Search results for: transnational security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2788

Search results for: transnational security

2758 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 49
2757 The Impact of Undocumented Migration on Human Security in Northern Nigeria

Authors: Targba Aondowase

Abstract:

Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.

Keywords: human security, impact, migration, undocumented

Procedia PDF Downloads 308
2756 Infernal Affairs (Hong Kong) versus Double Face (Japan): Remaking and Context

Authors: Roman Kusaiko

Abstract:

For decades, remaking was one of the film industry’s main practices but has become vivid in recent years. The latest geopolitical developments, though, are becoming a new challenge for filmmakers regarding cultural landscapes and contextual differences. Deglobalization may also affect transnational remaking practices. Thus, these upcoming challenges can be addressed through the analysis of contemporary academic thought, primarily from adaptation and film studies and their understanding of the issues of transmediality and how it affects film remaking. However, the analysis would be insufficient without conducting case studies. This paper is part of broader research about transnational remaking practices and their cultural and contextual specifics. This paper aims to understand whether shifting medium affects remaking as a critical category and present case studies of the popular Hong Kong motion picture Infernal Affairs and its transition into the Japanese remake Double Face. Consequently, the analysis of their contextual distinctions will lead to the correct categorization of the transnational remakes allowing scholars and filmmakers to better understand the existing remaking practices and whether they affect the final result.

Keywords: cinema, context, culture, films, remaking, transmediality

Procedia PDF Downloads 66
2755 The Role of KontraS as Track-6 on Multi Track Diplomacy for Conflict Resolution: Case Study Human Rights Crisis in Myanmar in 2015

Authors: Hardi Alunaza, Mauidhotu Rofiq

Abstract:

This research is attempted to describe the role of KontraS as track-6 on multi track diplomacy for conflict resolution in Myanmar in 2015. The researcher took the specific interest on multi track diplomacy and transnational advocacy concepts to analyze the phenomena. Furthermore, this essay is using the descriptive method with a qualitative approach. The data collection technique is literature study consisting of books, journals, and including data from the reliable website in supporting the explanation of this research. The result of this research is divided into two important points in explaining the role of KontraS in cases of human rights crisis in Myanmar. First, KontraS as human rights NGO in Indonesia was able to advocate against human rights violence that occurred in other countries by encouraging Indonesian Government to take part in the resolution of human rights issues affecting the Rohingya people in Burma. Also, KontraS take advantages of transnational advocacy networks as a form of politics and accountabilities responsibility of Non-Governmental Organization against human rights crisis in other countries.

Keywords: conflict resolution, human rights crisis, multi track diplomacy, transnational advocacy

Procedia PDF Downloads 285
2754 Corporate Social Responsibility: An Ethical or a Legal Framework?

Authors: Pouira Askary

Abstract:

Indeed, in our globalized world which is facing with various international crises, the transnational corporations and other business enterprises have the capacity to foster economic well-being, development, technological improvement and wealth, as well as causing adverse impacts on human rights. The UN Human Rights Council declared that although the primary responsibility to protect human rights lie with the State but the transnational corporations and other business enterprises have also a responsibility to respect and protect human rights in the framework of corporate social responsibility. In 2011, the Human Rights Council endorsed the Guiding Principles on Business and Human Rights, a set of guidelines that define the key duties and responsibilities of States and business enterprises with regard to business-related human rights abuses. In UN’s view, the Guiding Principles do not create new legal obligations but constitute a clarification of the implications of existing standards, including under international human rights law. In 2014 the UN Human Rights Council decided to establish a working group on transnational corporations and other business enterprises whose mandate shall be to elaborate an international legally binding instrument to regulate, in international human rights law, the activities of transnational corporations and other business enterprises. Extremely difficult task for the working group to codify a legally binding document to regulate the behavior of corporations on the basis of the norms of international law! Concentration of this paper is on the origins of those human rights applicable on business enterprises. The research will discuss that the social and ethical roots of the CSR are much more institutionalized and elaborated than the legal roots. Therefore, the first step is to determine whether and to what extent corporations, do have an ethical responsibility to respect human rights and if so, by which means this ethical and social responsibility is convertible to legal commitments.

Keywords: CSR, ethics, international law, human rights, development, sustainable business

Procedia PDF Downloads 348
2753 Understanding Europe’s Role in the Area of Liberty, Security, and Justice as an International Actor

Authors: Barrere Sarah

Abstract:

The area of liberty, security, and justice within the European Union is still a work in progress. No one can deny that the EU struggles between a monistic and a dualist approach. The aim of our essay is to first review how the European law is perceived by the rest of the international scene. It will then discuss two main mechanisms at play: the interpretation of larger international treaties and the penal mechanisms of European law. Finally, it will help us understand the role of a penal Europe on the international scene with concrete examples. Special attention will be paid to cases that deal with fundamental rights as they represent an interesting case study in Europe and in the rest of the World. It could illustrate the aforementioned duality currently present in the Union’s interpretation of international public law. On the other hand, it will explore some specific European penal mechanism through mutual recognition and the European arrest warrant in the transnational criminality frame. Concerning the interpretation of the treaties, it will first, underline the ambiguity and the general nature of some treaties that leave the EU exposed to tension and misunderstanding then it will review the validity of an EU act (whether or not it is compatible with the rules of International law). Finally, it will focus on the most complete manifestation of liberty, security and justice through the principle of mutual recognition. Used initially in commercial matters, it has become “the cornerstone” of European construction. It will see how it is applied in judicial decisions (its main event and achieving success is via the European arrest warrant) and how European member states have managed to develop this cooperation.

Keywords: European penal law, international scene, liberty security and justice area, mutual recognition

Procedia PDF Downloads 375
2752 Navigating through Uncertainty: An Explorative Study of Managers’ Experiences in China-foreign Cooperative Higher Education

Authors: Qian Wang, Haibo Gu

Abstract:

To drive practical interpretations and applications of various policies in building the transnational education joint-ventures, middle managers learn to navigate through uncertainties and ambiguities. However, the current literature views very little about those middle managers’ experiences, perceptions, and practices. This paper takes the empirical approach and aims to uncover the middle managers’ experiences by conducting interviews, campus visits, and document analysis. Following the qualitative research method approach, the researchers gathered information from a mixture of fourteen foreign and Chinese managers. Their perceptions of the China-foreign cooperation in higher education and their perceived roles have offered important, valuable insights to this group of people’s attitudes and management performances. The diverse cultural and demographic backgrounds contributed to the significance of the study. There are four key findings. One, middle managers’ immediate micro-contexts and individual attitudes are the top two influential factors in managers’ performances. Two, the foreign middle managers showed a stronger sense of self-identity in risk-taking. Three, the Chinese middle managers preferred to see difficulties as part of their assigned responsibilities. Four, middle managers in independent universities demonstrated a stronger sense of belonging and fewer frustrations than middle managers in secondary institutes. The researchers propose that training for managers in a transnational educational setting should consider these discoveries when select fitting topics and content. In particular, middle managers should be better prepared to anticipate their everyday jobs in the micro-environment; hence, information concerning sponsor organizations’ working culture is as essential as knowing the national and local regulations, and socio-culture. Different case studies can help the managers to recognize and celebrate the diversity in transnational education. Situational stories can help them to become aware of the diverse and wide range of work contexts so that they will not feel to be left alone when facing challenges without relevant previous experience or training. Though this research is a case study based in the Chinese transnational higher education setting, the implications could be relevant and comparable to other transnational higher education situations and help to continue expanding the potential applications in this field.

Keywords: educational management, middle manager performance, transnational higher education

Procedia PDF Downloads 129
2751 A Bridge to Success: Building Academic Identity in Foundation Programs

Authors: Krystyna Golkowska

Abstract:

Recent years have witnessed rapid growth of Transnational Education (TNE), especially in Asia and the Middle East. Exporting North American curricula into different socio-cultural contexts brings with it numerous advantages as well as challenges that have yet to be fully explored. This article focuses on Foundation programs, bridge programs between local high schools and tertiary level education on North-American branch campuses in the Persian Gulf. Based on a case study of Foundation students in Qatar, it explores ways of preparing TNE students for academic success by helping them to develop not only their skills and subject knowledge but also their academic identity.

Keywords: academic identity, foundation program, gulf, transnational education

Procedia PDF Downloads 291
2750 The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory

Authors: Ari S. Prabowo, Nia Febriyanti, Haryono B. Santosa

Abstract:

Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions.

Keywords: laboratory, physical protection system, security culture, security function

Procedia PDF Downloads 145
2749 Blockchain Solutions for IoT Challenges: Overview

Authors: Amir Ali Fatoorchi

Abstract:

Regardless of the advantage of LoT devices, they have limitations like storage, compute, and security problems. In recent years, a lot of Blockchain-based research in IoT published and presented. In this paper, we present the Security issues of LoT. IoT has three levels of security issues: Low-level, Intermediate-level, and High-level. We survey and compare blockchain-based solutions for high-level security issues and show how the underlying technology of bitcoin and Ethereum could solve IoT problems.

Keywords: Blockchain, security, data security, IoT

Procedia PDF Downloads 178
2748 Transnational Initiatives, Local Perspectives: The Potential of Australia-Asia BRIDGE School Partnerships Project to Support Teacher Professional Development in India

Authors: Atiya Khan

Abstract:

Recent research on the condition of school education in India has reaffirmed the importance of quality teacher professional development, especially in light of the rapid changes in teaching methods, learning theories, curriculum, and major shifts in information and technology that education systems are experiencing around the world. However, the quality of programs of teacher professional development in India is often uneven, in some cases non-existing. The educational authorities in India have long recognized this and have developed a range of programs to assist in-service teacher education. But, these programs have been mostly inadequate at improving the quality of teachers in India. Policy literature and reports indicate that the unevenness of these programs and more generally the lack of quality teacher professional development in India are due to factors such as a large number of teachers, budgetary constraints, top-down decision making, teacher overload, lack of infrastructure, and little or no follow-up. The disparity between the government stated goals for quality teacher professional development in India and its inability to meet the learning needs of teachers suggests that new interventions are needed. The realization that globalization has brought about an increase in the social, cultural, political and economic interconnectedness between countries has also given rise to transnational opportunities for education systems, such as India’s, aiming to build their capacity to support teacher professional development. Moreover, new developments in communication technologies seem to present a plausible means of achieving high-quality professional development for teachers through the creation of social learning spaces, such as transnational learning networks. This case study investigates the potential of one such transnational learning network to support the quality of teacher professional development in India, namely the Australia-Asia BRIDGE School Partnerships Project. It explores the participation of some fifteen teachers and their principals from BRIDGE participating schools in Delhi region of India; focusing on their professional development expectations from the BRIDGE program and account for their experiences in the program, in order to determine the program’s potential for the professional development of teachers in this study.

Keywords: case study, Australia-Asia BRIDGE Project, teacher professional development, transnational learning networks

Procedia PDF Downloads 236
2747 Children and Parents Left behind in Transnational Families: The Problem of Care Deficit

Authors: Joanna Bielecka-Prus

Abstract:

In the view of increasing number of labour migrations associated with broadly understood economic crisis, many families experience migration separation. Currently, in the era of globalization, migration movements include an increasing number of families, more and more frequently a new type of family, a transnational family. Accordingly, the functions of the family, family practice of care, and the relationships between members of the group change especially in the case of female migration. Sociologists highlight the emotional aspects of migrants’ family lives: managing emotions, coping with guilt, loneliness and rejection. Not without significance is the fact that today's public discourse often represents migrant women in a negative light. On the one hand, consumption and expanding material resources are assessed positively, on the other hand, deficits emotional and devastation of family life in the transnational families appear. Opinions expressed by different environments: the media, the political environment, etc. do not always take into account the context of mobility and their different effects on family life. The paper will present the analysis of qualitative studies of Polish female migrants’ families left-behind (children, parents, caregivers N = 100) and their coping strategies in different situations in the event of migration separation. The main area of care deficit will be defined and it will be showed who and how help to solve the problems.

Keywords: care, children left behind, female migration, parents left behind

Procedia PDF Downloads 361
2746 COVID-19: A Thread to the Security System of Foreign Investment

Authors: Mehdi Ghaemi

Abstract:

In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.

Keywords: foreign investment, FPS standard, host country, public health, COVID-19

Procedia PDF Downloads 72
2745 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 452
2744 Connected Female Sufi Disciples: The Workings of Social Online Communities in a Transnational Sufi Order

Authors: Sarah Hebbouch

Abstract:

Two decades ago, research on diasporic women’s participation within Sufi circles would have been inconceivable, not only because of a general lack of recognition of their contribution to Sufism but due to the intimacy of the rituals, often taking place in confined spaces, like zawiyas (Sufi lodges). Recent scholarly attention to female spiritual experience owes to a digital awareness and interest in exploring diasporic community reproduction of those experiences. Within a context where female disciples of a Sufi convent undergo a physical separation from the saint’s sanctuary -because of immigration from the homeland to the host country- technology becomes a social hub accounting for Sufis’ ritual commitment and preservation of cultural capital in the diaspora. This paper elucidates how female Sufi immigrants affiliating with the Boudchichi brotherhood (Morocco-based) maintain ‘a relational network’ and strong social online relationships with their female compatriots in Morocco through the use of online platforms. Sufi communities living in the diaspora find the internet an open interactive space that serves to kindle their distance of spiritual participation and corroborate their transnational belonging. The current paper explores the implications of the use of a digital baseline named “Tariqa Info,” the convent’s digital online platform, and how it mediates everyday ritual performance, the promotion of digital connection, and the communication of ideas and discourses. Such a platform serves the bolstering emotional bonds for transnational female disciples and inclusion within online communities in the homeland. Assisted by an ethnographic lens, this paper discusses the research findings of participatory field observation of Sufi women’s online communities, informed by the need to trace the many ostensible aspects of interconnectedness and divergences.

Keywords: digital connection, Sufi convent, social online relationship, transnational female disciples

Procedia PDF Downloads 60
2743 Security Architecture for Cloud Networking: A Survey

Authors: Vishnu Pratap Singh Kirar

Abstract:

In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.

Keywords: cloud computing, cloud networking, IaaS, PaaS, SaaS, cloud security

Procedia PDF Downloads 499
2742 Islamic Social Security: A Discourse

Authors: Safiyya A. Abba, Shehu U. R. Aliyu

Abstract:

This paper deals with Islamic social security: a discourse explores the meaning and nature of Islamic social security system. The paper reviews the social security framework and operations during the early period. The paper further identifies the instruments of Islamic social security discusses its principles and objectives. The paper discovers that Islamic social security is a personification of a comprehensive welfare approach in view of its varied instruments that are deeply rooted in the Islamic law, unique principles and realistic and achievable objectives. Furthermore, the Islamic social security system has far reaching socioeconomic implications; social justice, cohesion, equity, a catalyst for poverty eradication, income redistribution, economic growth and development.

Keywords: Islamic social security, basic needs, zakat, socioeconomic justice, equity

Procedia PDF Downloads 403
2741 Fan-Subbing in East Asia: Audience Involvement in Transnational Media Flows

Authors: Jason D. Lin, Christine Sim

Abstract:

This paper examines the nature of transnational media flows in East Asia, specifically expounding on the popularity of Korean dramas in China and Taiwan. Situated in interdisciplinary academic work from cultural studies, media studies, and linguistics, this project locates the significance of certain genres and regions in determining why some are subject to flow while others remain within domestic borders. Moreover, transnational flows can take one of two routes –official translations and adaptations by media corporations and subtitles written by fans in online communities. The work of 'fan-subbing' has allowed for a more democratized showcase of what bilingual fans consume and are invested in sharing, rather than what major media companies deem relevant and monetizable. This reflects a culture of relatability driven by audiences rather than by corporate direction. Of course, a variety of technological, political, and economic factors play imperative roles in how both professional and fan-made subtitles flowed across borders and between nations. While fan-subbed media may be subject to criticism because of a lack of formal regulation, these limitations can, in some cases, be overcome by the agency afforded to audiences in the digital landscape. Finally, this paper offers a critical lens for deliberating the lasting impact of fan involvement on both professional practices and the flows of mainstream media throughout East Asia.

Keywords: audience studies, bilingual, cultural proximity, fan-subbing, online communities, subtitles

Procedia PDF Downloads 95
2740 Tenure Security, Agricultural Diversity and Food Security

Authors: Amanuel Hadera Gebreyesus

Abstract:

In the literature, the study of tenure and food security has largely involved separate lines of inquiry. In effect, the nexus among these has received little attention; and the underinvestment in research related to the relationship between tenure and food security deters generation of tenure-related knowledge and policy guidance for improving food and nutrition security. Drawing from this motivation, we study the relationship among tenure security, agricultural diversity and food security and dietary diversity. We employ IV approaches to examine the effect of tenure security and agricultural diversity on food security and dietary diversity. We find tenure security is inversely related with food insecurity as shown by its negative association with hunger scale, hunger index and hunger category. On the other hand, results suggest that tenure security improves minimum dietary diversity of women while we find no association with child dietary diversity. Moreover, agricultural diversity is positively related with minimum dietary diversity of women, which may point to higher accessibility and consumption of dietary food groups by women. Also, findings suggest that farmers use their human (knowledge and skills) and resource (land) endowments to improve food security and dietary diversity. An implication from this is the importance of not only improving access to land but also long-term tenure security to promote agricultural diversity, food security and dietary diversity.

Keywords: tenure security, food security, agricultural diversity, dietary diversity, women

Procedia PDF Downloads 162
2739 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 454
2738 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 547
2737 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 397
2736 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 668
2735 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations

Authors: Pratyush Vatsala, Sanjay Ahuja

Abstract:

The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.

Keywords: Kashmir, Mizoram, security, value, human right

Procedia PDF Downloads 247
2734 The Research of Weights Identify of Harbin Ecological Security Evaluation Index Based on AHP

Authors: Rong Guo, Mengshi Huang, Yujing Bai

Abstract:

With the rapid development of urbanization, the urban population increases and urban sprawl appeared. And these issues led to a sharp deterioration of the ecological environment. So, the urban ecological security evaluation was imminent. The weights identify of index was a key step of the research of ecological security evaluation. The AHP was widely used in the extensive research of weights identify of ecological security index. The characteristics of authority and quantitative can fully reflect the views of relevant experts. On the basis of building the ecological security evaluation index of Harbin, the paper combed and used the basic principle of the AHP, and calculated the weights of Harbin ecological security evaluation index through the process of the expert opinions “summary-feedback-summary”. And lay a foundation of future study of Harbin ecological security index, and guide the quantitative evaluation of Harbin ecological security.

Keywords: AHP, ecological security, evaluation Index, weights identify, harbin

Procedia PDF Downloads 466
2733 Learnings From Sri Lanka: Theorizing of Grassroots Women’s Participation in NGO Peacebuilding Activism Against Transnational and Third-World Feminist Perspectives

Authors: Piumi L. Denagamage, Vibusha Madanayake

Abstract:

At the end of a 30-year civil war in Sri Lanka in 2009, Non-Governmental Organizations (NGOs) played a prominent role in post-war development and peacebuilding. Women were a major “beneficiary” of NGO activities on socio-economic empowerment, capacity building for advocacy, and grassroots participation in activism. Undoubtedly, their contribution to Sri Lanka’s post-war transition is tremendous. As development practitioners and researchers who have worked closely with several international and national NGOs in Sri Lanka’s post-war setting, the authors, while practicing self-reflexivity, intend to theorize the grey literature prepared by NGOs against the theoretical frameworks of Transnational and Third World feminisms. Using examples of the grassroots activities conducted by the NGOs with war-affected women, the paper questions whether Colombo-based feminism represents the lived realities of grassroots women at the transnational level. It argues that Colombo-based feminists use their power and exposure to Western feminist approaches to portray diverse forms of oppression women face at grassroots levels, their needs for advocacy, and different modes of resistance on the ground. Many NGOs depend on international donor funding for their grassroots work, which also contributes to their utilization of Western-led knowledge. Despite their efforts to “save marginalized women from oppression,” these modes of intervention are often rejected by the public, including women at local levels. This has also resulted in the rejection of feminism entirely as a culturally root-less alien Western ideology. The analysis connects with the Transnational and Third World theoretical feminist perspectives to problematize the power relations between Western knowledge systems and the lived experiences of grassroots women in the peacebuilding process through NGO activism in Sri Lanka. It also emphasizes that the infiltration of Western knowledge through NGOs has led to the participation of grassroots women only through adjustments of their lived experiences to match the alien knowledge rather than theorizing based on their own lived realities. While sharing a concern that NGOs’ power to adopt Western knowledge systems is often unchecked and unmitigated, the paper signifies the importance of adopting the methods of alternative theorizing to ensure meaningful participation of Third World women in peacebuilding.

Keywords: alternative theorizing, colombo-based feminism, grassroots women in peacebuilding, NGO activism, transnational and third world feminisms

Procedia PDF Downloads 20
2732 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 487
2731 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 392
2730 Transnational Rurality: Bridging Two Towns with Renewable Energy

Authors: Yaprak Aydin

Abstract:

The rural is no longer a space of only agricultural activities that gave into the global market demands; or an idyll to return after retirement; or only a reservoir of cultural values, but rather a vision to redefine the future in terms of production and consumption relations. Gulpınar in Turkey and Ashtarak in Armenia are two towns where a new ground of dialogue between two communities has been initiated: ‘energy democracy’, which is a significant driving force in a sense of gathering people of two historically conflicted communities around common future concerns; and in a sense of transforming the accepted knowledge on the rurality and all the social structures it represents. This paper seeks to provoke a discussion of to what extent such a rurality is attainable by contextualizing – through visits and meetings in person – two towns and two communities within a renewable energy project called 'Under the Same Sun' carried out by two local civil society organizations together at two public spaces.

Keywords: civil society, energy democracy, prosumer communities, renewable energy, transnational rurality

Procedia PDF Downloads 121
2729 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 91