Search results for: vulnerability markets
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1592

Search results for: vulnerability markets

1502 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 395
1501 Impact of Regulation on Trading in Financial Derivatives in Europe

Authors: H. Florianová, J. Nešleha

Abstract:

Financial derivatives are considered to be risky investment instruments which could possibly bring another financial crisis. As prevention, European Union and its member states have released new legal acts adjusting this area of law in recent years. There have been several cases in history of capital markets worldwide where it was shown that legislature may affect behavior of subjects on capital markets. In our paper we analyze main events on selected European stock exchanges in order to apply them on three chosen markets - Czech capital market represented by Prague Stock Exchange, German capital market represented by Deutsche Börse and Polish capital market represented by Warsaw Stock Exchange. We follow time series of development of the sum of listed derivatives on these three stock exchanges in order to evaluate popularity of those exchanges. Afterwards we compare newly listed derivatives in relation to the speed of development of these exchanges. We also make a comparison between trends in derivatives and shares development. We explain how a legal regulation may affect situation on capital markets. If the regulation is too strict, potential investors or traders are not willing to undertake it and move to other markets. On the other hand, if the regulation is too vague, trading scandals occur and the market is not reliable from the prospect of potential investors or issuers. We see that making the regulation stricter usually discourages subjects to stay on the market immediately although making the regulation vaguer to interest more subjects is usually much slower process.

Keywords: capital markets, financial derivatives, investors' behavior, regulation

Procedia PDF Downloads 242
1500 Embracing Circular Economy: Unlocking Sustainable Growth in Emerging Markets

Authors: Mario Jose Paillacho Silva, José Ángel Pérez López

Abstract:

This article delves into the critical role of circular economy principles in unlocking sustainable growth and addressing environmental inequalities in emerging markets. Circular economy practices, rooted in regenerative systems and resource conservation, offer a transformative pathway for dynamic economies to achieve prosperity while minimizing environmental impact. The article comprehensively explores the understanding of the circular economy in emerging markets, emphasizing its economic benefits, social implications, and environmental advantages. It highlights key challenges and opportunities faced by these markets and emphasizes the crucial role of governments in creating supportive policy frameworks. It emphasizes how circular economy practices empower local communities and promote social inclusion and equality. Furthermore, the article underscores how the adoption of circular economy practices can mitigate waste, pollution, and resource scarcity, thus contributing to climate change mitigation and adaptation. Integrating circular economy principles with the United Nations' sustainable development goals (SDGs), the article showcases the potential of circularity in fostering responsible consumption and production, sustainable economic growth, and environmental protection. Overall, the article advocates for cross-sector collaboration and knowledge sharing to overcome barriers and scale circular economy practices in emerging markets, ultimately leading to a more equitable, prosperous, and environmentally sustainable future.

Keywords: circular economy, sustainability, emerging markets, circularity

Procedia PDF Downloads 42
1499 Social Vulnerability Mapping in New York City to Discuss Current Adaptation Practice

Authors: Diana Reckien

Abstract:

Vulnerability assessments are increasingly used to support policy-making in complex environments, like urban areas. Usually, vulnerability studies include the construction of aggregate (sub-) indices and the subsequent mapping of indices across an area of interest. Vulnerability studies show a couple of advantages: they are great communication tools, can inform a wider general debate about environmental issues, and can help allocating and efficiently targeting scarce resources for adaptation policy and planning. However, they also have a number of challenges: Vulnerability assessments are constructed on the basis of a wide range of methodologies and there is no single framework or methodology that has proven to serve best in certain environments, indicators vary highly according to the spatial scale used, different variables and metrics produce different results, and aggregate or composite vulnerability indicators that are mapped easily distort or bias the picture of vulnerability as they hide the underlying causes of vulnerability and level out conflicting reasons of vulnerability in space. So, there is urgent need to further develop the methodology of vulnerability studies towards a common framework, which is one reason of the paper. We introduce a social vulnerability approach, which is compared with other approaches of bio-physical or sectoral vulnerability studies relatively developed in terms of a common methodology for index construction, guidelines for mapping, assessment of sensitivity, and verification of variables. Two approaches are commonly pursued in the literature. The first one is an additive approach, in which all potentially influential variables are weighted according to their importance for the vulnerability aspect, and then added to form a composite vulnerability index per unit area. The second approach includes variable reduction, mostly Principal Component Analysis (PCA) that reduces the number of variables that are interrelated into a smaller number of less correlating components, which are also added to form a composite index. We test these two approaches of constructing indices on the area of New York City as well as two different metrics of variables used as input and compare the outcome for the 5 boroughs of NY. Our analysis yields that the mapping exercise yields particularly different results in the outer regions and parts of the boroughs, such as Outer Queens and Staten Island. However, some of these parts, particularly the coastal areas receive the highest attention in the current adaptation policy. We imply from this that the current adaptation policy and practice in NY might need to be discussed, as these outer urban areas show relatively low social vulnerability as compared with the more central parts, i.e. the high dense areas of Manhattan, Central Brooklyn, Central Queens and the Southern Bronx. The inner urban parts receive lesser adaptation attention, but bear a higher risk of damage in case of hazards in those areas. This is conceivable, e.g., during large heatwaves, which would more affect more the inner and poorer parts of the city as compared with the outer urban areas. In light of the recent planning practice of NY one needs to question and discuss who in NY makes adaptation policy for whom, but the presented analyses points towards an under representation of the needs of the socially vulnerable population, such as the poor, the elderly, and ethnic minorities, in the current adaptation practice in New York City.

Keywords: vulnerability mapping, social vulnerability, additive approach, Principal Component Analysis (PCA), New York City, United States, adaptation, social sensitivity

Procedia PDF Downloads 369
1498 Urban Catalyst through Traditional Market Revitalization towards the MICE Tourism in Surakarta

Authors: Istijabatul Aliyah, Bambang Setioko, Rara Sugiarti

Abstract:

Surakarta is one of the cities which are formed with the concept of Javanese cosmology. As a traditional town of Java, Surakarta is known as ‘the paradise’ of traditional markets. Since its establishment, Surakarta is formed with Catur Gatra Tunggal or Four Single-Slot concept (palace, square, mosques, and markets). Current development in Surakarta downtown today indicates that traditional markets have improved themselves in both physical and non-physical aspects. The efforts start from the market façade revitalization, restoration and the overall development of market; up to social activities, competition between traders or large celebrations in the neighbourhood market. This research was conducted in Surakarta, which is aimed at: identifying the role of traditional market revitalization efforts in the development of a city. This study employs several methods of analysis, namely: 1) Spatial analysis for mapping the distribution of traditional markets in the city constellation, 2) Category-Based Analysis (CBA) to classify the revitalization of traditional markets that has an influence in the development of the city, and 3) Interactive Method of Analysis. The results of this research indicate that the presence of a constellation of traditional markets in Surakarta is dominated by the presence of Gede Market, not only as the oldest traditional market, but also as a center of economic and socio-cultural activities of the community. The role of traditional market revitalization in the development of a town is as an Urban Catalyst towards a MICE city in the sense that the revitalization effort, even done in a relatively short time and not yet covering the overall objects, is able to establish brand image of Surakarta as a city of culture which is friendly and ready to be MICE tourism city.

Keywords: traditional market revitalization, urban catalyst, MICE tourism, Surakarta

Procedia PDF Downloads 358
1497 Fish Markets in Sierra Leone: Size, Structure, Distribution Networks and Opportunities for Aquaculture Development

Authors: Milton Jusu

Abstract:

Efforts by the Ministry of Fisheries and Marine Resources and its development partners to introduce “modern” aquaculture in Sierra Leone since the 1970s have not been successful. A number of reasons have been hypothesized, including the suggestion that the market infrastructure and demand for farmed fish were inadequate to stimulate large-scale and widespread aquaculture production in the country. We have assessed the size, structure, networks, and opportunities in fish markets using a combination of Participatory Rural Appraisals (PRAs) and questionnaire surveys conducted in a sample of 29 markets (urban, weekly, wholesale, and retail) and two hundred traders. The study showed that the local fish markets were dynamic, with very high variations in demand and supply. The markets sampled supplied between 135.2 and 9947.6 tonnes/year. Mean prices for fresh fish varied between US$1.12 and US$3.89/kg depending on species, with smoked catfish and shrimps commanding prices as high as US$7.4/kg. It is unlikely that marine capture fisheries can increase their current production levels, and these may, in fact, already be over-exploited and declining. Marine fish supplies are particularly low between July and September. More careful attention to the timing of harvests (rainy season, not dry season) and to species (catfish, not tilapia) (could help in the successful adoption of aquaculture.

Keywords: fisheries, aquaculture, marine, fish ponds

Procedia PDF Downloads 19
1496 Tsunami Vulnerability of Critical Infrastructure: Development and Application of Functions for Infrastructure Impact Assessment

Authors: James Hilton Williams

Abstract:

Recent tsunami events, including the 2011 Tohoku Tsunami, Japan, and the 2015 Illapel Tsunami, Chile, have highlighted the potential for tsunami impacts on the built environment. International research in the tsunami impacts domain has been largely focused toward impacts on buildings and casualty estimations, while only limited attention has been placed on the impacts on infrastructure which is critical for the recovery of impacted communities. New Zealand, with 75% of the population within 10 km of the coast, has a large amount of coastal infrastructure exposed to local, regional and distant tsunami sources. To effectively manage tsunami risk for New Zealand critical infrastructure, including energy, transportation, and communications, the vulnerability of infrastructure networks and components must first be determined. This research develops infrastructure asset vulnerability, functionality and repair- cost functions based on international post-event tsunami impact assessment data from technologically similar countries, including Japan and Chile, and adapts these to New Zealand. These functions are then utilized within a New Zealand based impact framework, allowing for cost benefit analyses, effective tsunami risk management strategies and mitigation options for exposed critical infrastructure to be determined, which can also be applied internationally.

Keywords: impact assessment, infrastructure, tsunami impacts, vulnerability functions

Procedia PDF Downloads 127
1495 Using the GIS Technology for Erosion Risk Mapping of BEN EL WIDAN Dam Watershed in Beni Mallal, Marroco

Authors: Azzouzi Fadoua

Abstract:

This study focuses on the diagnosis of the dynamics of natural resources in a semi-arid mountainous weakened by natural vulnerability and anthropogenic action. This is evident in the forms of hydraulic erosion and degradation of agricultural land. The rate of this damaged land is 53%, with a strong presence of concentrated erosion; this shows that balanced and semi-balanced environments are less apparent to the Watershed, representing 47%. The results revealed the crucial role of the slopes and the density of the hydraulic networks to facilitate the transport of fine elements, at the level of the slopes with low vegetation intensity, to the lake of the dam. Something that endangers the siltation of the latter. After the study of natural and anthropogenic elements, it turned out that natural vulnerability is an integral part of the current dynamic, especially when it coincides with the overexploitation of natural resources, in this case, the exploitation of steep slopes for the cultivation of cereals and overgrazing. This causes the soil to pile up and increase the rate of runoff.

Keywords: watershed, erosion, natural vulnerability, anthropogenic

Procedia PDF Downloads 112
1494 Measuring Financial Asset Return and Volatility Spillovers, with Application to Sovereign Bond, Equity, Foreign Exchange and Commodity Markets

Authors: Petra Palic, Maruska Vizek

Abstract:

We provide an in-depth analysis of interdependence of asset returns and volatilities in developed and developing countries. The analysis is split into three parts. In the first part, we use multivariate GARCH model in order to provide stylized facts on cross-market volatility spillovers. In the second part, we use a generalized vector autoregressive methodology developed by Diebold and Yilmaz (2009) in order to estimate separate measures of return spillovers and volatility spillovers among sovereign bond, equity, foreign exchange and commodity markets. In particular, our analysis is focused on cross-market return, and volatility spillovers in 19 developed and developing countries. In order to estimate named spillovers, we use daily data from 2008 to 2017. In the third part of the analysis, we use a generalized vector autoregressive framework in order to estimate total and directional volatility spillovers. We use the same daily data span for one developed and one developing country in order to characterize daily volatility spillovers across stock, bond, foreign exchange and commodities markets.

Keywords: cross-market spillovers, sovereign bond markets, equity markets, value at risk (VAR)

Procedia PDF Downloads 231
1493 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment

Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura

Abstract:

This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.

Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability

Procedia PDF Downloads 128
1492 The Impact of Supply Chain Strategy and Integration on Supply Chain Performance: Supply Chain Vulnerability as a Moderator

Authors: Yi-Chun Kuo, Jo-Chieh Lin

Abstract:

The objective of a supply chain strategy is to reduce waste and increase efficiency to attain cost benefits, and to guarantee supply chain flexibility when facing the ever-changing market environment in order to meet customer requirements. Strategy implementation aims to fulfill common goals and attain benefits by integrating upstream and downstream enterprises, sharing information, conducting common planning, and taking part in decision making, so as to enhance the overall performance of the supply chain. With the rise of outsourcing and globalization, the increasing dependence on suppliers and customers and the rapid development of information technology, the complexity and uncertainty of the supply chain have intensified, and supply chain vulnerability has surged, resulting in adverse effects on supply chain performance. Thus, this study aims to use supply chain vulnerability as a moderating variable and apply structural equation modeling (SEM) to determine the relationships among supply chain strategy, supply chain integration, and supply chain performance, as well as the moderating effect of supply chain vulnerability on supply chain performance. The data investigation of this study was questionnaires which were collected from the management level of enterprises in Taiwan and China, 149 questionnaires were received. The result of confirmatory factor analysis shows that the path coefficients of supply chain strategy on supply chain integration and supply chain performance are positive (0.497, t= 4.914; 0.748, t= 5.919), having a significantly positive effect. Supply chain integration is also significantly positively correlated to supply chain performance (0.192, t = 2.273). The moderating effects of supply chain vulnerability on supply chain strategy and supply chain integration to supply chain performance are significant (7.407; 4.687). In Taiwan, 97.73% of enterprises are small- and medium-sized enterprises (SMEs) focusing on receiving original equipment manufacturer (OEM) and original design manufacturer (ODM) orders. In order to meet the needs of customers and to respond to market changes, these enterprises especially focus on supply chain flexibility and their integration with the upstream and downstream enterprises. According to the observation of this research, the effect of supply chain vulnerability on supply chain performance is significant, and so enterprises need to attach great importance to the management of supply chain risk and conduct risk analysis on their suppliers in order to formulate response strategies when facing emergency situations. At the same time, risk management is incorporated into the supply chain so as to reduce the effect of supply chain vulnerability on the overall supply chain performance.

Keywords: supply chain integration, supply chain performance, supply chain vulnerability, structural equation modeling

Procedia PDF Downloads 287
1491 Application of Ontologies to Contract for Difference Documents

Authors: Renato Figueira Franco

Abstract:

This paper aims to create a representational information system applied to the securities market, particularly the development of an ontology applied to the analysis of the Key Information Documents of Contracts for Difference. The process of obtaining knowledge and its proper formal representation has raised the attention both from the scientific literature and the capital markets supervisory authorities. The formal knowledge representation is embodied in the construction of ontologies, which are responsible for defining a knowledge base structure of a given scientific domain, facilitating its understanding, and allowing its sharing among the scientific community. The scope of this study is restricted to the analysis of capital markets ontologies in order to capture its structure, semantics and knowledge sharing between people and systems.

Keywords: ontology, financial markets, CFD, PRIIPs, key information documents

Procedia PDF Downloads 36
1490 Willingness of Muslim Owners/Managers of Smes to Seek Capital Market Financing

Authors: Bashir Tijjani Abubakar

Abstract:

Capital markets play a very important role in financing of private and public institutions in both developing and developed economies. Unfortunately, small and medium enterprises (SMEs) in those economies are yet to fully utilize the markets to finance their long financial needs. This study assesses the factors that influence the decisions of the Muslim Owners/Managers of SMEs in Nigeria and specifically in Kano to seek capital market financing. Logit regression model was used to assess the factors such as control of ownership, perception of the owners/managers on the interest rate charged by commercial banks, educational qualification, size, and age of the SMEs. The study reveals that all the factors have significant positive influence on the willingness of the SMEs Owners/Managers to seek capital market financing. The study recommends educating the Owners/Managers on the operations and products of the markets.

Keywords: capital markets, capital market financing, small and medium enterprise and willingness, size of an enterprise, age of an enterprise and control of ownership

Procedia PDF Downloads 249
1489 Assessing the NYC's Single-Family Housing Typology for Urban Heat Vulnerability and Occupants’ Health Risk under the Climate Change Emergency

Authors: Eleni Stefania Kalapoda

Abstract:

Recurring heat waves due to the global climate change emergency pose continuous risks to human health and urban resources. Local and state decision-makers incorporate Heat Vulnerability Indices (HVIs) to quantify and map the relative impact on human health in emergencies. These maps enable government officials to identify the highest-risk districts and to concentrate emergency planning efforts and available resources accordingly (e.g., to reevaluate the location and the number of heat-relief centers). Even though the framework of conducting an HVI is unique per municipality, its accuracy in assessing the heat risk is limited. To resolve this issue, varied housing-related metrics should be included. This paper quantifies and classifies NYC’s single detached housing typology within high-vulnerable NYC districts using detailed energy simulations and post-processing calculations. The results show that the variation in indoor heat risk depends significantly on the dwelling’s design/operation characteristics, concluding that low-ventilated dwellings are the most vulnerable ones. Also, it confirmed that when building-level determinants of exposure are excluded from the assessment, HVI fails to capture important components of heat vulnerability. Lastly, the overall vulnerability ratio of the housing units was calculated between 0.11 to 1.6 indoor heat degrees in terms of ventilation and shading capacity, insulation degree, and other building attributes.

Keywords: heat vulnerability index, energy efficiency, urban heat, resiliency to heat, climate adaptation, climate mitigation, building energy

Procedia PDF Downloads 51
1488 Landslide and Liquefaction Vulnerability Analysis Using Risk Assessment Analysis and Analytic Hierarchy Process Implication: Suitability of the New Capital of the Republic of Indonesia on Borneo Island

Authors: Rifaldy, Misbahudin, Khalid Rizky, Ricky Aryanto, M. Alfiyan Bagus, Fahri Septianto, Firman Najib Wibisana, Excobar Arman

Abstract:

Indonesia is a country that has a high level of disaster because it is on the ring of fire, and there are several regions with three major plates meeting in the world. So that disaster analysis must always be done to see the potential disasters that might always occur, especially in this research are landslides and liquefaction. This research was conducted to analyze areas that are vulnerable to landslides and liquefaction hazards and their relationship with the assessment of the issue of moving the new capital of the Republic of Indonesia to the island of Kalimantan with a total area of 612,267.22 km². The method in this analysis uses the Analytical Hierarchy Process and consistency ratio testing as a complex and unstructured problem-solving process into several parameters by providing values. The parameters used in this analysis are the slope, land cover, lithology distribution, wetness index, earthquake data, peak ground acceleration. Weighted overlay was carried out from all these parameters using the percentage value obtained from the Analytical Hierarchy Process and confirmed its accuracy with a consistency ratio so that a percentage of the area obtained with different vulnerability classification values was obtained. Based on the analysis results obtained vulnerability classification from very high to low vulnerability. There are (0.15%) 918.40083 km² of highly vulnerable, medium (20.75%) 127,045,44815 km², low (56.54%) 346,175.886188 km², very low (22.56%) 138,127.484832 km². This research is expected to be able to map landslides and liquefaction disasters on the island of Kalimantan and provide consideration of the suitability of regional development of the new capital of the Republic of Indonesia. Also, this research is expected to provide input or can be applied to all regions that are analyzing the vulnerability of landslides and liquefaction or the suitability of the development of certain regions.

Keywords: analytic hierarchy process, Borneo Island, landslide and liquefaction, vulnerability analysis

Procedia PDF Downloads 134
1487 Non-Standard Monetary Policy Measures and Their Consequences

Authors: Aleksandra Nocoń (Szunke)

Abstract:

The study is a review of the literature concerning the consequences of non-standard monetary policy, which are used by central banks during unconventional periods, threatening instability of the banking sector. In particular, the attention was paid to the effects of non-standard monetary policy tools for financial markets. However, the empirical evidence about their effects and real consequences for the financial markets are still not final. The main aim of the study is to survey the consequences of standard and non-standard monetary policy instruments, implemented during the global financial crisis in the United States, United Kingdom and Euroland, with particular attention to the results for the stabilization of global financial markets. The study analyses the consequences for short and long-term market interest rates, interbank interest rates and LIBOR-OIS spread. The study consists mainly of the empirical review, indicating the impact of the implementation of these tools for the financial markets. The following research methods were used in the study: literature studies, including domestic and foreign literature, cause and effect analysis and statistical analysis.

Keywords: asset purchase facility, consequences of monetary policy instruments, non-standard monetary policy, quantitative easing

Procedia PDF Downloads 299
1486 The Vulnerability of Climate Change to Farmers, Fishermen and Herdsmen in Nigeria

Authors: Nasiru Medugu Idris

Abstract:

This research is aimed at assessing the vulnerability of climate change to rural communities (farmers, herdsmen and fishermen) in Nigeria with the view to study the underlying causes and degree of vulnerability to climate change and examine the conflict between farmers and herdsmen as a result of climate change. This research employed the use of quantitative and qualitative means of data gathering techniques as well as physical observations. Six states (Kebbi, Adamawa, Nasarawa, Osun, Ebonyi, and Akwa Ibom) have been selected on the ground that they are key food production areas in the country and are therefore essential to continual food security in the country. So also, they also double as fishing communities in order to aid the comprehensive study of all the effects on climate on farmers and fishermen alike. Community focus group discussions were carried out in the various states for an interactive session and also to have firsthand information on their level of awareness on climate change. Climate data from the Nigerian Meteorological Agency over the past decade were collected for the purpose of analyzing trends in climate. The study observed that the level of vulnerability of rural dwellers most especially farmers, herdsmen and fishermen to climate change is very high due to their socioeconomic, ethnic and historical perspective of their trend. The study, therefore, recommends that urgent step needs to be put in place to help control natural hazards and man-made disasters and serious measures are also needed in order to minimize severe societal, economic and political crises; some of which may either escalate to violent conflicts or could be avoided by efforts of conflict resolution and prevention by the initiation of a process of de-escalation. So this study has recommended the best-fit adaptive and mitigation measures to climate change vulnerability in rural communities of Nigeria.

Keywords: adaptation, farmers, fishermen, herdsmen

Procedia PDF Downloads 167
1485 Fish Markets in Sierra Leone: Size, Structure, Distribution Networks and Opportunities for Aquaculture Development

Authors: Milton Jusu, Moses Koroma

Abstract:

Efforts by the Ministry of Fisheries and Marine Resources and its development partners to introduce “modern” aquaculture in Sierra Leone since the 1970s have not been successful. A number of reasons have been hypothesized, including the suggestion that the market infrastructure and demand for farmed fish were inadequate to stimulate large-scale and widespread aquaculture production in the country. We have assessed the size, structure, networks and opportunities in fish markets using a combination of Participatory Rural Appraisals (PRAs) and questionnaire surveys conducted in a sample of 29 markets (urban, weekly, wholesale and retail) and two hundred traders. The study showed that the local fish markets were dynamic, with very high variations in demand and supply. The markets sampled supplied between 135.2 and 9947.6 tonnes/year. Mean prices for fresh fish varied between US$1.12 and US$3.89/kg depending on species, with smoked catfish and shrimps commanding prices as high as US$7.4/kg. It is unlikely that marine capture fisheries can increase their current production levels, and these may, in fact, already be over-exploited and declining. Marine fish supplies are particularly low between July and September. More careful attention to the timing of harvests (rainy season, not dry season) and to species (catfish, not tilapia) (could help in the successful adoption of aquaculture.

Keywords: fisheries and aquaculture, fish market, marine fish supplies, harvests

Procedia PDF Downloads 15
1484 Exploration of Sweet Potato Cultivar Markets Availability in North West Province, South Africa

Authors: V. M. Mmbengwa, J. R. M. Mabuso, C. P. Du Plooy, S. Laurrie, H. D. van Schalkwyk

Abstract:

Sweet potato products are necessary for the provision of essential nutrients in every household, regardless of their poverty status. Their consumption appears to be highly influenced by socio-economic factors, such as malnutrition, food insecurity and unemployment. Therefore, market availability is crucial for these cultivars to resolve some of the socio-economic factors. The aim of the study was to investigate market availability of sweet potato cultivars in the North West Province. In this study, both qualitative and quantitative research methodologies were used. Qualitative methodology was used to explain the quantitative outcomes of the variables. On the other hand, quantitative results were used to test the hypothesis. The study used SPSS software to analyse the data. Cross-tabulation and Chi-square statistics were used to obtain the descriptive and inferential analyses, respectively. The study found that the Blesbok cultivar is dominating the markets of the North West Province, with the Monate cultivar dominating in the Bojanala Platinum (75 %) and Dr Ruth Segomotsi Mompati (25 %) districts. It is also found that a unit increase in the supply of sweet potato cultivars in both local and district municipal markets is accompanied by a reduced demand of 28 % and 33 % at district and local markets, respectively. All these results were found to be significant at p<0.05. The results further revealed that in four out of nine local municipality markets, the Blesbok cultivar seems to be solely available in those four local municipal markets of North West Province. It can be concluded that Blesbok, relative to other cultivars, is the most commercialised sweet potato variety and that consumers across this Province are highly aware of it. For other cultivars to assume market prominence in this Province, a well-designed marketing campaign for creating awareness may be required. This campaign may be based on nutritional advantages of different cultivars, of which Blesbok is relatively inferior, compared to orange-fleshed sweet potato varieties.

Keywords: cultivar, malnutrition, markets, sweet potato

Procedia PDF Downloads 260
1483 Matching Farmer Competence and Farm Resources with the Transformation of Agri-Food Marketing Systems

Authors: Bhawat Chiamjinnawat

Abstract:

The agri-food market transformation has implied market growth for the fruit industry in Thailand. This article focuses on analysis of farmer competence and farm resources which affect market strategies used by fruit farmers in Chanthaburi province of Thailand. The survey data were collected through the use of face-to-face interviews with structured questionnaires. This study identified 14 drivers related to farmer competence and farm resources of which some had significant effect on the decision to use either high-value markets or traditional markets. The results suggest that farmers who used high-value markets were better educated and they had longer experience and larger sized business. Identifying the important factors that match with the market transformation provides policy with opportunities to support the fruit farmers to increase their market power. Policies that promote business expansion of agricultural cooperatives and knowledge sharing among farmers are recommended to reduce limitations due to limited knowledge, low experience, and small business sizes.

Keywords: farmer competence, farm resources, fruit industry, high-value markets, Thailand

Procedia PDF Downloads 125
1482 Assessing Missouri State Park Employee Perceptions of Vulnerability and Resilience to Extreme Weather Events

Authors: Ojetunde Ojewola, Mark Morgan, Sonja Wilhelm-Stanis

Abstract:

State parks and historic sites are vulnerable to extreme weather events which can affect visitor experiences, management priorities, and legislative requests for disaster relief funds. Recently, global attention has been focused on the perceptions of global warming and how the presence of extreme weather events might impact protected areas, both now and in the future. The effects of climate change are not equally distributed across the United States, leading to varied perceptions based on personal experience with extreme weather events. This study describes employee perceptions of vulnerability and resilience in Missouri State Parks & Historic Sites due to extreme weather events that occur across the state but grouped according to physiographic provinces. Using a four-point rating scale, perceptions of vulnerability and resilience were divided into high and low sub-groups, thus allowing researchers to construct a two by two typology of employee responses. Subsequently, this data was used to develop a three-point continuum of environmental concern (higher scores meant more concern). Employee scores were then compared against a statewide assessment which combined social, economic, infrastructural and environmental indicators of vulnerability and resilience. State park employees thought the system was less vulnerable and more resilient to climate change than data found in statewide assessment This result was also consistent in three out of five physiographic regions across Missouri. Implications suggest that Missouri state park should develop a climate change adaptation strategy for emergency preparedness.

Keywords: extreme weather events, resilience, state parks, vulnerability

Procedia PDF Downloads 100
1481 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 5
1480 On the Impact of Oil Price Fluctuations on Stock Markets: A Multivariate Long-Memory GARCH Framework

Authors: Manel Youssef, Lotfi Belkacem

Abstract:

This paper employs multivariate long memory GARCH models to simultaneously estimate mean and conditional variance spillover effects between oil prices and different financial markets. Since different financial assets are traded based on these market sector returns, it’s important for financial market participants to understand the volatility transmission mechanism over time and across these series in order to make optimal portfolio allocation decisions. We examine weekly returns from January 1, 2003 to November 30, 2012 and find evidence of significant transmission of shocks and volatilities between oil prices and some of the examined financial markets. The findings support the idea of cross-market hedging and sharing of common information by investors.

Keywords: oil prices, stock indices returns, oil volatility, contagion, DCC-multivariate (FI) GARCH

Procedia PDF Downloads 501
1479 Preliminary Seismic Vulnerability Assessment of Existing Historic Masonry Building in Pristina, Kosovo

Authors: Florim Grajcevci, Flamur Grajcevci, Fatos Tahiri, Hamdi Kurteshi

Abstract:

The territory of Kosova is actually included in one of the most seismic-prone regions in Europe. Therefore, the earthquakes are not so rare in Kosova; and when they occurred, the consequences have been rather destructive. The importance of assessing the seismic resistance of existing masonry structures has drawn strong and growing interest in the recent years. Engineering included those of Vulnerability, Loss of Buildings and Risk assessment, are also of a particular interest. This is due to the fact that this rapidly developing field is related to great impact of earthquakes on the socioeconomic life in seismic-prone areas, as Kosova and Prishtina are, too. Such work paper for Prishtina city may serve as a real basis for possible interventions in historic buildings as are museums, mosques, old residential buildings, in order to adequately strengthen and/or repair them, by reducing the seismic risk within acceptable limits. The procedures of the vulnerability assessment of building structures have concentrated on structural system, capacity, and the shape of layout and response parameters. These parameters will provide expected performance of the very important existing building structures on the vulnerability and the overall behavior during the earthquake excitations. The structural systems of existing historical buildings in Pristina, Kosovo, are dominantly unreinforced brick or stone masonry with very high risk potential from the expected earthquakes in the region. Therefore, statistical analysis based on the observed damage-deformation, cracks, deflections and critical building elements, would provide more reliable and accurate results for the regional assessments. The analytical technique was used to develop a preliminary evaluation methodology for assessing seismic vulnerability of the respective structures. One of the main objectives is also to identify the buildings that are highly vulnerable to damage caused from inadequate seismic performance-response. Hence, the damage scores obtained from the derived vulnerability functions will be used to categorize the evaluated buildings as “stabile”, “intermediate”, and “unstable”. The vulnerability functions are generated based on the basic damage inducing parameters, namely number of stories (S), lateral stiffness (LS), capacity curve of total building structure (CCBS), interstory drift (IS) and overhang ratio (OR).

Keywords: vulnerability, ductility, seismic microzone, ductility, energy efficiency

Procedia PDF Downloads 375
1478 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 98
1477 Risk and Vulnerability Assessment of Agriculture on Climate Change: Bangnampriao District, Thailand

Authors: Charuvan Kasemsap

Abstract:

This research was studied in Bangnampriao District, Chachernsao Province, Thailand. The primary data relating to flooding, drought, and saline intrusion problem on agriculture were collected by surveying, focus group, and in-depth interview with agricultural officers, technical officers of irrigation department, and local government leader of Bangnampriao District. The likelihood and consequence of risk were determined the risk index by risk assessment matrix. In addition, the risk index and the total coping capacity scores were investigated the vulnerability index by vulnerability matrix. It was found that the high-risk drought and saline intrusion was dramatically along Bang Pakong River owing to the end destination of Chao Phraya Irrigation system of Central Thailand. This leads yearly the damage of rice paddy, mango tree, orchard, and fish pond. Therefore, some agriculture avoids rice growing during January to May, and also pumps fresh water from a canal into individual storage pond. However, Bangnampriao District will be strongly affected by the impacts of climate change. Monthly precipitations are expected to decrease in number; dry seasons are expected to be more in number and longer in duration. Thus, the risk and vulnerability of agriculture are also increasing. Adaptation strategies need to be put in place in order to enhance the resilience of the agriculture.

Keywords: agriculture, bangnampriao, climate change, risk assessment

Procedia PDF Downloads 394
1476 Determining the Spatial Vulnerability Levels and Typologies of Coastal Cities to Climate Change: Case of Turkey

Authors: Mediha B. Sılaydın Aydın, Emine D. Kahraman

Abstract:

One of the important impacts of climate change is the sea level rise. Turkey is a peninsula, so the coastal areas of the country are threatened by the problem of sea level rise. Therefore, the urbanized coastal areas are highly vulnerable to climate change. At the aim of enhancing spatial resilience of urbanized areas, this question arises: What should be the priority intervention subject in the urban planning process for a given city. To answer this question, by focusing on the problem of sea level rise, this study aims to determine spatial vulnerability typologies and levels of Turkey coastal cities based on morphological, physical and social characteristics. As a method, spatial vulnerability of coastal cities is determined by two steps as level and type. Firstly, physical structure, morphological structure and social structure were examined in determining spatial vulnerability levels. By determining these levels, most vulnerable areas were revealed as a priority in adaptation studies. Secondly, all parameters are also used to determine spatial typologies. Typologies are determined for coastal cities in order to use as a base for urban planning studies. Adaptation to climate change is crucial for developing countries like Turkey so, this methodology and created typologies could be a guide for urban planners as spatial directors and an example for other developing countries in the context of adaptation to climate change. The results demonstrate that the urban settlements located on the coasts of the Marmara Sea, the Aegean Sea and the Mediterranean respectively, are more vulnerable than the cities located on the Black Sea’s coasts to sea level rise.

Keywords: climate change, coastal cities, vulnerability, urban land use planning

Procedia PDF Downloads 283
1475 The Impact of the Global Financial Crises on MILA Stock Markets

Authors: Miriam Sosa, Edgar Ortiz, Alejandra Cabello

Abstract:

This paper examines the volatility changes and leverage effects of the MILA stock markets and their changes since the 2007 global financial crisis. This group integrates the stock markets from Chile, Colombia, Mexico and Peru. Volatility changes and leverage effects are tested with a symmetric GARCH (1,1) and asymmetric TARCH (1,1) models with a dummy variable in the variance equation. Daily closing prices of the stock indexes of Chile (IPSA), Colombia (COLCAP), Mexico (IPC) and Peru (IGBVL) are examined for the period 2003:01 to 2015:02. The evidence confirms the presence of an overall increase in asymmetric market volatility in the Peruvian share market since the 2007 crisis.

Keywords: financial crisis, Latin American Integrated Market, TARCH, GARCH

Procedia PDF Downloads 249
1474 Towards a Vulnerability Model Assessment of The Alexandra Jukskei Catchment in South Africa

Authors: Vhuhwavho Gadisi, Rebecca Alowo, German Nkhonjera

Abstract:

This article sets out to detail an investigation of groundwater management in the Juksei Catchment of South Africa through spatial mapping of key hydrological relationships, interactions, and parameters in catchments. The Department of Water Affairs (DWA) noted gaps in the implementation of the South African National Water Act 1998: article 16, including the lack of appropriate models for dealing with water quantity parameters. For this reason, this research conducted a drastic GIS-based groundwater assessment to improve groundwater monitoring system in the Juksei River basin catchment of South Africa. The methodology employed was a mixed-methods approach/design that involved the use of DRASTIC analysis, questionnaire, literature review and observations to gather information on how to help people who use the Juskei River. GIS (geographical information system) mapping was carried out using a three-parameter DRASTIC (Depth to water, Recharge, Aquifer media, Soil media, Topography, Impact of the vadose zone, Hydraulic conductivity) vulnerability methodology. In addition, the developed vulnerability map was subjected to sensitivity analysis as a validation method. This approach included single-parameter sensitivity, sensitivity to map deletion, and correlation analysis of DRASTIC parameters. The findings were that approximately 5.7% (45km2) of the area in the northern part of the Juksei watershed is highly vulnerable. Approximately 53.6% (428.8 km^2) of the basin is also at high risk of groundwater contamination. This area is mainly located in the central, north-eastern, and western areas of the sub-basin. The medium and low vulnerability classes cover approximately 18.1% (144.8 km2) and 21.7% (168 km2) of the Jukskei River, respectively. The shallow groundwater of the Jukskei River belongs to a very vulnerable area. Sensitivity analysis indicated that water depth, water recharge, aquifer environment, soil, and topography were the main factors contributing to the vulnerability assessment. The conclusion is that the final vulnerability map indicates that the Juksei catchment is highly susceptible to pollution, and therefore, protective measures are needed for sustainable management of groundwater resources in the study area.

Keywords: contamination, DRASTIC, groundwater, vulnerability, model

Procedia PDF Downloads 54
1473 BodeACD: Buffer Overflow Vulnerabilities Detecting Based on Abstract Syntax Tree, Control Flow Graph, and Data Dependency Graph

Authors: Xinghang Lv, Tao Peng, Jia Chen, Junping Liu, Xinrong Hu, Ruhan He, Minghua Jiang, Wenli Cao

Abstract:

As one of the most dangerous vulnerabilities, effective detection of buffer overflow vulnerabilities is extremely necessary. Traditional detection methods are not accurate enough and consume more resources to meet complex and enormous code environment at present. In order to resolve the above problems, we propose the method for Buffer overflow detection based on Abstract syntax tree, Control flow graph, and Data dependency graph (BodeACD) in C/C++ programs with source code. Firstly, BodeACD constructs the function samples of buffer overflow that are available on Github, then represents them as code representation sequences, which fuse control flow, data dependency, and syntax structure of source code to reduce information loss during code representation. Finally, BodeACD learns vulnerability patterns for vulnerability detection through deep learning. The results of the experiments show that BodeACD has increased the precision and recall by 6.3% and 8.5% respectively compared with the latest methods, which can effectively improve vulnerability detection and reduce False-positive rate and False-negative rate.

Keywords: vulnerability detection, abstract syntax tree, control flow graph, data dependency graph, code representation, deep learning

Procedia PDF Downloads 140