CINXE.COM
Search results for: collective security
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: collective security</title> <meta name="description" content="Search results for: collective security"> <meta name="keywords" content="collective security"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="collective security" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="collective security"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3467</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: collective security</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3467</span> Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emmanuel%20Mugiraneza">Emmanuel Mugiraneza</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defence%20diplomacy" title="defence diplomacy">defence diplomacy</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20security" title=" collective security"> collective security</a>, <a href="https://publications.waset.org/abstracts/search?q=Rwanda" title=" Rwanda"> Rwanda</a>, <a href="https://publications.waset.org/abstracts/search?q=Peacekeeping" title=" Peacekeeping"> Peacekeeping</a> </p> <a href="https://publications.waset.org/abstracts/148483/defence-diplomacy-and-collective-security-in-africa-case-of-rwanda-defence-forces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148483.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">123</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3466</span> Human Development as an Integral Part of Human Security within the Responsibility to Rebuild</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Themistoklis%20Tzimas">Themistoklis Tzimas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The proposed paper focuses on a triangular relationship, between human security, human development and responsibility to rebuild. This relationship constitutes the innovative contribution to the debate about human security. Human security constitutes a generic and legally binding notion, which orientates from an integrated approach the UN Charter principles and of the collective security system. Such an approach brings at the forefront of international law and of international relations not only states but non- state actors as well. Several doctrines attempt to implement the fore-mentioned approach among which the Responsibility to Protect- hereinafter R2P- doctrine and its aspect of Responsibility to Rebuild- hereinafter R2R. In this sense, R2P in general and R2R are supposed to be guided by human security imperatives. Human security because of its human- centered approach encompasses as an integral part of it, human development. Human development constitutes part of the backbone of human security, since it deals with the social and economic root- causes of the threats, which human security attempts to confront. In this sense, doctrines which orientate from human security, such as R2P and its R2R aspect should also take into account human development imperatives, in order to improve their efficiency. On the contrary though, R2R is more often linked with market- orientated policies, which are often imposed under transitional authorities, regardless of local needs. The implementation of such policies can be identified as a cause for striking failures in the framework of R2R. In addition it is a misinterpretation of the essence of human security and subsequently of R2P as well. The findings of the article, on the basis of the fore-mentioned argument is that a change must take place from a market- orientated misinterpretation of R2R to an approach attempting to implement human development doctrines, since the latter lie at the heart of human security and can be proven more effective in dealing with the root- causes of conflicts. Methodologically, the article begins with an examination of human security and of its binding nature on the basis of its orientation from the UN Charter. It also examines its significance in the framework of the collective security system. Then, follows the analysis of why and how human development constitutes an integral part of human security. At the next part it is proven that R2P in general and R2R more specifically constitute or should constitute an attempt to implement human security doctrines within the collective security system. Having built this triangular relationship it is argued that human development is proven to be the most suitable notion, so that the spirit of human security and the scopes of R2P are successfully implemented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20security" title="human security">human security</a>, <a href="https://publications.waset.org/abstracts/search?q=un%20charter" title=" un charter"> un charter</a>, <a href="https://publications.waset.org/abstracts/search?q=responsibility%20to%20protect" title=" responsibility to protect"> responsibility to protect</a>, <a href="https://publications.waset.org/abstracts/search?q=responsibility%20to%20rebuild" title=" responsibility to rebuild"> responsibility to rebuild</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20development" title=" human development"> human development</a> </p> <a href="https://publications.waset.org/abstracts/35598/human-development-as-an-integral-part-of-human-security-within-the-responsibility-to-rebuild" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35598.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">280</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3465</span> Military Role of Russia beyond Its National Boundary</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nipuli%20Gajanayake">Nipuli Gajanayake</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Russian military role beyond its national frontier has become a debatable hot topic in the international political arena. It’s advanced, and strategic responses in combating regional and international security problems have always been a factor to debate and criticize. Under such critical circumstances, Russia is attentive to play its military role according to the provisions of the Military Doctrine of the Russian Federation. Most importantly, the legal basis of the doctrine has also consisted with the generally recognized principles and norms of international law. Therefore, Russian international military assistances are pledged to accomplish international peace and security. The expansion of Russian military participation in the United Nations Peacekeeping operations, and military- political, and technical cooperation have largely evident the great effort of Russia in maintaining and restoring international peace and security. Moreover, the conflict management diplomacy and the development of dialogue with nation states to confront military risks and threats can also identify as a part of preserving international peace and security. In addition, Russia strives to strengthen the system of collective security with regional and international organizations through the legal framework of the Collective Security Treaty Organization (CSTO). Maintaining cooperative ties with the Commonwealth of Independent States (CIS), the Organization for Security and Cooperation in Europe (OSCE) and the Shanghai Cooperation Organization (SCO) have highlighted the Russian deliberation on maintaining regional peace and security. Nevertheless, the extension of cordial relations with nation states and providing of military assistances during tensions and conflicts on their territories can also underscore as Russians commitments on maintaining international peace and security. Observing and recognizing the disparity between the West portrayed terms like ‘illegal Russian interventions’ and the comprehensive reality behind the ‘Russian military assistances’ are important to understand. However, a lopsided vision or a perspective towards the Russian international military role would not present a clear understanding about its valued and also dedicated hard work on maintaining international peace and security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20security" title="collective security">collective security</a>, <a href="https://publications.waset.org/abstracts/search?q=diplomacy" title=" diplomacy"> diplomacy</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20military%20role%20of%20Russia" title=" international military role of Russia"> international military role of Russia</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20peace%20and%20security" title=" international peace and security"> international peace and security</a> </p> <a href="https://publications.waset.org/abstracts/71135/military-role-of-russia-beyond-its-national-boundary" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71135.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">301</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3464</span> The Impact of Collective Punishment on Cadets’ Psychology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erseg%C3%BCn%20%C3%96mer%20Erol">Ersegün Ömer Erol</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since the first civilizations, armies have been the most significant part of the countries. As generally known, in today’s world, people are trying hard to find the best way to educate their armies so as to prepare them effectively for the war. Due to the fact that, as rarely known, collective punishment is in fact one of the methods used commonly in militaries in order to educate personnel and cadets. In this study, it is purposed to find out the constructive and unfavorable impacts of collective punishment on cadets’ psychology and by comparing these impacts to decide whether the collective punishment is functional or not. These impacts are obtained from the questionnaire applied on cadets and personnel. The main goal of the study is to provide new point of views and more scientific information about the discussed education way-the collective punishment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=army" title="army">army</a>, <a href="https://publications.waset.org/abstracts/search?q=cadet" title=" cadet"> cadet</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20punishment" title=" collective punishment"> collective punishment</a>, <a href="https://publications.waset.org/abstracts/search?q=psychology" title=" psychology"> psychology</a> </p> <a href="https://publications.waset.org/abstracts/27259/the-impact-of-collective-punishment-on-cadets-psychology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27259.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">312</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3463</span> The Link Between Knowledge Management, Organizational Learning and Collective Competence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amira%20Khelil">Amira Khelil</a>, <a href="https://publications.waset.org/abstracts/search?q=Habib%20Affes"> Habib Affes</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The XXIst century is characterized by promoting teamwork as one of the main drivers of firms` performance. Collective competence is becoming crucial in developing and maintaining a firm’s competitive advantage, as well as its contributions to organizational innovation. In other words, the improvement of collective competence for a firm is no longer a choice, but rather an obligation. Learning capabilities of a firm in the context of knowledge management are assumed to be the main drivers of collective competence. Although there are some efforts to consider these concepts together; they are mostly discussed separately in the management theory. Thus, this paper aims to offer a holistic approach for development collective competence on the basis of Knowledge Management and Organizational Learning Capabilities. A theoretical model that defines a relationship between knowledge management, organizational learning and collective competence is presented at the end of this paper. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20competence" title="collective competence">collective competence</a>, <a href="https://publications.waset.org/abstracts/search?q=exploitation%20learning" title=" exploitation learning"> exploitation learning</a>, <a href="https://publications.waset.org/abstracts/search?q=exploration%20learning" title=" exploration learning"> exploration learning</a>, <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title=" knowledge management"> knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=organizational%20learning%20capabilities" title=" organizational learning capabilities"> organizational learning capabilities</a> </p> <a href="https://publications.waset.org/abstracts/19352/the-link-between-knowledge-management-organizational-learning-and-collective-competence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19352.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">507</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3462</span> The Right to Engage in Collective Bargaining in South Africa: An Exploratory Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Koboro%20J.%20Selala">Koboro J. Selala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Whilst the system of collective bargaining is well-researched in South Africa, recent studies reveal that this is an area of law and practice that is poorly understood. Despite the growing attention being paid by most scholars to the role of collective bargaining in the labour relations system, only a handful of the studies have considered collective bargaining as a mechanism of dispute resolution. The purpose of this paper is to provide a critical analysis of the current understanding of the right to engage in collective bargaining in South Africa to assess the extent to which collective bargaining is used to resolve labour disputes. The overall objective is to offer a deeper understanding of the role of collective bargaining in dispute resolution process within the South African constitutional labour law context. To this end, the paper examines the applicable legal framework of collective bargaining to address two fundamental questions that are critical to the proper understanding of the functioning of the South African collective labour dispute resolution system. The first concerns the extent to which the current South African legislative framework supports the fundamental labour rights entrenched in the Constitution of the Republic of South Africa. The second addresses the role of trade unions in collective dispute resolution processes and the extent to which they can best utilize collective bargaining to resolve labour disputes. Finally, the paper discusses the general implications of the findings to stimulate further research and to enhance the constitutional development of collective labour rights in South Africa. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20bargaining" title="collective bargaining">collective bargaining</a>, <a href="https://publications.waset.org/abstracts/search?q=constitution" title=" constitution"> constitution</a>, <a href="https://publications.waset.org/abstracts/search?q=freedom%20of%20association" title=" freedom of association"> freedom of association</a>, <a href="https://publications.waset.org/abstracts/search?q=labour%20relations%20act" title=" labour relations act"> labour relations act</a> </p> <a href="https://publications.waset.org/abstracts/61135/the-right-to-engage-in-collective-bargaining-in-south-africa-an-exploratory-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61135.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">324</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3461</span> Collective Redress in Consumer Protection in South East Europe: Cross-National Comparisons, Issues of Commonality and Difference</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Veronika%20Efremova">Veronika Efremova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent decades, there have been significant developments in the European Union in the field of collective consumer redress. <strong>South East European countries (SEE) covered by this paper, </strong>in line with their EU accession priorities and duties under Stabilisation and Association Agreements, have to harmonize their national laws with the relevant EU acquis for consumer protection (Chapter 28: Health and Consumer). In these countries, only minimal compliance is achieved. <strong>SEE countries have introduced rudimentary collective redress mechanisms, with modest </strong>enforcement of collective redress and case law. This paper is based on comprehensive interdisciplinary research conducted for SEE countries on common principles for injunctive and compensatory collective redress mechanisms, emphasizing cross-national comparisons, underlining issues of commonality and difference aiming to develop recommendations for an adequate enforcement of collective redress. SEE countries are recognized by the sectoral approach for regulating collective redress contrary to the majority of EU Member States with having adopted horizontal approach to collective redress. In most SEE countries, the laws do not recognize compensatory but only injunctive collective redress in consumer protection. All responsible stakeholders for implementation of collective redress in SEE countries, lack information and awareness on collective redress mechanisms and the way they function in practice. Therefore, specific actions are needed in these countries to make the whole system of collective redress for consumer protection operational and efficient. Taking into consideration the various designated stakeholders in collective redress in each SEE countries, there is a need of their mutual coordination and cooperation in order to develop consumer protection system and policies. By putting into practice the national collective redress mechanisms, effective access to justice for all consumers, the principle of rule of law will be secured and appropriate procedural guarantees to avoid abusive litigation will be ensured. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20redress%20mechanism" title="collective redress mechanism">collective redress mechanism</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20protection" title=" consumer protection"> consumer protection</a>, <a href="https://publications.waset.org/abstracts/search?q=commonality%20and%20difference" title=" commonality and difference"> commonality and difference</a>, <a href="https://publications.waset.org/abstracts/search?q=South%20East%20Europe" title=" South East Europe"> South East Europe</a> </p> <a href="https://publications.waset.org/abstracts/77607/collective-redress-in-consumer-protection-in-south-east-europe-cross-national-comparisons-issues-of-commonality-and-difference" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77607.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">220</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3460</span> The Potential of Cloud Computing in Overcoming the Problems of Collective Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hussah%20M.%20AlShayea">Hussah M. AlShayea</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study aimed to identify the potential of cloud computing, "Google Drive" in overcoming the problems of collective learning from the viewpoint of Princess Noura University students. The study included (92) students from the College of Education. To achieve the goal of the study, several steps have been taken. First, the most important problems of collective learning were identified from the viewpoint of the students. After that, a survey identifying the potential of cloud computing "Google Drive" in overcoming the problems of collective learning was distributed among the students. The study results showed that the students believe that the use of Google Drive contributed to overcoming these problems. In the light of those results, the researcher presented a set of recommendations and proposals, including: encouraging teachers and learners to employ cloud computing to overcome the problems and constraints of collective learning. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20learning" title=" collective learning"> collective learning</a>, <a href="https://publications.waset.org/abstracts/search?q=Google%20drive" title=" Google drive"> Google drive</a>, <a href="https://publications.waset.org/abstracts/search?q=Princess%20Noura%20University" title=" Princess Noura University"> Princess Noura University</a> </p> <a href="https://publications.waset.org/abstracts/16964/the-potential-of-cloud-computing-in-overcoming-the-problems-of-collective-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16964.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">492</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3459</span> Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saint%20C.%20Nguedjip">Saint C. Nguedjip</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=peace" title=" peace"> peace</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20governance" title=" global governance"> global governance</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20peace%20and%20security" title=" global peace and security"> global peace and security</a>, <a href="https://publications.waset.org/abstracts/search?q=peacekeeping" title=" peacekeeping"> peacekeeping</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20organizations" title=" international organizations"> international organizations</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=multilateralism" title=" multilateralism"> multilateralism</a>, <a href="https://publications.waset.org/abstracts/search?q=and%20unilateralism" title=" and unilateralism"> and unilateralism</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a> </p> <a href="https://publications.waset.org/abstracts/150349/global-peace-and-security-the-role-of-international-peace-and-security-organizations-and-the-need-for-institutional-and-operational-reforms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150349.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">104</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3458</span> Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vahid%20Bayrami%20Rad">Vahid Bayrami Rad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arduino%20board" title="arduino board">arduino board</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title=" image processing"> image processing</a>, <a href="https://publications.waset.org/abstracts/search?q=solenoid%20lock" title=" solenoid lock"> solenoid lock</a> </p> <a href="https://publications.waset.org/abstracts/182868/secret-security-smart-lock-using-artificial-intelligence-hybrid-algorithm" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/182868.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">69</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3457</span> The Social Process of Alternative Dispute Resolution and Collective Conciliation: Unveiling the Theoretical Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adejoke%20Yemisi%20Ige">Adejoke Yemisi Ige</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study presents a conceptual analysis and investigation into the development of a systematic framework required for better understanding of the social process of Alternative Dispute Resolution (ADR) and collective conciliation. The critical examination presented in this study is significant because; it draws on insight from ADR, negotiation and collective bargaining literature and applies it in our advancement of a methodical outline which gives an insight into the influence of the key actors and other stakeholder strategies and behaviours during dispute resolution in relation to the outcomes which is novel. This study is qualitative and essentially inductive in nature. One of the findings of the study confirms the need to consider ADR and collective conciliation within the context of the characteristic conditions; which focus on the need for some agreement to be reached. Another finding of the study shows the extent which information-sharing, willingness of the parties to negotiate and make concession assist both parties to attain resolution. This paper recommends that in order to overcome deadlock and attain acceptable outcomes at the end of ADR and collective conciliation, the importance of information exchange and sustenance of trade union and management relationship cannot be understated. The need for trade unions and management, the representatives to achieve their expectations in order to build the confidence and assurance of their respective constituents is essential. In conclusion, the analysis presented in this study points towards a set of factors that together can be called the social process of collective conciliation nevertheless; it acknowledges that its application to collective conciliation is new. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alternative%20dispute%20resolution" title="alternative dispute resolution">alternative dispute resolution</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20conciliation" title=" collective conciliation"> collective conciliation</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20process" title=" social process"> social process</a>, <a href="https://publications.waset.org/abstracts/search?q=theoretical%20framework" title=" theoretical framework"> theoretical framework</a>, <a href="https://publications.waset.org/abstracts/search?q=unveiling" title=" unveiling"> unveiling</a> </p> <a href="https://publications.waset.org/abstracts/82577/the-social-process-of-alternative-dispute-resolution-and-collective-conciliation-unveiling-the-theoretical-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82577.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3456</span> Collective Strategies Dominate in Spatial Iterated Prisoners Dilemma</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jiawei%20Li">Jiawei Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> How cooperation emerges and persists in a population of selfish agents is a fundamental question in evolutionary game theory. Our research shows that Collective Strategies with Master-Slave Mechanism (CSMSM) defeat Tit-for-Tat and other well-known strategies in spatial iterated prisoner’s dilemma. A CSMSM identifies kin members by means of a handshaking mechanism. If the opponent is identified as non-kin, a CSMSM will always defect. Once two CSMSMs meet, they play master and slave roles. A mater defects and a slave cooperates in order to maximize the master’s payoff. CSMSM outperforms non-collective strategies in spatial IPD even if there is only a small cluster of CSMSMs in the population. The existence and performance of CSMSM in spatial iterated prisoner’s dilemma suggests that cooperation first appears and persists in a group of collective agents. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Evolutionary%20game%20theory" title="Evolutionary game theory">Evolutionary game theory</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial%20prisoners%20dilemma" title=" spatial prisoners dilemma"> spatial prisoners dilemma</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20strategy" title=" collective strategy"> collective strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=master-slave%20mechanism" title=" master-slave mechanism"> master-slave mechanism</a> </p> <a href="https://publications.waset.org/abstracts/126877/collective-strategies-dominate-in-spatial-iterated-prisoners-dilemma" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/126877.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">149</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3455</span> Fighting for What’s Fair: Illegitimacy Appraisals as Drivers of Different Collective Action Responses to Economic Inequality</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Finn%20Lannon">Finn Lannon</a>, <a href="https://publications.waset.org/abstracts/search?q=Jenny%20Roth"> Jenny Roth</a>, <a href="https://publications.waset.org/abstracts/search?q=Roland%20Deutsch"> Roland Deutsch</a>, <a href="https://publications.waset.org/abstracts/search?q=Eric%20Igou"> Eric Igou</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The world continues to be rife with economic inequality, which has an impact on how people think and behaves in response to large and often growing gaps in wealth. Large gaps in earnings between groups within a particular organization, area or society can create tension between groups. Collective action tendencies (to protest, sign a petition, vote on behalf of an ingroup etc.) are also a growing phenomenon globally. Research shows that economic inequality promotes social processes such as appraisals of illegitimacy, which are recognized antecedents of collective action. This paper examines different types of collective action intentions among middle-status group members in response to economic inequality in two studies. Study 1 (N = 72) demonstrates a causal link between high economic inequality and collective action intentions of middle-status group members both to reduce inequality and to improve group status. A second pre-registered study (N = 432) examines key drivers of these relationships, including illegitimacy appraisals and direction of intergroup comparison. Adding to the current understanding of the topic, distinctions between the illegitimacy of one’s group status and the illegitimacy of societal inequality are found to mediate key relationships between economic inequality and relevant collective action types. The direction of intergroup comparison (upwards vs. downwards) is also shown to have a significant impact on collective action intentions to improve group status. Findings add to the understanding of the consequences of economic inequality and drivers of collective action intentions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=economic%20inequality" title="economic inequality">economic inequality</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20action" title=" collective action"> collective action</a>, <a href="https://publications.waset.org/abstracts/search?q=legitimacy" title=" legitimacy"> legitimacy</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20psychology" title=" social psychology"> social psychology</a> </p> <a href="https://publications.waset.org/abstracts/164373/fighting-for-whats-fair-illegitimacy-appraisals-as-drivers-of-different-collective-action-responses-to-economic-inequality" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164373.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">89</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3454</span> Collective Actions of the Women in Black of the Gaza Strip</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lina%20Fernanda%20Gonz%C3%A1lez">Lina Fernanda González</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Through this essay, an attempt will be made to make visible the work of the international network of the Women in Black (henceforth WB), on the one hand. On the other hand, the work of Women International Courts as a political practice will be showed as well, focusing their work into generating a collective identity - becoming thusly a peace building space, rescuing in this way the symbolic value of their practices consisting in peaceful resistance as political scenarios, that serve, too, a pedagogical and healing purposes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20actions" title="collective actions">collective actions</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a>, <a href="https://publications.waset.org/abstracts/search?q=peace" title=" peace"> peace</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights%20and%20humanitarian%20international%20law" title=" human rights and humanitarian international law"> human rights and humanitarian international law</a> </p> <a href="https://publications.waset.org/abstracts/35482/collective-actions-of-the-women-in-black-of-the-gaza-strip" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35482.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3453</span> The Mobilizing Role of Moral Obligation and Collective Action Frames in Two Types of Protest</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Monica%20Alzate">Monica Alzate</a>, <a href="https://publications.waset.org/abstracts/search?q=Marcos%20Dono"> Marcos Dono</a>, <a href="https://publications.waset.org/abstracts/search?q=Jose%20Manuel%20Sabucedo"> Jose Manuel Sabucedo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As long as collective action and its predictors constitute a big body of work in the field of political psychology, context-dependent studies and moral variables are a relatively new issue. The main goal of this presentation is to examine the differences in the predictors of collective action when taking into account two different types of protest, and also focus on the role of moral obligation as a predictor of collective action. To do so, we sampled both protesters and non-protesters from two mobilizations (N=376; N=563) of different nature (catalan Independence, and an 'indignados' march) and performed a logistic regression and a 2x2 MANOVA analysis. Results showed that the predictive variables that were more discriminative between protesters and non-protesters were identity, injustice, efficacy and moral obligation for the catalan Diada and injustice and moral obligation for the 'indignados'. Also while the catalans scored higher in the identification and efficacy variables, the indignados did so in injustice and moral obligation. Differences are evidenced between two types of collective action that coexist within the same protest cycle. The frames of injustice and moral obligation gain strength in the post-2010 mobilizations, a fact probably associated with the combination of materialist and post-materialist values that distinguish the movement. All of this emphasizes the need of studying protest from a contextual point of view. Besides, moral obligation emerges as key predictor of collective action engagement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20action" title="collective action">collective action</a>, <a href="https://publications.waset.org/abstracts/search?q=identity" title=" identity"> identity</a>, <a href="https://publications.waset.org/abstracts/search?q=moral%20obligation" title=" moral obligation"> moral obligation</a>, <a href="https://publications.waset.org/abstracts/search?q=protest" title=" protest"> protest</a> </p> <a href="https://publications.waset.org/abstracts/70968/the-mobilizing-role-of-moral-obligation-and-collective-action-frames-in-two-types-of-protest" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/70968.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">332</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3452</span> Legal Issues of Food Security in Republic of Kazakhstan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20T.%20Aigarinova">G. T. Aigarinova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article considers the legal issues of food security as a major component of national security of the republic. The problem of food security is the top priority of the economic policy strategy of any state, the effectiveness of this solution influences social, political, and ethnic stability in society. Food security and nutrition is everyone’s business. Food security exists when all people, at all times, have physical, social and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life. By analyzing the existing legislation in the area of food security, the author identifies weaknesses and gaps, suggesting ways to improve it. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20security" title="food security">food security</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security"> national security</a>, <a href="https://publications.waset.org/abstracts/search?q=agriculture" title=" agriculture"> agriculture</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20resources" title=" public resources"> public resources</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20security" title=" economic security"> economic security</a> </p> <a href="https://publications.waset.org/abstracts/4863/legal-issues-of-food-security-in-republic-of-kazakhstan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4863.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">424</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3451</span> Collective Behavior of Mice Passing through a Middle-Exit or Corner-Exit under Panic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Teng%20Zhang">Teng Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xuelin%20Zhang"> Xuelin Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Shouxiang%20Lu"> Shouxiang Lu</a>, <a href="https://publications.waset.org/abstracts/search?q=Changhai%20Li"> Changhai Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The existence of animal groups and collective migration are common in nature, and collective behavior is attracting more and more attention of researchers. Previous results have shown that architectural design had an important effect on the process of crowd evacuation. In this paper, collective behavior of mice passing through a middle-exit or corner-exit under panic was investigated. Selfish behavior and herd behavior were easily observed in our video, which caused the congregation with high density near the exit. Triangle structure of congregation formed near the middle-exit while arch structure formed near the corner-exit. It is noteworthy that the exit located at the middle of the wall was more effective for evacuation than at the corner. Meanwhile, the escape sequence of mouse passing through the exit was investigated, and the result showed that the priority depends largely on its location in the congregation. With the level of stimulus increasing, these phenomena still exist. The frequency distributions of time intervals and the burst sizes were also analyzed in this study to explore the secret of collective behavior of mice. These results could provide evidence for the hypothesis or prediction about human behavior in crowd evacuation. However, it is not clear whether the simulated results from different species can correspond to reality or not. Broader comparison among different species about this topic will be eager to be conducted to deepen our understanding of collective behavior in nature. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20behavior" title="collective behavior">collective behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=mice" title=" mice"> mice</a>, <a href="https://publications.waset.org/abstracts/search?q=evacuation" title=" evacuation"> evacuation</a>, <a href="https://publications.waset.org/abstracts/search?q=exit%20location" title=" exit location"> exit location</a> </p> <a href="https://publications.waset.org/abstracts/74873/collective-behavior-of-mice-passing-through-a-middle-exit-or-corner-exit-under-panic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74873.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">302</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3450</span> Security of Internet of Things: Challenges, Requirements and Future Directions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjad%20F.%20Alharbi">Amjad F. Alharbi</a>, <a href="https://publications.waset.org/abstracts/search?q=Bashayer%20A.%20Alotaibi"> Bashayer A. Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fahd%20S.%20Alotaibi"> Fahd S. Alotaibi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things%20%28IoT%29" title="Internet of Things (IoT)">Internet of Things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20challenges" title=" IoT security challenges"> IoT security challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20requirements" title=" IoT security requirements"> IoT security requirements</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20architecture" title=" IoT security architecture"> IoT security architecture</a> </p> <a href="https://publications.waset.org/abstracts/71488/security-of-internet-of-things-challenges-requirements-and-future-directions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">374</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3449</span> Postmodern Navy to Transnational Adaptive Navy: Positive Peace with Borderless Institutional Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Serkan%20Tezgel">Serkan Tezgel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Effectively managing threats and power that transcend national boundaries requires a reformulation from the traditional post-modern navy to an adaptive and institutional transnational navy. By analyzing existing soft power concept, post-modern navy, and sea power, this study proposes the transnational navy, founded on the triangle of main attributes of transnational companies, 'Global Competitiveness, Local Responsiveness, Worldwide Learning and Innovation Sharing', a new model which will lead to a positive peace with an institutional network. This transnational model necessitates 'Transnational Navies' to help establish peace with collective and transnational understanding during a transition period 'Reactive Postmodern Navy' has been experiencing. In this regard, it is fairly claimed that a new paradigm shift will revolve around sea power to establish good order at sea with collective and collaborative initiatives and bound to breed new theories and ideas in the forthcoming years. However, there are obstacles to overcome. Postmodern navies, currently shaped by 'Collective Maritime Security' and 'Collective Defense' concepts, can not abandon reactive applications and acts. States deploying postmodern navies to realize their policies on international platforms and seapower structures shaped by the axis of countries’ absolute interests resulted in multipolar alliances and coalitions, but the establishment of the peace. These obstacles can be categorized into three tiers in establishing a unique transnational model navy: Strategic, Organizational and Management challenges. To overcome these obstacles and challenges, postmodern navies should transform into cooperative, collective and independent soft transnational navies with the transnational mentality, global commons, and institutional network. Such an adaptive institution can help the world navigate to a positive peace. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=postmodern%20navy" title="postmodern navy">postmodern navy</a>, <a href="https://publications.waset.org/abstracts/search?q=transnational%20navy" title=" transnational navy"> transnational navy</a>, <a href="https://publications.waset.org/abstracts/search?q=transnational%20mentality" title=" transnational mentality"> transnational mentality</a>, <a href="https://publications.waset.org/abstracts/search?q=institutional%20network" title=" institutional network"> institutional network</a> </p> <a href="https://publications.waset.org/abstracts/7914/postmodern-navy-to-transnational-adaptive-navy-positive-peace-with-borderless-institutional-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7914.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">519</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3448</span> The Value of Job Security across Various Welfare Policies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eithan%20Hourie">Eithan Hourie</a>, <a href="https://publications.waset.org/abstracts/search?q=Miki%20Malul"> Miki Malul</a>, <a href="https://publications.waset.org/abstracts/search?q=Raphael%20Bar-El"> Raphael Bar-El</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To investigate the relationship between various welfare policies and the value of job security, we conducted a study with 201 people regarding their assessments of the value of job security with respect to three elements: income stability, assurance of continuity of employment, and security in the job. The experiment simulated different welfare policy scenarios, such as the amount and duration of unemployment benefits, workfare, and basic income. The participants evaluated the value of job security in various situations. We found that the value of job security is approximately 22% of the starting salary, which is distributed as follows: 13% reflects income security, 8.7% reflects job security, and about 0.3% is for being able to keep their current employment in the future. To the best of our knowledge, this article is one of the pioneers in trying to quantify the value of job security in different market scenarios and at varying levels of welfare policy. Our conclusions may help decision-makers when deciding on a welfare policy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=job%20security%20value" title="job security value">job security value</a>, <a href="https://publications.waset.org/abstracts/search?q=employment%20protection%20legislation" title=" employment protection legislation"> employment protection legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=status%20quo%20bias" title=" status quo bias"> status quo bias</a>, <a href="https://publications.waset.org/abstracts/search?q=expanding%20welfare%20policy" title=" expanding welfare policy"> expanding welfare policy</a> </p> <a href="https://publications.waset.org/abstracts/161025/the-value-of-job-security-across-various-welfare-policies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161025.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3447</span> Network Security Attacks and Defences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ranbir%20Singh">Ranbir Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Deepinder%20Kaur"> Deepinder Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20security" title="network security">network security</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=denial" title=" denial"> denial</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticating" title=" authenticating"> authenticating</a> </p> <a href="https://publications.waset.org/abstracts/53007/network-security-attacks-and-defences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53007.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3446</span> Criminal Law Instruments to Counter Corporate Crimes in Poland</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dorota%20Habrat">Dorota Habrat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Polish law, the idea of the introduction of corporate responsibility for crimes is becoming more popular and creates a lot of questions. The need to introduce into the Polish legal system liability of corporate (collective entities) has resulted, among others, from the Polish Republic's international commitments, in particular related to membership in the European Union. The Act of 28 October 2002 on the liability of collective entities for acts prohibited under penalty is one of the example of adaptation of Polish law to Community law. Introduction to Polish law a criminal nature liability of corporations (legal persons) has resulted in a lot of controversy and lack of acceptance from both the scientific community as well as the judiciary. The responsibility of collective entities under the Act has a criminal nature. The main question concerns the ability of the collective entity to be brought to guilt under criminal law sense. Polish criminal law knows only the responsibility of individual persons. So far, guilt as a personal feature of action, based on the ability of the offender to feel in his psyche, could be considered only in relation to the individual person, while the said Act destroyed this conviction. Guilt of collective entity must be proven under at least one of the three possible forms: the guilt in the selection or supervision and so called organizational guilt. The next question is how the principle of proportionality in relation to criminal measures in response of collective entities should be considered. It should be remembered that the legal subjectivity of collective entities, including their rights and freedoms, is an emanation of the rights and freedoms of individual persons which create collective entities and through these entities implement their rights and freedoms. The adopted Act largely reflects the international legal regulations but also contains the unknown and original legislative solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=criminal%20corporate%20responsibility" title="criminal corporate responsibility">criminal corporate responsibility</a>, <a href="https://publications.waset.org/abstracts/search?q=Polish%20criminal%20law" title=" Polish criminal law"> Polish criminal law</a>, <a href="https://publications.waset.org/abstracts/search?q=legislative%20solutions" title=" legislative solutions"> legislative solutions</a>, <a href="https://publications.waset.org/abstracts/search?q=Act%20of%2028%20October%202002" title=" Act of 28 October 2002"> Act of 28 October 2002</a> </p> <a href="https://publications.waset.org/abstracts/27400/criminal-law-instruments-to-counter-corporate-crimes-in-poland" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27400.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">505</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3445</span> Models of State Organization and Influence over Collective Identity and Nationalism in Spain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mu%C3%B1oz-Sanchez">Muñoz-Sanchez</a>, <a href="https://publications.waset.org/abstracts/search?q=Victor%20Manuel"> Victor Manuel</a>, <a href="https://publications.waset.org/abstracts/search?q=Perez-Flores"> Perez-Flores</a>, <a href="https://publications.waset.org/abstracts/search?q=Antonio%20Manuel"> Antonio Manuel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The main objective of this paper is to establish the relationship between models of state organization and the various types of collective identity expressed by the Spanish. The question of nationalism and identity ascription in Spain has always been a topic of special importance due to the presence in that country of territories where the population emits very different opinions of nationalist sentiment than the rest of Spain. The current situation of sovereignty challenge of Catalonia to the central government exemplifies the importance of the subject matter. In order to analyze this process of interrelation, we use a secondary data mining by applying the multiple correspondence analysis technique (MCA). As a main result a typology of four types of expression of collective identity based on models of State organization are shown, which are connected with the party position on this issue. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=models%20of%20organization%20of%20the%20state" title="models of organization of the state">models of organization of the state</a>, <a href="https://publications.waset.org/abstracts/search?q=nationalism" title=" nationalism"> nationalism</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20identity" title=" collective identity"> collective identity</a>, <a href="https://publications.waset.org/abstracts/search?q=Spain" title=" Spain"> Spain</a>, <a href="https://publications.waset.org/abstracts/search?q=political%20parties" title=" political parties"> political parties</a> </p> <a href="https://publications.waset.org/abstracts/40828/models-of-state-organization-and-influence-over-collective-identity-and-nationalism-in-spain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40828.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">443</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3444</span> Achieving Conviviality in Terms of Collective Experience through Creative Public Spaces in Namik Kemal Square, Famagusta, North Cyprus</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shirin%20Shaideh">Shirin Shaideh</a>, <a href="https://publications.waset.org/abstracts/search?q=Nina%20Shirkhanloo"> Nina Shirkhanloo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Creative public spaces were needed to foster conviviality in an urban form. The conviviality could be enhanced by facilitating variety of opportunities to participate in communal activities and promoting collective experiences. In this regard, The Namik Kemal Square as a major public space of Walled City of Famagusta in North Cyprus was found as the creative public space because it supports collective practices by leisure activities which enclosed the space. The square also utilized creative collaboration such as festivals and outdoor exhibition. Accordingly this paper focuses on the issue of conviviality in urban public space, in the perspective of square, as a major indicator of their success. The survey firstly provides a theoretical framework for understanding conviviality in creative public space to empower collective experience. Secondly it discusses the essential components of conviviality in form of square and finally investigating conviviality and also its determinants in Namik Kemal square. Hence, the main challenges of this study are going to focus on how convivial public spaces impact collective experience, what people expect from a kind of public space, or what they perceive as a good place to be in. Since it seems essential to respond positively, inclusively to the needs of people to socialize in public spaces by involving them in collective and common practices, this article aims to tease out what gives some places personality and conviviality so that we can learn to design, maintain and manage better quality built environment in future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=conviviality" title="conviviality">conviviality</a>, <a href="https://publications.waset.org/abstracts/search?q=creative%20public%20space" title=" creative public space"> creative public space</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20experience" title=" collective experience"> collective experience</a>, <a href="https://publications.waset.org/abstracts/search?q=Namik%20Kemal%20square" title=" Namik Kemal square"> Namik Kemal square</a> </p> <a href="https://publications.waset.org/abstracts/6127/achieving-conviviality-in-terms-of-collective-experience-through-creative-public-spaces-in-namik-kemal-square-famagusta-north-cyprus" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6127.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">429</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3443</span> Collective Efficacy and Rural Migration in Urban China—Social Determinants on Urbanization, Social Integration and Civic Engagement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ziwei%20Qi">Ziwei Qi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper focuses on issues on Urbanization, Rural Migration and Neighborhood Collective Efficacy in urban China. The urbanization and migration trend and policies in China will be discussed and the various mechanisms through which social structures affect economic action and the consequent of social disequilibrium due to urbanization will be discussed. The positive and negative propositions on urbanization will also be highlighted. The primary methodologies applied in the paper will be the theoretical application and empirical implication on urbanization in developing countries. Western sociological theories, including theories in urban criminology /sociology including social disorganization, theories of social capital and collective efficacy will be applied and analyzed to test the market society in Chinese economic and cultural setting. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20efficacy" title="collective efficacy">collective efficacy</a>, <a href="https://publications.waset.org/abstracts/search?q=civic%20engagement" title=" civic engagement"> civic engagement</a>, <a href="https://publications.waset.org/abstracts/search?q=rural%20migration" title=" rural migration"> rural migration</a>, <a href="https://publications.waset.org/abstracts/search?q=urbanization" title=" urbanization"> urbanization</a> </p> <a href="https://publications.waset.org/abstracts/36411/collective-efficacy-and-rural-migration-in-urban-china-social-determinants-on-urbanization-social-integration-and-civic-engagement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36411.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3442</span> Assessment on the Collective Memory after Alteration of Urban Heritage: Case Study of Hengshan Mansions in Shanghai</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yueying%20Chen">Yueying Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A city can be developed through memory, and memory is one of the most important elements for urban contexts. Collective memory is a collection of personal memories that can be preserved with objects, places, and events of heritage, expressing culture through spatial changes. These preserved forms can evoke a sense of community and certain emotions. Collective memory in cities reflects urban spatial alterations and historical developments. It can be preserved and reflected by revitalisation projects. A major current focus in collective memory research is how to identify and preserve memory in an intangible way. The influential elements within the preservation of collective memory mainly include institutions and objects. However, current research lacks the assessment of the collective memory after alterations of urban heritage. The assessment of urban heritage lacks visualization and qualitative methods. The emergence of the application of space syntax can fill in this gap. Hengshan Mansions was a new project in 2015. The original residential area has been replaced with a comprehensive commercial area integrating boutique shopping, upscale restaurants, and creative offices. Hengshan Mansions is located in the largest historic area in Shanghai, and its development is the epitome of the traditional culture in Shanghai. Its alteration is the newest project in this area and presents the new concept of revitalisation of urban heritage. For its physical parts, modern vitality is created, and historical information is preserved at the same time. However, most of the local people are moved away, and its functions are altered a lot. The preservation of its collective memory needs to discuss furtherly. Thus, the article builds a framework to assess the collective memory of urban heritage, including spatial configuration, spatial interaction, and cultural cognition. Then, it selects Hengshan Mansions in Shanghai as a case to analyse the assessed framework. Space syntax can be applied to visualize the assessment. Based on the analysis, the article will explore the influential reasons for the collective memory after alterations and proposes relevant advice for the preservation of the collective memory of urban heritage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20memory" title="collective memory">collective memory</a>, <a href="https://publications.waset.org/abstracts/search?q=alternation%20of%20urban%20heritage" title=" alternation of urban heritage"> alternation of urban heritage</a>, <a href="https://publications.waset.org/abstracts/search?q=space%20syntax" title=" space syntax"> space syntax</a>, <a href="https://publications.waset.org/abstracts/search?q=Hengshan%20Mansions" title=" Hengshan Mansions"> Hengshan Mansions</a> </p> <a href="https://publications.waset.org/abstracts/139609/assessment-on-the-collective-memory-after-alteration-of-urban-heritage-case-study-of-hengshan-mansions-in-shanghai" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139609.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3441</span> The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ari%20S.%20Prabowo">Ari S. Prabowo</a>, <a href="https://publications.waset.org/abstracts/search?q=Nia%20Febriyanti"> Nia Febriyanti</a>, <a href="https://publications.waset.org/abstracts/search?q=Haryono%20B.%20Santosa"> Haryono B. Santosa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=laboratory" title="laboratory">laboratory</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20protection%20system" title=" physical protection system"> physical protection system</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20culture" title=" security culture"> security culture</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20function" title=" security function"> security function</a> </p> <a href="https://publications.waset.org/abstracts/102746/the-benefits-of-security-culture-for-improving-physical-protection-systems-at-detection-and-radiation-measurement-laboratory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102746.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3440</span> Monitoring Co-Creation: A Survey of Lithuanian Urban Communities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aelita%20Skarzauskiene">Aelita Skarzauskiene</a>, <a href="https://publications.waset.org/abstracts/search?q=Monika%20Maciuliene"> Monika Maciuliene</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we conduct a systematic survey of urban communities in Lithuania to evaluate their potential to co-create collective intelligence or “civic intelligence” applying Digital Co-creation Index methodology that includes different socio-technological indicators. Civic intelligence is a form of collective intelligence that refers to the group’s capacity to perceive societal problems and to address them effectively. The research focuses on evaluation of diverse organizational designs that increase efficient collective performance. The current scientific project advanced the state of the art by evaluating the basic preconditions in the urban communities through which the collective intelligence is being co-created under the systemic manner. The research subject is the <em>“bottom up”</em> digital enabled urban platforms, initiated by Lithuanian public organizations, civic movements or business entities. The web-based monitoring results obtained by applying a social indices calculation methodology and Pearson correlation analysis provided the information about the potential and limits of the urban communities and what possible changes need to be implemented to overcome the limitations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20supported%20collaboration" title="computer supported collaboration">computer supported collaboration</a>, <a href="https://publications.waset.org/abstracts/search?q=socio-technological%20system" title=" socio-technological system"> socio-technological system</a>, <a href="https://publications.waset.org/abstracts/search?q=collective%20intelligence" title=" collective intelligence"> collective intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=networked%20society" title=" networked society"> networked society</a> </p> <a href="https://publications.waset.org/abstracts/98638/monitoring-co-creation-a-survey-of-lithuanian-urban-communities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/98638.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3439</span> Blockchain Solutions for IoT Challenges: Overview</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Ali%20Fatoorchi">Amir Ali Fatoorchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Regardless of the advantage of LoT devices, they have limitations like storage, compute, and security problems. In recent years, a lot of Blockchain-based research in IoT published and presented. In this paper, we present the Security issues of LoT. IoT has three levels of security issues: Low-level, Intermediate-level, and High-level. We survey and compare blockchain-based solutions for high-level security issues and show how the underlying technology of bitcoin and Ethereum could solve IoT problems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Blockchain" title="Blockchain">Blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20security" title=" data security"> data security</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a> </p> <a href="https://publications.waset.org/abstracts/142808/blockchain-solutions-for-iot-challenges-overview" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142808.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3438</span> Financial Information and Collective Bargaining: Conflicting or Complementing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Humayun%20Murshed">Humayun Murshed</a>, <a href="https://publications.waset.org/abstracts/search?q=Shibly%20Abdullah"> Shibly Abdullah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The research conducted in early seventies apparently assumed the existence of a universal decision model for union negotiators and furthermore tended to regard financial information as a ‘neutral’ input into a rational decision-making process. However, research in the eighties began to question the neutrality of financial information as an input in collective bargaining rather viewing it as a potentially effective means for controlling the labour force. Furthermore, this later research also started challenging the simplistic assumptions relating particularly to union objectives which have underpinned the earlier search for universal union decision models. Despite the above developments there seems to be a dearth of studies in developing countries concerning the use of financial information in collective bargaining. This paper seeks to begin to remedy this deficiency. Utilising a case study approach based on two enterprises, one in the public sector and the other a multinational, the universal decision model is rejected and it is argued that the decision whether or not to use financial information is a contingent one and such a contingency is largely defined by the context and environment in which both union and management negotiators work. An attempt is also made to identify the factors constraining as well as promoting the use of financial information in collective bargaining, these being regarded as unique to the organizations within which the case studies are conducted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=collective%20bargaining" title="collective bargaining">collective bargaining</a>, <a href="https://publications.waset.org/abstracts/search?q=developing%20countries" title=" developing countries"> developing countries</a>, <a href="https://publications.waset.org/abstracts/search?q=disclosures" title=" disclosures"> disclosures</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20information" title=" financial information"> financial information</a> </p> <a href="https://publications.waset.org/abstracts/19504/financial-information-and-collective-bargaining-conflicting-or-complementing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19504.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">471</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=115">115</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=116">116</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=collective%20security&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>