Search results for: security policy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6037

Search results for: security policy

5917 Governance Question and the Participatory Policy Making: Making the Process Functional in Nigeria

Authors: Albert T. Akume, P. D. Dahida

Abstract:

This paper examines the effect of various epochs of governments on policy making in Nigeria. The character of governance and public policy making of both epochs was exclusive, non-participatory and self-centric. As a consequence the interests of citizenry were not represented, neither protected nor sought to meet fairly the needs of all groups. The introduction of the post-1999 democratic government demand that the hitherto skewed pattern of policy making cease to be a character of governance. Hence, the need for citizen participation in the policy making process. The question then is what mode is most appropriate to engender public participation so as to make the policy making process functional? Given the prevailing social, economic and political dilemmas the utilization of the direct mode of citizen participation to affect policy outcome is doubtful if not unattainable. It is due to these predicament that this paper uses the documentary research design argues for the utilization of the indirect mode of citizen participation in the policy making process so as to affect public policy outcome appropriately and with less cost, acrimony and delays.

Keywords: governance, public policy, participation, representation, civil society

Procedia PDF Downloads 342
5916 Globalization and Public Policy Analysis: A Case Study of Foreign Policy of ASEAN Member States

Authors: Nattapol Pourprasert

Abstract:

This study has an objective to analyze foreign policy of member states in globalization current, aiming to answer that the foreign policy of member states have been changed or remained the same and there are any factors affecting changing of foreign policy of the member states. From the study results, it is found that the foreign policy of Thailand is a friendly foreign policy with all states. The policy of Indonesia is more opened because of a change in leader, allowing more democratic development in the country; the government has proceeded with friendly foreign policy with the states in order to bring funds into the state. The foreign policy of Malaysia is not much changed as there is no changing in the leader; the policy of Malaysia has reconciled relations with main city of Indian and Chinese residing in the country in order to bring investments into the country and to relieve tensions in the country. The foreign policy of the Philippines has proceeded with policy under the ASEAN framework and emphasized on international Islam communities. The foreign policy of Singapore has the least changed as the Singapore's policy focuses on internal trade since the state was found. As for the foreign policy of Brunei Darussalam, Brunei has a little role in the international stage; the state having closest relationship as from the view of history is Singapore as the Singaporean has invested in retailing business in Brunei. The foreign policy of Vietnam has emphasized on an omnidirectional foreign policy in order to compete with several states in global stage. The foreign policy of Myanmar has proceeded with a friendly foreign policy with all ASEAN member states, the East-west Corridor transportation line from Myanmar through Thailand and Lao to Vietnam has been developed. As for the foreign policy of Lao, In 2001, the Thai government and Lao government held a discussion which Thailand reaffirmed the position not to support the anti-Lao group. The foreign policy of Cambodia has proceeded with more openness, having good relation with China, Russia and USA as these states has invested in the state, especially the US company.

Keywords: globalization, public policy analysis, foreign policy, ASEAN member states

Procedia PDF Downloads 490
5915 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 114
5914 21st Century Gunboat Diplomacy and Strategic Sea Areas

Authors: Mustafa Avsever

Abstract:

Throughout history, states have attached great importance to seas in terms of economic and security. Advanced civilizations have always founded in coastal regions. Over time, human being has tended to trade and naturally always aimed get more and more. Seas by covering 71% of the earth, provide the greatest economic opportunities for access to raw material resources and the world market. As a result, seas have become the most important areas of conflict over the course of time. Coastal states, use seas as a tool for defense zone, trade, marine transportation and power transfer, they have acquired colonies overseas and increased their capital, raw materials and labor. Societies, have increased their economic prosperity, though their navies in order to retain their welfare and achieve their foreign policy objectives. Sometimes they have imposed their demands through the use or threat of limited naval force in accordance with their interests that is gunboat diplomacy. Today we can see samples of gunboat diplomacy used in the Eastern Mediterranean, during Ukraine crisis, in dispute between North Korea and South Korea and the ongoing power struggle in Asia-Pacific. Gunboat diplomacy has been and continues to be applied consistently in solving problems by the stronger side of the problem. The purpose of this article is to examine using navy under the gunboat diplomacy as an active instrument of foreign policy and security policy and reveal the strategic sea areas in which gunboat diplomacy is used effectively in the matrix of international politics in the 21st century.

Keywords: gunboat diplomacy, maritime strategy, sea power, strategic sea lands

Procedia PDF Downloads 410
5913 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 147
5912 The Appropriation of Education Policy on Information and Communication Technology in South African Schools

Authors: T. Vandeyar

Abstract:

The purpose of this study is to explore how Government policy on ICT influences teaching and learning in South African schools. An instrumental case study using backward mapping principles as a strategy of inquiry was used. Utilizing a social constructivist lens and guided by a theoretical framework of a sociocultural approach to policy analysis, this exploratory qualitative research study set out to investigate how teachers appropriate government policy on ICT in South African schools. Three major findings emanated from this study. First, although teachers were ignorant of the national e-education policy their professionalism and agency were key in formulating and implementing an e-education policy in practice. Second, teachers repositioned themselves not as recipients or reactors of the e-education policy but as social and cultural actors of policy appropriation and formulation. Third, the lack of systemic support to teachers catalyzed improved school and teacher collaborations, teachers became drivers of ICT integration through collaboration, innovation, institutional practice and institutional leadership.

Keywords: ICT, teachers as change agents, practice as policy, teacher's beliefs, teacher's attitudes

Procedia PDF Downloads 447
5911 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 397
5910 [Keynote Talk]: Quest for Sustainability in the Midst of Conflict Between Climate and Energy Security

Authors: Deepak L. Waikar

Abstract:

Unprecedented natural as well as human made disasters have been responsible for loss of hundreds of thousands of lives, injury & displacement of millions of people and damages in billions of dollars in various parts of the world. Scientists, experts, associations and united nation have been warning about colossal disregard for human safety and environment in exploiting natural resources for insatiable greed for economic growth and rising lavish life style of the rich. Usual blame game is routinely played at international forums & summits by vested interests in developing and developed nations, while billions of people continue to suffer in abject energy poverty. Energy security, on the other hand, is becoming illusive with the dominance of few players in the market, poor energy governance mechanisms, volatile prices and geopolitical conflicts in supply chain. Conflicting scenarios have been cited as one of the major barriers for transformation to a low carbon economy. Policy makers, researchers, academics, businesses, industries and communities have been evaluating sustainable alternatives, albeit at snail’s pace. This presentation focuses on technologies, energy governance, policies & practices, economics and public concerns about safe, prudent & sustainable harnessing of energy resources. Current trends and potential research & development projects in power & energy sectors which students can undertake will be discussed. Speaker will highlight on how youths can be engaged in meaningful, safe, enriching, inspiring and value added self-development programmes in our quest for sustainability in the midst of conflict between climate and energy security.

Keywords: clean energy, energy policy, energy security, sustainable energy

Procedia PDF Downloads 462
5909 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 367
5908 An Architectural Model for APT Detection

Authors: Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung

Abstract:

Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future.

Keywords: advanced persistent threat, anomaly detection, data mining

Procedia PDF Downloads 495
5907 The Construction of Women’s Leadership in the Swedish Armed Forces in the Context of the Women, Peace and Security Agenda

Authors: Sofia Sutera

Abstract:

Despite the introduction of the Women, Peace, and Security (WPS) Agenda in 2000, thanks to the UNSCR 1325 and subsequent resolutions, and the clear stance of the UN towards the support of increased participation of women in peace and security processes, women’s leadership in this context remains very low. Considering specifically the framework of peacekeeping operations, the aim of this paper is to analyze the way women’s leadership is constructed in the Swedish Armed Forces (SAF). In the context of the WPS Agenda, Sweden has been chosen as a case study because of the relevance of its singular feminist policies (the statement in 2014 from Wallström, previous and current Minister for Foreign Affairs and Deputy Prime Minister, that Sweden is pursuing a feminist foreign policy is a clear example). Moreover, the SAF adopted in 2016 the Handbok Gender. This policy addresses explicitly the gender perspective embraced by the Swedish military institution, a sui-generis organization even in the Scandinavian reality. Indeed, the SAF has assumed a clear commitment to represent its institution as gender aware and gender equal. The theoretical perspective utilized in this research, which focuses specifically on women, is feminism and particularly a feminist constructivist approach, with an institutional focus on the military institution, has been chosen. Taking into account the specificity of the feminist research, the above-mentioned gender policy has been examined by means of a critical discourse analysis (CDA) whose main aim is to investigate the social structures of discourse and the power relationships inherent to it. Thus, CDA appears to be quite relevant in order to understand the construction of women’s leadership in the Handbok Gender. Nevertheless, even in a country which officially identifies as feminist and which is characterized by a peculiar military institution, the conclusions of this analysis revealed that women’s leadership in peacekeeping operations remains very low.

Keywords: feminism, peacekeeping operations, swedish armed forces, UNSCR 1325, women's leadership, WPS agenda

Procedia PDF Downloads 109
5906 A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War

Authors: Yuhong Li, Luyu Mao

Abstract:

Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions.

Keywords: disembedding mechanism, bosnia war, the russian-ukrainian war, british security strategy

Procedia PDF Downloads 51
5905 Public and Private Domains: Contradictions and Covenants in Evolution of Game Policy

Authors: Mingzhu Lyu, Runlei Ren, Xinyu Dai, Jiaxuan Pi, Kanghua Li

Abstract:

The study of video game policy in China has been divided into two branches: "pedagogy" and "game industry". The binary perspective of policy reveals the "contradictory" side of policy performance. Based on this suspicion, this paper constructs a three-dimensional sequence of time, content and institutions of game policy, and establishes the "contradictory" aspects of policy performance between 1949 and 2019. A central-level database of game policies, clarifying that our game policies follow a shift from reactive response to proactive guidance, stigmatization and de-stigmatization, the evolutionary logic. The study found that the central government has always maintained a strict requirement and prudent guidance for game policy, and the deep contradictions in game policy stem from the essential conflict between the natural amusement of games and the seriousness of the educational system, and the Chinese government's use of the understanding of the public and private domains and the Managing of the conflict.

Keywords: game industry, gaming policy, public domain, private domain

Procedia PDF Downloads 119
5904 The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit

Authors: Yllka Hysaj, Ylberina Hysaj Arifi

Abstract:

Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security.

Keywords: migration, self-initiated expatriates, Brexit, job security

Procedia PDF Downloads 141
5903 The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure

Authors: Michaela Vašková

Abstract:

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic.

Keywords: crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event

Procedia PDF Downloads 403
5902 Redefining State Security Using Gender: Case Study of the United States of America Post-Cold War

Authors: E. K. Linsenmayer

Abstract:

Traditional international relations theorists define state security, the principal national interest, as a state’s military force. However, many political theorists argue the current definition of security is not comprehensive and therefore, problematic. This paper argues that women’s physical security is not only linked but also necessary to achieve state security. In today’s unipolar political international system, the United States continues to accredit national security to its military. However, in one of the most militarized countries, women remain insecure. Through a case study method of the United States, this paper illuminates a necessary political prescription: the empowerment of women through an inside-out, feminist theoretical approach that makes state security attainable. The research through empirical testing, drawing from several databases, shows the positive effects of women’s physical security on state security. Women’s physical security is defined in terms of equal legal practices, health, education, and female representation in the government. State security is measured by the relative peace of a state, its involvement in conflict and a state’s relations with neighboring states. This paper shows that empowering women, 50% of the world’s population, is necessary for ending the current vicious circle of militarization, war, and insecurity. Without undoing gender power dynamics at the individual and societal level, security at all levels remains unattainable.

Keywords: gender inequality, politics, state security, women's security

Procedia PDF Downloads 179
5901 A Model of Human Security: A Comparison of Vulnerabilities and Timespace

Authors: Anders Troedsson

Abstract:

For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.

Keywords: human security, timespace, vulnerabilities, risk perception

Procedia PDF Downloads 302
5900 English Title Adaptive Comparison of Outdoor and Indoor Social Security in Damaged Area and New Residential Complex with Two-Way Anova Case Study: Qasr-Al-Dasht and Moalem District in Shiraz

Authors: Homa Parmoon, Narges Hamzeh

Abstract:

Since today's urban spaces are disposed towards behavioral disorders and lack of security, both qualitative and quantitative aspects of security especially social and physical security are considered as basic necessities in urban planning. This research focused on the variable of place of living, examined social security in the old and new textures, and investigated the amount of residents’ social security in Shiraz including safety, financial, emotional and moral security. To this end, two neighborhoods in region 1 of Shiraz- Qasr-Al-Dasht (old texture) and Moalem (new texture)- were examined through a comparative study of 60 samples lived in two neighborhoods. Data were gathered through two-way ANOVA between the variables of residential context and internal and external security. This analysis represents the significance or insignificance of the model as well as the individual effects of each independent variable on the dependent variable. It was tested by ANCOVA and F-test. Research findings indicated place of living has a significant effect on families’ social security. The safety, financial, emotional, and moral security also represented a great impact on social security. As a result, it can be concluded that social security changes with the changing in place of living.

Keywords: social security, damaged area, two-way ANOVA, Shiraz

Procedia PDF Downloads 110
5899 Reform of the Law Relating to Personal Property Security

Authors: Ji Lian Yap

Abstract:

This paper will critically consider developments in 2014 in relation to the law relating to security over personal property in Hong Kong. The rules governing the registration of charges under the Hong Kong Companies Ordinance will be examined. Case law relating to personal property security will also be discussed. The transplantation of the floating charge into China’s Property Law will also be considered.

Keywords: personal property, security law, reform of the law, law

Procedia PDF Downloads 395
5898 Safety-Security Co-Engineering of Control Systems

Authors: Elena A. Troubitsyna

Abstract:

Designers of modern safety-critical control systems are increasingly relying on networking to provide the systems with advanced functionality and satisfy customer’s needs. However, networking nature of modern control systems also brings new technological challenges associated with ensuring system safety in the presence of openness and hence, potential security threats. In this paper, we propose a methodology that relies on systems-theoretic analysis to enable an integrated analysis of safety and security requirements of controlling software. We demonstrate how to create a safety case – a structured argument about system safety – with explicit representation of both safety and security goals. Our approach provides the designers with a systematic approach to analysing safety and security interdependencies while designing safety-critical control systems.

Keywords: controlling software, integrated analysis, security, safety-security co-engineering

Procedia PDF Downloads 466
5897 Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace

Authors: Da Eun Sung

Abstract:

In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged.

Keywords: cyber security, cyber security strategic, international relation in cyberspace, Russia

Procedia PDF Downloads 274
5896 Resource Allocation Modeling and Simulation in Border Security Application

Authors: Kai Jin, Hua Li, Qing Song

Abstract:

Homeland security and border safety is an issue for any country. This paper takes the border security of US as an example to discuss the usage and efficiency of simulation tools in the homeland security application. In this study, available resources and different illegal infiltration parameters are defined, including their individual behavior and objective, in order to develop a model that describes border patrol system. A simulation model is created in Arena. This simulation model is used to study the dynamic activities in the border security. Possible factors that may affect the effectiveness of the border patrol system are proposed. Individual and factorial analysis of these factors is conducted and some suggestions are made.

Keywords: resource optimization, simulation, modeling, border security

Procedia PDF Downloads 485
5895 SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud

Authors: Somayeh Sobati Moghadam

Abstract:

Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.

Keywords: BPMN, security threats, cloud computing, business processes outsourcing, privacy

Procedia PDF Downloads 240
5894 Critical Literature Survey of the Macroeconomic Effects of Fiscal Policy in Light of Recent Empirical Evidence

Authors: Walaa W. Diab

Abstract:

The present paper offers a fundamental critique of the macroeconomic effects of fiscal policy after it surveys the theoretical and empirical literature on the macroeconomic effects of fiscal policy. It emphasizes the importance of the fiscal policy after reviewing the revolution of almost all economic schools and bringing them in one summarized figure; the paper links the developmental role of the fiscal policy with the objectives and measures of the economic transformation. Thus, the importance of this study can be seen from several perspectives: First, it reviews the theoretical harvest of fiscal policy and provides a comparison between the main revolutionary Economic thoughts; the classical school, Keynesian school, and monetarist school. Then it turns to conclude the fiscal policy from the new consensus mainstream economic schools. Finally, the study presents grouped and classified empirical pieces of evidence as it divides those empirical studies into two groups; the first for developed economies and the second for developing ones. So the study is important also for the policymakers as well as scholars as it gives its recommendations upon the last analysis in the form of ‘policy implications’. The paper also presents a deeper look into the evaluation approaches of the macroeconomic effects of fiscal policy at the empirical level. Thus it is useful for both researchers and decision makers.

Keywords: economic transformation, fiscal policy, macroeconomic effects, public spending

Procedia PDF Downloads 272
5893 Psychological Security and Its Relationship with Self-Esteem among Adolescent with Mild Intellectual Disability

Authors: Muneera Abdul Haleem Bukhari, Maryam I. Alshirawi, Elsayed S. Elkhamisi

Abstract:

This study aimed at understanding the relationship between psychological security and self-esteem among Adolescent with Mild Intellectual Disability, exploring the levels of psychological security and self-esteem, as well as determining the differences between genders in psychological security and self-esteem. The sample of the study contained (60) Adolescent with Mild Intellectual Disability, (34) males and (26) females who are enrolled in the Vocational and Social Rehabilitation Center and Hope Institute in the Kingdom of Bahrain. Their ages are between (15-23) years old. The Psychological Security Scale and self-Esteem Scale (prepared by James Battle) were used by the researcher. Results showed that levels of psychological security and self-esteem among Adolescents with Mild Intellectual Disability was above average; results also showed the order of the psychological security dimensions in the following manner (future outlook – mood - family security – social security) and the order of the dimensions of self-esteem in the following manner (social self-esteem – personal self-esteem – general self-esteem) among Adolescent with Mild Intellectual Disability; as for the differences between genders, the study showed that there was an increased level of psychological security among males. However, there was no difference in self-esteem between both sexes.

Keywords: psychological security, self-esteem, adolescent, intellectual disability, the Kingdom of Bahrain

Procedia PDF Downloads 359
5892 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students

Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah

Abstract:

Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.

Keywords: obesity, food security, body image, self-esteem

Procedia PDF Downloads 46
5891 Cash Management and the Impact of Cashless Policy in a Developing Nation: Nigeria as a Case Study

Authors: Ossai Paulinus Edwin

Abstract:

Cash Management is a broad area having to do with the collection, concentration, and disbursement of cash including measuring the level of liquidity and managing the cash balance and short-Term Investments. Cash Management involves the efficient collection and disbursement of cash and cash equivalents. It also includes management of marketable securities because, in modern Terminology, money comprises marketable securities and actual cash in hand or in a bank. This cash management is concerned with management of cash inflow and cash outflow of a business especially as it concerns a developing nation like Nigeria. The paper throws light on the impact of cashless policy in Nigeria as it was introduced by the Central Bank of Nigeria (CBN) in December 2011 and was kick-started in Lagos in January 2012. Survey research was adopted with the questionnaires as data collection instrument. Responses show that cashless policy if adopted generally shall increase employment opportunities, reduce cash related robbery thereby reducing risk of carrying cash; it shall also reduce cash related corruption and attract more foreign investors to the country. It is expected that the introduction of cashless policy in Nigeria is a step in the right direction as it shall bring about modernization of Nigeria payment system, reduction in the cost of banking services, reduction in high security and safety risk and also curb banking related corruptions.

Keywords: cashless economy, cash management, cashless policy, e-banking, Nigeria

Procedia PDF Downloads 500
5890 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia

Authors: Logan Carmichael

Abstract:

As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.

Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis

Procedia PDF Downloads 85
5889 Beijing Xicheng District Housing Price Econometric Analysis: “Multi-School Zoning”Policy

Authors: Haoxue Cui, Sirui Zhang, Shanshan Gao, Weiyi Zhang, Lantian Wang, Xuanwen Zheng

Abstract:

The 2020 "multi-school zoning" policy makes students ineligible for direct attendance in their district. To study whether the housing price trend of the school district is affected by the policy, This paper studies housing prices based on the school district division in Xicheng District, Beijing. In this paper, we collected housing prices and the basic situation of communities from "Anjuke", which were divided into two periods of 15 months before and after the 731 policy in the Xicheng District, Beijing. Then we used DID model and time fixed effect to investigate the DIFFERENTIAL statistics, that is, the overall net impact of the policy. The results show that the coefficient is negative at a certain statistical level. It indicates that the housing prices of school districts in the Xicheng district decreased after the "multi-school zoning" policy, which shows that the policy has effectively reduced the housing price of school districts in the Xicheng District and laid a foundation for the "double reduction" policy in 2022.

Keywords: “multi-school zoning”policy, DID, time fixed effect, housing prices

Procedia PDF Downloads 115
5888 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture

Authors: Wiriranai Brilliant Masara

Abstract:

The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.

Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund

Procedia PDF Downloads 103