address terrorist networks through technical thinking is like trying to kill a weed by just cutting off its branches. It will re-develop and expand in proportions beyond one’s imagination, even in horrific ways that threaten human security. The continent of Africa has been bedeviled by this menace, with little or no solution to the problem. Nigeria is dealing with a protracted insurgency that is perpetrated by a sect against any form of westernization. Reimagining approaches to dealing with pressing issues like terrorism may require engaging the right set of people in the conversation for any sustainable change. These are people who have lived through the daily effects of the violence that ensues from the activities of terrorist activities. Effective leadership is required for an inclusive process, where spaces are created for diverse voices to be heard, and multiple perspectives are listened to, and not just heard, that supports a determination of the realistic outcome. Addressing insurgency in Nigeria has experienced a lot of disinformation and uncertainty. This may be in part due to poor leadership or an iteration of technical solutions to adaptive challenge peacemaking efforts in Nigeria has focused on behaviors, attitudes and practices that contribute to violence. However, it is important to consider the underlying issues that build-up, ignite and fan the flames of violence—looking at conflict as a complex system, issues like climate change, low employment rates, corruption and the impunity of discrimination due to ethnicity and religion. This article will be looking at an option of the more relational way of addressing insurgency through adaptive approaches that embody engagement and solutions with the people rather than for the people. The construction of a local turn in peacebuilding is informed by the need to create a locally driven and sustained peace process that embodies the culture and practices of the people in enacting an everyday peace beyond just a perennial and universalist outlook. A critical analysis that explores the socially identified individuals and situations will be made, considering the more adaptive approach to a complex existential challenge rather than a universalist frame. Case Study and Ethnographic research approach to understand what other scholars have documented on the matter and also a first-hand understanding of the experiences and viewpoints of the participants.

Keywords: terrorism, adaptive, peace, culture

Procedia PDF Downloads 74
3195 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.

Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms

Procedia PDF Downloads 61
3194 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 517
3193 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 404
3192 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 470
3191 Human Security as a Tool of Protecting International Human Rights Law

Authors: Arenca Trashani

Abstract:

20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.

Keywords: human security, international human rights law, development, Albania, international law

Procedia PDF Downloads 720
3190 The Effectiveness of Insider Mediation for Sustainable Peace: A Case Study in Mindanao, the Philippines

Authors: Miyoko Taniguchi

Abstract:

Conflict and violence have prevailed over the last four decades in conflict-affected areas in Muslim Mindanao, despite the signing of several peace agreements between the Philippine government and Islamic separatist insurgents (the Moro National Liberation Front (MNLF) and the Moro Islamic Liberation Front (MILF)), and peacebuilding activities on the ground. In the meantime, the peace talks had been facilitated and mediated by international actors such as the Organization of Islamic Cooperation (OIC) and its member countries such as Indonesia, and Malaysia, and Japan. In 2014, both the Government of the Philippines (GPH) and the MILF finally reached a Comprehensive Peace Agreement (CAB) in 2014 under the Aquino III administration, though a Bangsamoro Basic Law (BBL) based on the CAB was not enacted at the Catholic-majority of the Philippine Congress. After a long process of deliberations at the Congress, Republic Act 11054, known as the Bangsamoro Organic Law (BOL), was enacted in 2018 under the Duterate administration. In the beginning, President Duterte adopted an 'inclusive approach' that involves the MILF, all factions of the MNLF, non-Islamized indigenous peoples, and other influential clan leaders to align all peace processes under a single Bangsamoro peace process. A notable difference from past administrations, there is an explicit recognition of all agreements and legislations based on the rights of each stakeholder. This created a new identity as 'Bangsamoro', the residents of Muslim Mindanao, enhancing political legitimacy. Besides, it should be noted an important role of 'insider mediators' -a platform for the Bangsamoro from diverse sectors attempting to work within their respective organizations in Moro society. Give the above background, this paper aims at probing the effectiveness of insider mediation as one of the alternative approaches for mediation in the peace process. For the objectives, this research uses qualitative methods such as process-tracing and semi-structured interviews from diverse groups of stakeholders at from the state to the regional level, including the government officials involved in peace process under the Presidential Office, rebels (MILF and MNLF), civil society organizations involved in lobbying and facilitating peace process, especially in the legislative process. The key outcomes and findings are that the Insider Mediators Group, formed in 2016, had taken on a significant role in facilitating the achievement of a wider consensus among stakeholders on major Moro issues such as BBL’s passing during the last administration to call for unity among the Bangsamoro. Most of its members are well-educated professionals affiliated with the MILF, the MNLF, and influential clans. One of the group’s biggest achievements has been the lobbying and provision of legal advice to legislators who were not necessarily knowledgeable about the peace process during the deliberation of the bicameral conference of the BBL, which eventually led to its passage. It can be concluded that in the long run, strengthening vertical and horizontal relations between the Moro society and the State and among the Moro peoples that can be viewed as a means to sustainable peace.

Keywords: insider mediation, Mindanao, peace process, Moro Islamic liberation front

Procedia PDF Downloads 90
3189 The U.S.-Taliban Peace Deal: Two-level Game Logic and Actors’ Payoffs

Authors: Zafar Iqbal

Abstract:

This article aims at analyzing the U.S.-Taliban peace deal considering the cross- pressures that both parties (U.S. and Taliban) faced and eventually paved the way for a negotiated settlement to the two-decade-long war. The paper first discusses the peace process initiated by President Obama in 2009 and then explores the factors that compelled both the parties to sign this deal. The study is based on secondary data and interviews done with the leading experts on Afghanistan along with the Taliban Qatar office spokesperson’s interview. The theoretical framework is based on the interplay of diplomacy and domestic politics: two-level games logic proposed by Robert D. Putnam. The two-level games suggest that actors involved in negotiations face cross-pressures and are constrained both by the expectations of the domestic audience and their counterpart’s zone of possible agreement. This paper will take the cross pressures for both sides as the permissive factors for the entire process of negotiations. However, there will be a slight aberration in the application of Putnam’s two-level games. In this case, it is not inter-state negotiations but between an all-powerful state and the unyielding non-state actors. The study concludes that both the parties faced domestic as well as international pressure which compelled them to sign a deal that could lead to an end of the two-decade-long war. Furthermore, it looks at the potential prospects and challenges of the deal following the U.S. withdrawal.

Keywords: neo-Taliban insurgency, negotiations, two-level game, U.S.-Taliban peace deal, U.S. withdrawal

Procedia PDF Downloads 184
3188 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: treaties, national security, Iran, Islamic Revolution

Procedia PDF Downloads 439
3187 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 197
3186 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 702
3185 Geopolitical Architecture: The Strategic Complex in Indo Pacific Region

Authors: Muzammil Dar

Abstract:

The confluence of trans-national interests and divergent approaches followed by multiple actors has surrounded the Indo-Pacific region with myriad of strategic complexes- Geo-Political, Geo-economic, and security. This paper has thus made a humble attempt to understand the Indo-Pacific strategic predicament from Asia-Pacific perspective. The portmanteau of Indo-Pacific strategic gamble has multiple actors from global powers to regional actors. On the indo-pacific waters, not only flow trade relations, but the tides of conflicts and controversies are striking these actors against each other. The alliance formation and infrastructure building has built-in threat perceptions from rivals vice-versa. The assertiveness of China as a reality and India’s ideological doctrine of peace and friendship, as well as American rebalancing against China, could be seen as clear and bright on the Indo-Pacific strategic portmanteau. ASEAN and Japan, too, have oscillating posturing in the strategic dilemma. The aim and objective of the paper are to sketch out the prospectus and prejudices of Indo-pacific strategic complex.

Keywords: Indo Pacific, Asia Pacific, security and growth for all in the region, SAGAR, ASEAN China

Procedia PDF Downloads 112
3184 Security Features for Remote Healthcare System: A Feasibility Study

Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin

Abstract:

Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.

Keywords: remote healthcare, IT security, security features, wireless sensor application

Procedia PDF Downloads 272