Search results for: protecting
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 445

Search results for: protecting

415 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 35
414 The Iranian Law and Refugee Survivors of Sexual and Gender-Based Violence

Authors: Aminreza Koohestani

Abstract:

This paper intends to explore the existing safeguards available within the Iranian law in protecting refugees affected by Sexual and Gender-Based Violence (SGBV). The Iranian law afforded protection for women and girls against SGBV is scattered across various bodies of law. Moreover, the degree of protection provided by the law varies greatly from one type of SGBV to another. The paper discusses the scope of applicability of Iranian laws to refugees affected by SGBV as well as substantive and procedural laws afforded protection for survivors of SGBV.

Keywords: Iran, law, violence, women

Procedia PDF Downloads 199
413 Cultural Landscape Planning – A Case of Chettinad Village Clusters

Authors: Adhithy Menon E., Biju C. A.

Abstract:

In the 1960s, the concept of preserving heritage monuments was first introduced. During the 1990s, the concept of cultural landscapes gained importance, highlighting the importance of culture and heritage. Throughout this paper, we examine the second category of the cultural landscape, which is an organically evolving landscape as it represents a web of tangible, intangible, and ecological heritage and the ways in which they can be rejuvenated. Cultural landscapes in various regions, such as the Chettinad Village clusters, are in serious decline, which is identified through the Heritage Passport program of this area (2007). For this reason, it is necessary to conduct a detailed analysis of the factors that contribute to this degradation to ensure its protection in the future. An analysis of the cultural landscape of the Chettinad Village clusters and its impact on the community is presented in this paper. The paper follows the first objective, which is to understand cultural landscapes and their different criteria and categories. It is preceded by the study of various methods for protecting cultural landscapes. To identify a core area of intervention based on the parameters of Cultural Landscapes and Community Based Tourism, a study and analysis of the regional context of Chettinad village clusters considering tourism development must first be conducted. Lastly, planning interventions for integrating community-based tourism in Chettinad villages for the purpose of rejuvenating the cultural landscapes of the villages as well as their communities. The major findings include the importance of the local community in protecting cultural landscapes. The parameters identified to have an impact on Chettinad Village clusters are a community (community well-being, local maintenance, and enhancement, demand, alternative income for community, public participation, awareness), tourism (location and physical access, journey time, tourist attractions), integrity (natural factors, natural disasters, demolition of structures, deterioration of materials) authenticity (sense of place, living elements, building techniques, artistic expression, religious context) disaster management (natural disasters) and environmental impact (pollution). This area can be restored to its former glory and preserved as part of the cultural landscape for future generations by focusing on and addressing these parameters within the identified core area of the Chettinad Villages cluster (Kanadukathan TP, Kothamangalam, Kottaiyur, Athangudi, Karikudi, and Palathur).

Keywords: Chettinad village clusters, community, cultural landscapes, organically evolved.

Procedia PDF Downloads 48
412 Modeling the Current and Future Distribution of Anthus Pratensis under Climate Change

Authors: Zahira Belkacemi

Abstract:

One of the most important tools in conservation biology is information on the geographic distribution of species and the variables determining those patterns. In this study, we used maximum-entropy niche modeling (Maxent) to predict the current and future distribution of Anthus pratensis using climatic variables. The results showed that the species would not be highly affected by the climate change in shifting its distribution; however, the results of this study should be improved by taking into account other predictors, and that the NATURA 2000 protected sites will be efficient at 42% in protecting the species.

Keywords: anthus pratensis, climate change, Europe, species distribution model

Procedia PDF Downloads 108
411 Evaluation of Australian Open Banking Regulation: Balancing Customer Data Privacy and Innovation

Authors: Suman Podder

Abstract:

As Australian ‘Open Banking’ allows customers to share their financial data with accredited Third-Party Providers (‘TPPs’), it is necessary to evaluate whether the regulators have achieved the balance between protecting customer data privacy and promoting data-related innovation. Recognising the need to increase customers’ influence on their own data, and the benefits of data-related innovation, the Australian Government introduced ‘Consumer Data Right’ (‘CDR’) to the banking sector through Open Banking regulation. Under Open Banking, TPPs can access customers’ banking data that allows the TPPs to tailor their products and services to meet customer needs at a more competitive price. This facilitated access and use of customer data will promote innovation by providing opportunities for new products and business models to emerge and grow. However, the success of Open Banking depends on the willingness of the customers to share their data, so the regulators have augmented the protection of data by introducing new privacy safeguards to instill confidence and trust in the system. The dilemma in policymaking is that, on the one hand, lenient data privacy laws will help the flow of information, but at the risk of individuals’ loss of privacy, on the other hand, stringent laws that adequately protect privacy may dissuade innovation. Using theoretical and doctrinal methods, this paper examines whether the privacy safeguards under Open Banking will add to the compliance burden of the participating financial institutions, resulting in the undesirable effect of stifling other policy objectives such as innovation. The contribution of this research is three-fold. In the emerging field of customer data sharing, this research is one of the few academic studies on the objectives and impact of Open Banking in the Australian context. Additionally, Open Banking is still in the early stages of implementation, so this research traces the evolution of Open Banking through policy debates regarding the desirability of customer data-sharing. Finally, the research focuses not only on the customers’ data privacy and juxtaposes it with another important objective of promoting innovation, but it also highlights the critical issues facing the data-sharing regime. This paper argues that while it is challenging to develop a regulatory framework for protecting data privacy without impeding innovation and jeopardising yet unknown opportunities, data privacy and innovation promote different aspects of customer welfare. This paper concludes that if a regulation is appropriately designed and implemented, the benefits of data-sharing will outweigh the cost of compliance with the CDR.

Keywords: consumer data right, innovation, open banking, privacy safeguards

Procedia PDF Downloads 112
410 Implementation of Invisible Digital Watermarking

Authors: V. Monisha, D. Sindhuja, M. Sowmiya

Abstract:

Over the decade, the applications about multimedia have been developed rapidly. The advancement in the communication field at the faster pace, it is necessary to protect the data during transmission. Thus, security of multimedia contents becomes a vital issue, and it is a need for protecting the digital content against malfunctions. Digital watermarking becomes the solution for the copyright protection and authentication of data in the network. In multimedia applications, embedded watermarks should be robust, and imperceptible. For improving robustness, the discrete wavelet transform is used. Both encoding and extraction algorithm can be done using MATLAB R2012a. In this Discrete wavelet transform (DWT) domain of digital image, watermarking algorithm is used, and hardware implementation can be done on Xilinx based FPGA.

Keywords: digital watermarking, DWT, robustness, FPGA

Procedia PDF Downloads 388
409 Applying Intelligent Material in Food Packaging

Authors: Kasra Ghaemi, Syeda Tasnim, Shohel Mahmud

Abstract:

One of the main issues affecting the quality and shelf life of food products is temperature fluctuation during transportation and storage. Packaging plays an important role in protecting food from environmental conditions, especially thermal variations. In this study, the performance of using microencapsulated Phase Change Material (PCM) as a promising thermal buffer layer in smart food packaging is investigated. The considered insulation layer is evaluated for different thicknesses and the absorbed heat from the environment. The results are presented in terms of the melting time of PCM or provided thermal protection period.

Keywords: food packaging, phase change material, thermal buffer, protection time

Procedia PDF Downloads 58
408 Temperature Calculation for an Atmospheric Pressure Plasma Jet by Optical Emission Spectroscopy

Authors: H. Lee, Jr., L. Bo-ot, R. Tumlos, H. Ramos

Abstract:

The objective of the study is to be able to calculate excitation and vibrational temperatures of a 2.45 GHz microwave-induced atmospheric pressure plasma jet. The plasma jet utilizes Argon gas as a primary working gas, while Nitrogen is utilized as a shroud gas for protecting the quartz tube from the plasma discharge. Through Optical Emission Spectroscopy (OES), various emission spectra were acquired from the plasma discharge. Selected lines from Ar I and N2 I emissions were used for the Boltzmann plot technique. The Boltzmann plots yielded values for the excitation and vibrational temperatures. The various values for the temperatures were plotted against varying parameters such as the gas flow rates.

Keywords: plasma jet, OES, Boltzmann plots, vibrational temperatures

Procedia PDF Downloads 684
407 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 529
406 Protective Role of Curcumin against Ionising Radiation of Gamma Ray

Authors: Turban Kar, Maitree Bhattacharyya

Abstract:

Curcumin, a dietary antioxidant has been identified as a wonder molecule to possess therapeutic properties protecting the cellular macromolecules from oxidative damage. In our experimental study, we have explored the effectiveness of curcumin in protecting the structural paradigm of Human Serum Albumin (HSA) when exposed to gamma irradiation. HSA, being an important transport protein of the circulatory system, is involved in binding of variety of metabolites, drugs, dyes and fatty acids due to the presence of hydrophobic pockets inside the structure. HSA is also actively involved in the transportation of drugs and metabolites to their targets, because of its long half-life and regulation of osmotic blood pressure. Gamma rays, in its increasing concentration, results in structural alteration of the protein and superoxide radical generation. Curcumin, on the other hand, mitigates the damage, which has been evidenced in the following experiments. Our study explores the possibility for protection by curcumin during the molecular and conformational changes of HSA when exposed to gamma irradiation. We used a combination of spectroscopic methods to probe the conformational ensemble of the irradiated HSA and finally evaluated the extent of restoration by curcumin. SDS - PAGE indicated the formation of cross linked aggregates as a consequence of increasing exposure of gamma radiation. CD and FTIR spectroscopy inferred significant decrease in alpha helix content of HSA from 57% to 15% with increasing radiation doses. Steady state and time resolved fluorescence studies complemented the spectroscopic measurements when lifetime decay was significantly reduced from 6.35 ns to 0.37 ns. Hydrophobic and bityrosine study showed the effectiveness of curcumin for protection against radiation induced free radical generation. Moreover, bityrosine and hydrophobic profiling of gamma irradiated HSA in presence and absence of curcumin provided light on the formation of ROS species generation and the protective (magical) role of curcumin. The molecular mechanism of curcumin protection to HSA from gamma irradiation is yet unknown, though a possible explanation has been proposed in this work using Thioflavin T assay. It was elucidated, that when HSA is irradiated at low dose of gamma radiation in presence of curcumin, it is capable of retaining the native characteristic properties to a greater extent indicating stabilization of molecular structure. Thus, curcumin may be utilized as a therapeutic strategy to protect cellular proteins.

Keywords: Bityrosine content, conformational change, curcumin, gamma radiation, human serum albumin

Procedia PDF Downloads 126
405 CPPI Method with Conditional Floor: The Discrete Time Case

Authors: Hachmi Ben Ameur, Jean Luc Prigent

Abstract:

We propose an extension of the CPPI method, which is based on conditional floors. In this framework, we examine in particular the TIPP and margin based strategies. These methods allow keeping part of the past gains and protecting the portfolio value against future high drawdowns of the financial market. However, as for the standard CPPI method, the investor can benefit from potential market rises. To control the risk of such strategies, we introduce both Value-at-Risk (VaR) and Expected Shortfall (ES) risk measures. For each of these criteria, we show that the conditional floor must be higher than a lower bound. We illustrate these results, for a quite general ARCH type model, including the EGARCH (1,1) as a special case.

Keywords: CPPI, conditional floor, ARCH, VaR, expected ehortfall

Procedia PDF Downloads 279
404 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 401
403 Ecorium: The Ecological Project in Montevideo Uruguay

Authors: Chettou Souhaila, Soufi Omar, Roumia Mohammed Ammar

Abstract:

Protecting the environment is to preserve the survival and future of humanity. Indeed, the environment is our source of food and drinking water, the air is our source of oxygen, the climate allows our survival and biodiversity are a potential drug reservoir. Preserving the environment is, therefore, a matter of survival. The objective of this project is to familiarize the general public with environmental problems not only with the theme of environmental protection, but also with the concept of biodiversity in different ecosystems. For it, the aim of our project was to create the Ecorium which is a place that preserves many species of plants of different ecosystems, schools, malls, buildings, offices, ecological transports, gardens, and many familial activities that participated in the ecosystems development, strategic biodiversity and sustainable development.

Keywords: ecological system, ecorium, environment, sustainable development

Procedia PDF Downloads 305
402 Feasiblity of Replacing Inductive Instrument Transformers with Non-Conventional Intrument Transformers to replace

Authors: David A. Wallace, Salakjit J. Nilboworn

Abstract:

Secure and reliable transmission and distribution of electrical power is crucial in today’s ever-increasing demand for electricity. Traditional methods of protecting the electrical grid have relied on relaying systems receiving voltage and current inputs from inductive instruments transformers (IT). This method has provided robust and stable performance throughout the years. Today with the advent of new non-conventional transformers (NCIT) and sensors, the electrical landscape is changing. These new systems have to ability to provide the same electrical performance as traditional instrument transformers with the added features of data acquisition, communication, smaller footprint, lower cost and resistance to GMD/GIC events.

Keywords: non-conventional instrument transformers, digital substations, smart grids, micro-grids

Procedia PDF Downloads 55
401 A Correlational Study: Dark Triad and Self-Restraint among Criminology Students

Authors: Mary Heather Lee T. Walker, Audilon Benjamin Madamba, Mizheal Vstrechnny Vidal, Rogelio Angeles, John Rhey Banag, Lorraine Martin

Abstract:

Criminology students are the future police officers of the country that plays a major role in protecting the citizens. Their behavior must be thoroughly assessed before given a badge of responsibility. Therefore, it is important to highlight their Dark Triad that is composed of Machiavellianism, Narcissism, and Psychopathy which are considered to be controversial variables in the present while self-restraint is considered to be their way of controlling themselves especially in their line of work. The researchers used convenience and random sampling and found the respondents from a private school. Thus, the study’s aim is to determine whether there is a relationship among these variables. Machiavellianism and Psychopathy is linked to Self-Restraint except Narcissism. There are lots of factors that resulted into this.

Keywords: criminology, dark triad, self-restraint, students

Procedia PDF Downloads 255
400 Scientific Forecasting in International Relations

Authors: Djehich Mohamed Yousri

Abstract:

In this research paper, the future of international relations is believed to have an important place on the theoretical and applied levels because policy makers in the world are in dire need of such analyzes that are useful in drawing up the foreign policies of their countries, and protecting their national security from potential future threats, and in this context, The topic raised a lot of scientific controversy and intellectual debate, especially in terms of the extent of the effectiveness, accuracy, and ability of foresight methods to identify potential futures, and this is what attributed the controversy to the scientific foundations for foreseeing international relations. An arena for intellectual discussion between different thinkers in international relations belonging to different theoretical schools, which confirms to us the conceptual and implied development of prediction in order to reach the scientific level.

Keywords: foresight, forecasting, international relations, international relations theory, concept of international relations

Procedia PDF Downloads 186
399 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 449
398 Protecting the Cloud Computing Data Through the Data Backups

Authors: Abdullah Alsaeed

Abstract:

Virtualized computing and cloud computing infrastructures are no longer fuzz or marketing term. They are a core reality in today’s corporate Information Technology (IT) organizations. Hence, developing an effective and efficient methodologies for data backup and data recovery is required more than any time. The purpose of data backup and recovery techniques are to assist the organizations to strategize the business continuity and disaster recovery approaches. In order to accomplish this strategic objective, a variety of mechanism were proposed in the recent years. This research paper will explore and examine the latest techniques and solutions to provide data backup and restoration for the cloud computing platforms.

Keywords: data backup, data recovery, cloud computing, business continuity, disaster recovery, cost-effective, data encryption.

Procedia PDF Downloads 57
397 Phytoremediation; Pb, Cr and Cd Accumulation in Fruits and Leaves of Vitis Vinifera L. From Air Pollutions and Intraction between Their Uptake Based on the Distance from the Main Road

Authors: Fatemeh Mohsennezhad

Abstract:

Air pollution is one of major problems for environment. Providing healthy food and protecting water sources from pollution has been one of the concerns of human societies and decision-making centers so that protecting food from pollution, detecting sources of pollution and measuring them become important. Nutritive and political significance of grape in this area, extensive use of leaf and fruit of this plant and development of urban areas around grape gardens and construction of Tabriz – Miandoab road, which is the most important link between East and West Azarbaijan, led us to examine the impact of this road construction and urban environment pollutants such as lead chromium and cadmium on the quality of this valuable crop. First, the samples were taken from different adjacent places and medium distances from the road, each place being located exactly by Google earth and GPS. Digestion was done through burning dry material and hydrochloric acid and their ashes were analyzed by atomic absorption to determine (Pb, Cr, Cd) accumulations. In this experiments effects of 2 following factors were examined as a variable: Garden distance from the main road with levels 1: For 50 meters, 2: For 120-200 meters, 3: For above 800 meters, and plant organ with levels 1: For fruit, 2: For leaves. At the end, the results were processed by SPSS software. 3.54 ppm, the most lead quantity, was at sample No. 54 in fruits with 800 meters distance from the road and 1.00 ppm was the least lead quantity at sample No. 50 in fruits with 1000 meters from the road. In leaves, the most lead quantity was 19.16 ppm at sample No. 15 with 50 meters distance from the road and the least quantity was 1.41 ppm at sample No. 31 with 50 meters from the road. Pb uptake is significantly different at 50 meters and 200 meters distance. It means that Pb uptake near the main road is the highest. But this result is not true for others elements. Distance has not a meaningful effect on Cr uptake. The result of analysis of variation in distance and plant organ for Cd showed that between fruit and leaf, Cd uptake is significantly different. But distance and interaction between distance and plant organ is not meaningful. There is neither meaningful interaction between these elements uptakes in fruits nor in leaves. If leaves and fruits, assumed all together, showed a very meaningful integration between heavy metal accumulations. It means that each of these elements causes uptake others without considering special organs. In the tested area, it became clear that, from the accumulation of heavy metals perspective, there is no meaningful difference in existing distance between road and garden. There is a meaningful difference among heavy metals accumulation. In other words, increase ratio of one metal to another was different from the resulted differences shown in corresponding graphs. Interaction among elements and distance between garden and road was not meaningful.

Keywords: Vitis vinifera L., phytoremediation, heavy metals accumulation, lead, chromium, cadmium

Procedia PDF Downloads 326
396 Two and Three Layer Lamination of Nanofiber

Authors: Roman Knizek, Denisa Karhankova, Ludmila Fridrichova

Abstract:

For their exceptional properties nanofibers, respectively, nanofiber layers are achieving an increasingly wider range of uses. Nowadays nanofibers are used mainly in the field of air filtration where they are removing submicron particles, bacteria, and viruses. Their efficiency is not changed in time, and the power consumption is much lower than that of electrically charged filters. Nanofibers are primarily used for converting and storage of energy in both air and liquid filtration, in food and packaging, protecting the environment, but also in health care which is made possible by their newly discovered properties. However, a major problem of the nanofiber layer is practically zero abrasion resistance; it is, therefore, necessary to laminate the nanofiber layer with another suitable material. Unfortunately, lamination of nanofiber layers is a major problem since the nanofiber layer contains small pores through which it is very difficult for adhesion to pass through. Therefore, there is still only a small percentage of products with these unique fibers 5.

Keywords: nanofiber layer, nanomembrane, lamination, electrospinning

Procedia PDF Downloads 701
395 Electrospun TiO2/Nylon-6 Nanofiber Mat: Improved Hydrophilicity Properties

Authors: Roshank Haghighat, Laleh Maleknia

Abstract:

In this study, electrospun TiO2/nylon-6 nanofiber mats were successfully prepared. The nanofiber mats were characterized by SEM, FE-SEM, TEM, XRD, WCA, and EDX analyses. The results revealed that fibers in different distinct sizes (nano and subnano scale) were obtained with the electrospinning parameters. The presence of a small amount of TiO2 in nylon-6 solution was found to improve the hydrophilicity (antifouling effect), mechanical strength, antimicrobial and UV protecting ability of electrospun mats. The resultant nylon-6/TiO2 antimicrobial spider-net like composite mat with antifouling effect may be a potential candidate for future water filter applications, and its improved UV blocking ability will also make it a potential candidate for protective clothing.

Keywords: electrospinning, hydrophilicity, antimicrobial, nanocomposite, nylon-6/TiO2

Procedia PDF Downloads 324
394 International Law and Its Role in Protecting Human Rights

Authors: Yrfet Shkreli

Abstract:

To determine the content of human rights norms in national constitutions, international law - in the form of treaties, declarations and case law from international monitoring bodies, and comparative case law from other countries - is often discussed in the judgments of domestic courts. This paper explores the extent to which international law has influenced domestic human rights case law in Africa. The paper first explores how the human rights provisions of African constitutions came into being before turning to the role played by international law in the constitutional order of various African states and how treaties, declarations and findings of international monitoring bodies have been used in African countries to interpret and expand on constitutional human rights provisions.

Keywords: European Union, global governance, globalization, normative power

Procedia PDF Downloads 344
393 Challenges of Strategies for Improving Sustainability in Urban Historical Context in Developing Countries: The Case of Shiraz Bein Al-Haramein

Authors: Amir Hossein Ashari, Sedighe Erfan Manesh

Abstract:

One of the problems in developing countries is renovating the historical context and inducing behaviors appropriate to modern life to such a context. This study was conducted using field and library methods in 2012. Similar cases carried out in Iran and developing countries were compared to unveil the strengths and weaknesses of these projects. At present, in the historical context of Shiraz, the distance between two religious shrines of Shahcheragh (Ahmad ibn Musa) and Astaneh (Sayed Alaa al-Din Hossein), which are significant places in religious, cultural, social, and economic terms, is an area full of historic places called Bein Al-Haramein. Unfortunately, some of these places have been worn out and are not appropriate for common uses. The basic strategy of Bein Al-Haramein was to improve social development of Shiraz, to enhance the vitality and dynamism of the historical context of Bein Al-Haramein and to create tourist attractions in order to boost the city's economic and social stability. To this end, the project includes the huge Bein Al-Haramein Commercial Complex which is under construction now. To construct the complex, officials have decided to demolish places of historical value which can lead to irreparable consequences. Iranian urban design has always been based on three elements of bazaars, mosques and government facilities with bazaars being the organic connector of the other elements. Therefore, the best strategy in the above case is to provide for a commercial connection between the two poles. Although this strategy is included in the project, lack of attention to renovation principles in this area and complete destruction of the context will lead to its irreversible damage and will destroy its cultural and historical identity. In urban planning of this project, some important issues have been neglected including: preserving valuable buildings and special old features of the city, rebuilding worn buildings and context to attract trust and confidence of the people, developing new models according to changes, improving the structural position of old context with minimal degradation, attracting partnerships of residents and protecting their rights and finally using potential facilities of the old context. The best strategy for achieving sustainability in Bein Al-Haramein can be the one used in the distance between Santa Maria Novella and Santa Maria Del Fiore churches in historical context where while protecting the historic context and constructions, old buildings were renovated and given different commercial and service uses making them sustainable and dynamic places. Similarly, in Bein Al-Haramein, renovating old constructions and monuments and giving different commercial and other uses to them can help improve the economic and social sustainability of the area.

Keywords: Bein Al-Haramein, sustainability, historical context, historical context

Procedia PDF Downloads 417
392 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 376
391 The Need for a More Robust Legal Framework to Curb the Rise in Violence against Game Officials

Authors: A. Roomy

Abstract:

The dramatic rise in violence against game officials has affected all levels of sports including recreational, amateur, and professional sports. One way to combat this rise in violence is through the creation of laws specifically aimed at preventing and punishing this kind of violence. This paper will use related legal cases as a starting point to explore possible ways of better protecting the safety of game officials. It will do this by looking at relevant cases, related legal issues, and two specific ways of reducing violence against game officials. In closing, it will be argued that there needs to be a more robust legal approach with emphasis on criminal and civil penalties for assault and battery, and a more comprehensive social approach with emphasis on raising social awareness on the need to protect game officials from violence.

Keywords: game officials, legal issues, safety, violence

Procedia PDF Downloads 350
390 UNHCR and the International Refugee Protection: An Analysis of Its Actions in Protecting Mozambican Refugees in Malawi

Authors: Marcia Teresa Gildo

Abstract:

The United Nations High Commissioner for Refugees (UNHCR) is responsible to provide international protection and humanitarian assistance to refugees and to seek permanent solutions to their situation. To fulfil this mandate, the agency works in collaboration with its partners and governments. This paper aims to analyse the agency's actions to protect and provide assistance to Mozambican refugees in Malawi. Since July 2015, approximately 12.000 people have fled Mozambique to neighbouring Malawi due to the political-military conflict between the government of Mozambique and RENAMO (the country’s largest opposition party). This led to a series of military clashes between the two parties and the consequent flight of some Mozambicans to Malawi, in search of asylum. Most arrived from the province of Tete, in the central region of Mozambique, and, to a lesser extent, from the province of Zambezia. The asylum seekers arrived in small groups and settled in the village of Kapise in the Mwanza district of Thambani, as well as in Chikwawa and Nsanje districts in Malawi. UNHCR led an interinstitutional response action to manage the flow of Mozambican asylum seekers to Malawi. In view of these aspects and the ongoing challenge of protecting refugees and finding permanent solutions to their situation, UNHCR remains an indispensable international organization. However, there are significant gaps in the international refugee protection regime, and there have been many occasions when UNHCR has failed to fulfill its mandate. The analysis was carried out through qualitative research methods and techniques based essentially on consultation of books, newspapers and scientific articles, television and journalistic reports and interviews with the people who were involved in the process. From the data obtained, it was concluded that UNHCR worked in coordination with its partners and the government of Malawi to provide protection and emergency assistance to the refugees. However, existing funds covered only the immediate needs of refugees, more funds had to be allocated. That was made through an interinstitutional appeal. Although the funds allocated were not sufficient, they allowed the agency to protect and assist the refugees until a permanent solution was found. UNHCR also worked in coordination with the governments of Malawi and Mozambique so that a tripartite agreement was signed between the parties for the voluntary repatriation of Mozambican refugees, since security conditions were guaranteed and the refugees had expressed their willingness to return to their country of origin. UNHCR's actions to protect Mozambican refugees in Malawi have enabled humanitarian conditions to be respected and the rights of refugees to be guaranteed. Cooperation with the different actors involved in the response has allowed UNHCR to fulfil its mandate.

Keywords: assistance , cooperation, international protection, refugees

Procedia PDF Downloads 84
389 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 61
388 Managerial Risk-Taking: Evidences from the Tourism Industry

Authors: Min-Ming Wen

Abstract:

Applying the U.S. lodging and tourism industry as a research sample, we examine the relation between the corporate governance structure and managerial risk-taking behavior. In light of the global financial crisis, the importance of effective governance structures is essential in protecting claimholder interests. We propose a governance structure consisting of shareholder governance measured by anti-takeover provisions to examine whether the governance structure has a significant impact on managerial risk-taking behaviors in terms of the investment policy. We will use capital expenditure and R&D investment to measure managerial risk-taking and the firm’s investment policy. In addition, we will examine whether the effects of governance on investment policy differ significantly between speculative and investment-grade firms.

Keywords: corporate governance, risk-taking, firm value, lodging industry

Procedia PDF Downloads 590
387 Insights into the Perception of Sustainable Technology Adoption among Malaysian Small and Medium-Sized Enterprises

Authors: Majharul Talukder, Ali Quazi

Abstract:

The use of sustainable technology is being increasingly driven by the demand for saving resources, long-term cost savings, and protecting the environment. A transitional economy such as Malaysia is an example where traditional technologies are being replaced by sustainable ones. The antecedents that are driving Malaysian SMEs to integrate sustainable technology into their business operations have not been well researched. This paper addresses this gap in our knowledge through an examination of attitudes and ethics as antecedents of acceptance of sustainable technology among Malaysian SMEs. The database comprised 322 responses that were analysed using the PLS-SEM path algorithm. Results indicated that effective and altruism attitudes have high predictive ability for the usage of sustainable technology in Malaysian SMEs. This paper identifies the implications of the findings, along with the major limitations of the research and explores future areas of research in this field.

Keywords: sustainable technology, innovation management, Malaysian SMEs, organizational attitudes and ethical belief

Procedia PDF Downloads 300
386 Green Synthesis of Silver Nanoparticles Using Echinacea Flower Extract and Characterization

Authors: Masood Hussain, Erol Pehlivan, Ahmet Avci, Ecem Guder

Abstract:

Green synthesis of silver nanoparticles (AgNPs) was carried out by using echinacea flower extract as reducing/protecting agent. The effects of various operating parameters and additives on the dimensions such as stirring rate, temperature, pH of the solution, the amount of extract and concentration of silver nitrate were optimized in order to achieve monodispersed spherical and small size echinacea protected silver nanoparticles (echinacea-AgNPs) through biosynthetic method. The surface roughness and topography of synthesized metal nanoparticles were confirmed by using Atomic Force Microscopy (AFM). High-Resolution Transmission Electron Microscopic (HRTEM) results elaborated the formation of uniformly distributed Echinacea protected AgNPs (Echinacea-AgNPs) having an average size of 30.2±2nm.

Keywords: Echinacea flower extract, green synthesis, silver nanoparticles, morphology

Procedia PDF Downloads 394