CINXE.COM
Search results for: british security strategy
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: british security strategy</title> <meta name="description" content="Search results for: british security strategy"> <meta name="keywords" content="british security strategy"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="british security strategy" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="british security strategy"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 6726</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: british security strategy</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6726</span> A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuhong%20Li">Yuhong Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Luyu%20Mao"> Luyu Mao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=disembedding%20mechanism" title="disembedding mechanism">disembedding mechanism</a>, <a href="https://publications.waset.org/abstracts/search?q=bosnia%20war" title=" bosnia war"> bosnia war</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20russian-ukrainian%20war" title=" the russian-ukrainian war"> the russian-ukrainian war</a>, <a href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy" title=" british security strategy"> british security strategy</a> </p> <a href="https://publications.waset.org/abstracts/167052/a-study-of-the-british-security-disembedding-mechanism-from-a-comparative-political-perspective-centering-on-the-bosnia-war-and-the-russian-ukrainian-war" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/167052.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6725</span> Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erdianta%20S">Erdianta S</a>, <a href="https://publications.waset.org/abstracts/search?q=Chastiti%20M.%20Wulolo"> Chastiti M. Wulolo</a>, <a href="https://publications.waset.org/abstracts/search?q=IDK%20Kerta%20Widana"> IDK Kerta Widana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Indonesia" title="Indonesia">Indonesia</a>, <a href="https://publications.waset.org/abstracts/search?q=Perang%20Semesta%20strategy" title=" Perang Semesta strategy"> Perang Semesta strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security"> national security</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20wisdom" title=" local wisdom"> local wisdom</a> </p> <a href="https://publications.waset.org/abstracts/80513/defense-strategy-perang-semesta-strategy-as-a-reliable-national-security-system-of-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80513.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">453</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6724</span> Cyber Security in Russia: Offense, Defense and Strategy in Cyberspace</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Da%20Eun%20Sung">Da Eun Sung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In today’s world, cyber security has become an important international agenda. As the information age has arrived, the need for cyber defense against cyber attacks is mounting, and the significance of cyber cooperation in the international community is drawing attention. Through the course, international society has agreed that the institutionalization of international norms dealing with cyber space and cyber security is crucial ever. Nevertheless, the West, led by the United States of America, and 'the East', composed of Russia and China, have shown conflicting views on forming international norms and principles which would regulate and ward off the possible threats in cyber space. Thus, the international community hasn’t yet to reach an agreement on cyber security. In other words, the difference between both sides on the approach and understanding of principles, objects, and the definition has rendered such. Firstly, this dissertation will cover the Russia’s perception, strategy, and definition on cyber security through analyzing primary source. Then, it will delve into the two contrasting cyber security strategy between Russia and the US by comparing them. And in the conclusion, it will seek the possible solution for the cooperation in the field of cyber security. It is quite worthwhile to look into Russia’s views, which is the main counterpart to the US in this field, especially when the efforts to institutionalize cyber security by the US-led international community have met with their boundaries, and when the legitimacy of them have been challenged. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title="cyber security">cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security%20strategic" title=" cyber security strategic"> cyber security strategic</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20relation%20in%20cyberspace" title=" international relation in cyberspace"> international relation in cyberspace</a>, <a href="https://publications.waset.org/abstracts/search?q=Russia" title=" Russia"> Russia</a> </p> <a href="https://publications.waset.org/abstracts/79049/cyber-security-in-russia-offense-defense-and-strategy-in-cyberspace" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79049.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">319</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6723</span> Legal Issues of Food Security in Republic of Kazakhstan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20T.%20Aigarinova">G. T. Aigarinova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article considers the legal issues of food security as a major component of national security of the republic. The problem of food security is the top priority of the economic policy strategy of any state, the effectiveness of this solution influences social, political, and ethnic stability in society. Food security and nutrition is everyone’s business. Food security exists when all people, at all times, have physical, social and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life. By analyzing the existing legislation in the area of food security, the author identifies weaknesses and gaps, suggesting ways to improve it. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20security" title="food security">food security</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security"> national security</a>, <a href="https://publications.waset.org/abstracts/search?q=agriculture" title=" agriculture"> agriculture</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20resources" title=" public resources"> public resources</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20security" title=" economic security"> economic security</a> </p> <a href="https://publications.waset.org/abstracts/4863/legal-issues-of-food-security-in-republic-of-kazakhstan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4863.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6722</span> Competitive Intelligence within the Maritime Security Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dicky%20R.%20Munaf">Dicky R. Munaf</a>, <a href="https://publications.waset.org/abstracts/search?q=Ayu%20Bulan%20Tisna"> Ayu Bulan Tisna</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=competitive%20intelligence" title="competitive intelligence">competitive intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=maritime%20security%20intelligence" title=" maritime security intelligence"> maritime security intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligent%20systems" title=" intelligent systems"> intelligent systems</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a> </p> <a href="https://publications.waset.org/abstracts/6935/competitive-intelligence-within-the-maritime-security-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6935.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">500</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6721</span> Adult Education for Transformation and Security Challenges in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asmau%20Zarma%20Gogaram">Asmau Zarma Gogaram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adult%20education" title="adult education">adult education</a>, <a href="https://publications.waset.org/abstracts/search?q=transformation%20and%20security%20challenges" title=" transformation and security challenges"> transformation and security challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=education%20and%20human%20development" title=" education and human development"> education and human development</a> </p> <a href="https://publications.waset.org/abstracts/23218/adult-education-for-transformation-and-security-challenges-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23218.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">523</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6720</span> English as a Foreign Language Students’ Perceptions towards the British Culture: The Case of Batna 2 University, Algeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Djelloul%20Nedjai">Djelloul Nedjai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The issue of cultural awareness triggers many controversies, especially in a context where individuals do not share the same cultural backgrounds and characteristics. The Algerian context is no exception. It has been widely documented by the literature that culture remains essential in many domains. In higher education, for instance, culture plays a pivotal role in shaping individuals’ perceptions and attitudes. Henceforth, the current paper attempts to look at the perceptions of the British culture held by students engaged in learning English as a Foreign Language (EFL) at the department of English at Banta 2 University, Algeria. It also inquires into EFL students’ perceptions of British culture. To address the aforementioned research queries, a descriptive study has been carried out wherein a questionnaire of fifteen (15) items has been deployed to collect students’ attitudes and perceptions toward British culture. Results showcase that, indeed, EFL students of the department of English at Banta 2 University hold both positive and negative perceptions towards British culture at different levels. The explanation could relate to the student's lack of acquaintance with and awareness of British culture. Consequently, this paper is an attempt to address the issue of cultural awareness from the perspective of EFL students. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=British%20culture" title="British culture">British culture</a>, <a href="https://publications.waset.org/abstracts/search?q=cultural%20awareness" title=" cultural awareness"> cultural awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=EFL%20students%E2%80%99%20perceptions" title=" EFL students’ perceptions"> EFL students’ perceptions</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title=" higher education"> higher education</a> </p> <a href="https://publications.waset.org/abstracts/154181/english-as-a-foreign-language-students-perceptions-towards-the-british-culture-the-case-of-batna-2-university-algeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154181.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">90</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6719</span> Defining the Term of Strategy within Military Point of View</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ismail%20Menderes%20Sema">Ismail Menderes Sema</a>, <a href="https://publications.waset.org/abstracts/search?q=Murat%20S%C3%B6zen"> Murat Sözen</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20K.%20Bar%C4%B1%C5%9F"> M. K. Barış </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The strategy is about winning or preventing your enemy from winning. The origin of the term comes from the military. After utilizing the strategy for limited military purposes in early ages, soldiers and statesmen used the term together to achieve the goals of states. In ancient times, those people who made strategy and implemented it was the same. With the industrial revolution, the strategy changed like everything and the term “grand strategy” came forward. Today, from business to economy, management to philosophy there is a broad using of the term strategy. Economic strategy, business strategy, trade strategy, irrigation strategy, and even recruitment strategy are used by professionals. The purpose of this study is to analyze the evolution of the strategy and clarify actually what is about. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=strategy" title="strategy">strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=military" title=" military"> military</a>, <a href="https://publications.waset.org/abstracts/search?q=art" title=" art"> art</a>, <a href="https://publications.waset.org/abstracts/search?q=grand%20strategy" title=" grand strategy"> grand strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=strategist" title=" strategist"> strategist</a> </p> <a href="https://publications.waset.org/abstracts/31137/defining-the-term-of-strategy-within-military-point-of-view" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31137.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">454</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6718</span> Enhancing Maritime Governance in Africa: Challenges of Maritime Policy Development in the East African Community</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Christantus%20Begealawuh%20Nchongayi">Christantus Begealawuh Nchongayi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As clearly stated in goal 14 of sustainable development goals, global oceans greatly contribute to making the earth habitable for mankind. This explains why ocean governance is an important global concern today. The emerging maritime security problems and the impact of climate change on African oceans, evidenced by tropical cyclones as seen recently in the Southern region of Africa, is also an indication that maritime governance and policymaking are important elements of peace and security in Africa. Within the last decade, there have been commendable efforts towards maritime governance and policymaking in Africa, although implementation of existing maritime policies is still lacking. This paper provides a snapshot of the overall state of the maritime policymaking process in Africa. It specifically explores the challenges facing policymakers in developing national and regional maritime security strategy in the East African Community. For methodology, the paper relied on primary and secondary data. Primary data was collected from informal discussions with policymakers and key policy-making bodies in Africa, and from a survey of public opinions. The study found that the Africa Integrated Maritime Strategy (2050 AIMS) is a recent template for regional and national maritime security policymaking in Africa and that although maritime security has in the past not been prioritized in the security agenda of the East African Community, developing and aligning a regional maritime security strategy to the 2050 AIMS will result to positive regional integration outcomes in East Africa. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=2050%20Africa%20integrated%20maritime%20strategy" title="2050 Africa integrated maritime strategy">2050 Africa integrated maritime strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=east%20African%20community" title=" east African community"> east African community</a>, <a href="https://publications.waset.org/abstracts/search?q=maritime%20policy-making" title=" maritime policy-making"> maritime policy-making</a>, <a href="https://publications.waset.org/abstracts/search?q=maritime%20security" title=" maritime security"> maritime security</a> </p> <a href="https://publications.waset.org/abstracts/115035/enhancing-maritime-governance-in-africa-challenges-of-maritime-policy-development-in-the-east-african-community" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/115035.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">216</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6717</span> Identifying Neighborhoods at Potential Risk of Food Insecurity in Rural British Columbia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amirmohsen%20Behjat">Amirmohsen Behjat</a>, <a href="https://publications.waset.org/abstracts/search?q=Aleck%20Ostry"> Aleck Ostry</a>, <a href="https://publications.waset.org/abstracts/search?q=Christina%20Miewald"> Christina Miewald</a>, <a href="https://publications.waset.org/abstracts/search?q=Bernie%20Pauly"> Bernie Pauly</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Substantial research has indicated that socioeconomic and demographic characteristics’ of neighborhoods are strong determinants of food security. The aim of this study was to develop a Food Insecurity Neighborhood Index (FINI) based on the associated socioeconomic and demographic variables to identify the areas at potential risk of food insecurity in rural British Columbia (BC). Principle Component Analysis (PCA) technique was used to calculate the FINI for each rural Dissemination Area (DA) using the food security determinant variables from Canadian Census data. Using ArcGIS, the neighborhoods with the top quartile FINI values were classified as food insecure. The results of this study indicated that the most food insecure neighborhood with the highest FINI value of 99.1 was in the Bulkley-Nechako (central BC) area whereas the lowest FINI with the value of 2.97 was for a rural neighborhood in the Cowichan Valley area. In total, 98.049 (19%) of the rural population of British Columbians reside in high food insecure areas. Moreover, the distribution of food insecure neighborhoods was found to be strongly dependent on the degree of rurality in BC. In conclusion, the cluster of food insecure neighbourhoods was more pronounced in Central Coast, Mount Wadington, Peace River, Kootenay Boundary, and the Alberni-Clayoqout Regional Districts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=neighborhood%20food%20insecurity%20index" title="neighborhood food insecurity index">neighborhood food insecurity index</a>, <a href="https://publications.waset.org/abstracts/search?q=socioeconomic%20and%20demographic%20determinants" title=" socioeconomic and demographic determinants"> socioeconomic and demographic determinants</a>, <a href="https://publications.waset.org/abstracts/search?q=principal%20component%20analysis" title=" principal component analysis"> principal component analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=Canada%20census" title=" Canada census"> Canada census</a>, <a href="https://publications.waset.org/abstracts/search?q=ArcGIS" title=" ArcGIS"> ArcGIS</a> </p> <a href="https://publications.waset.org/abstracts/96068/identifying-neighborhoods-at-potential-risk-of-food-insecurity-in-rural-british-columbia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/96068.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6716</span> Secure Optical Communication System Using Quantum Cryptography</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ehab%20AbdulRazzaq%20Hussein">Ehab AbdulRazzaq Hussein</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20distribution" title=" key distribution"> key distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20protocols" title=" quantum protocols"> quantum protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=Quantum%20Cryptography%20%28QC%29" title=" Quantum Cryptography (QC)"> Quantum Cryptography (QC)</a>, <a href="https://publications.waset.org/abstracts/search?q=Quantum%20Key%20Distribution%20%28QKD%29." title=" Quantum Key Distribution (QKD)."> Quantum Key Distribution (QKD).</a> </p> <a href="https://publications.waset.org/abstracts/2413/secure-optical-communication-system-using-quantum-cryptography" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2413.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6715</span> The Connection Between the International Law and the Legal Consultation on the Social Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Farouk%20Ahmed%20Ali%20Hussin">Amir Farouk Ahmed Ali Hussin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=international%20legal" title="international legal">international legal</a>, <a href="https://publications.waset.org/abstracts/search?q=consultation%20mix" title=" consultation mix"> consultation mix</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20research" title=" legal research"> legal research</a>, <a href="https://publications.waset.org/abstracts/search?q=small%20and%20medium-sized%20enterprises" title=" small and medium-sized enterprises"> small and medium-sized enterprises</a>, <a href="https://publications.waset.org/abstracts/search?q=strategic%20International%20law" title=" strategic International law"> strategic International law</a>, <a href="https://publications.waset.org/abstracts/search?q=strategy%20alignment" title=" strategy alignment"> strategy alignment</a>, <a href="https://publications.waset.org/abstracts/search?q=house%20of%20laws" title=" house of laws"> house of laws</a>, <a href="https://publications.waset.org/abstracts/search?q=deployment" title=" deployment"> deployment</a>, <a href="https://publications.waset.org/abstracts/search?q=production%20strategy" title=" production strategy"> production strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=legal%20strategy" title=" legal strategy"> legal strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=business%20strategy" title=" business strategy"> business strategy</a> </p> <a href="https://publications.waset.org/abstracts/183135/the-connection-between-the-international-law-and-the-legal-consultation-on-the-social-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183135.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">63</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6714</span> The Impact of India’s Centre-State Relations on its Maritime Counter-Terrorism Strategy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Riddhi%20Shah">Riddhi Shah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Centre-state relations in India are a fascinating area of studies. The structure of the relationship has an effect on every single aspect of life as we know it in India. This paper is an attempt to study centre-state relations in the context of India’s maritime counter-terrorism strategy. Although the Government of India has not publicly stated its counter-terrorism strategy on the sea; intelligence, information sharing, crisis response, finances for internal security and the nation’s legislation for battling terrorism together comprise of India’s maritime-terrorism strategy. Through study of these areas, the paper argues that the centre-state divide has had systemic implications on India’s maritime security and has largely done more harm than good to collective initiatives that aspire to prevent future risk of terrorism from the sea or on the sea. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism" title="counter-terrorism">counter-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=maritime%20terrorism" title=" maritime terrorism"> maritime terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=India" title=" India"> India</a>, <a href="https://publications.waset.org/abstracts/search?q=federalism" title=" federalism"> federalism</a>, <a href="https://publications.waset.org/abstracts/search?q=centre-state%20relations" title=" centre-state relations"> centre-state relations</a> </p> <a href="https://publications.waset.org/abstracts/2904/the-impact-of-indias-centre-state-relations-on-its-maritime-counter-terrorism-strategy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2904.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">600</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6713</span> British English vs. American English: A Comparative Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Halima%20Benazzouz">Halima Benazzouz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is often believed that British English and American English are the foremost varieties of the English Language serving as reference norms for other varieties;that is the reason why they have obviously been compared and contrasted.Meanwhile,the terms “British English” and “American English” are used differently by different people to refer to: 1) Two national varieties each subsuming regional and other sub-varieties standard and non-standard. 2) Two national standard varieties in which each one is only part of the range of English within its own state, but the most prestigious part. 3) Two international varieties, that is each is more than a national variety of the English Language. 4) Two international standard varieties that may or may not each subsume other standard varieties.Furthermore,each variety serves as a reference norm for users of the language elsewhere. Moreover, without a clear identification, as primarily belonging to one variety or the other, British English(Br.Eng) and American English (Am.Eng) are understood as national or international varieties. British English and American English are both “variants” and “varieties” of the English Language, more similar than different.In brief, the following may justify general categories of difference between Standard American English (S.Am.E) and Standard British English (S.Br.e) each having their own sociolectic value: A difference in pronunciation exists between the two foremost varieties, although it is the same spelling, by contrast, a divergence in spelling may be recognized, eventhough the same pronunciation. In such case, the same term is different but there is a similarity in spelling and pronunciation. Otherwise, grammar, syntax, and punctuation are distinctively used to distinguish the two varieties of the English Language. Beyond these differences, spelling is noted as one of the chief sources of variation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Greek" title="Greek">Greek</a>, <a href="https://publications.waset.org/abstracts/search?q=Latin" title=" Latin"> Latin</a>, <a href="https://publications.waset.org/abstracts/search?q=French%20pronunciation%20expert" title=" French pronunciation expert"> French pronunciation expert</a>, <a href="https://publications.waset.org/abstracts/search?q=varieties%20of%20English%20language" title=" varieties of English language"> varieties of English language</a> </p> <a href="https://publications.waset.org/abstracts/15569/british-english-vs-american-english-a-comparative-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15569.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">501</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6712</span> Search for Alternative Strategy to Enhancing Food Security at Household Level: Hybrid Urban Agriculture as a Strategy </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nyumbaiza%20Tambwe">Nyumbaiza Tambwe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this paper is to demonstrate that hybrid urban agriculture as the most practiced type of urban agriculture in the majority of cities in sub-Saharan Africa can be taken as an alternative strategy in fighting food insecurity. The practice not only provides food, generates income and fights against unemployment; it constitutes a true back-up for households during crisis linked to the nature of capitalism system. African cities are mostly characterized by rapid population growth, rampant poverty, and high level of unemployment and food insecurity. Those factors and many others are at the origin of the emergence of urban agriculture in many African cities. Based particularly on results of research undertaken in the Democratic Republic of Congo (DRC), but also in comparison with those realized in other parts of the African continent, the paper is a case study. Therefore, the paper firstly describes the situation of food in Africa, secondly, presents hybrid urban agriculture as a household strategy in fighting food insecurity and finally shows possibilities and limits of this practice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=alternative%20strategy" title="alternative strategy">alternative strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=food%20security" title=" food security"> food security</a>, <a href="https://publications.waset.org/abstracts/search?q=household%20strategy" title=" household strategy"> household strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20urban%20agriculture" title=" hybrid urban agriculture"> hybrid urban agriculture</a> </p> <a href="https://publications.waset.org/abstracts/60868/search-for-alternative-strategy-to-enhancing-food-security-at-household-level-hybrid-urban-agriculture-as-a-strategy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60868.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">326</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6711</span> Disclosure in the Defence of Sexual Assault</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tony%20Zipp">Tony Zipp</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper will identify developments in the law in British Columbia, Canada, to disclosure to be provided to the defense in cases of sexual misconduct and sexual assault. Disclosure is the keystone to providing a full and robust defense to such charges. The investigation of sexual misconduct and sexual assault involving children usually involves multiple government agencies. This includes child welfare agencies, police and other social service participants. This paper will examine situations in which Courts have ordered disclosure of material from non-police agencies in criminal cases of charges of sexual assault when that material is ‘obviously relevant’ to the charges to enable the defense to present full answer and defense to the charges. The methodology of the oral presentation/paper will be a case analysis of decisions of the Supreme Court of British Columbia, the British Columbia Court of Appeal and the Supreme Court of Canada in the area of disclosure to the defense in criminal trials, including those for sexual assault and sexual misconduct. The emphasis will be on the decisions that expand the disclosure available. The robust defense of these charges is significant to the rule of law as it engenders public confidence in the Judicial system by remembering to protect the innocent while prosecuting these allegations. As such, disclosure is fundamental to human rights and human security. Human rights and human security cannot exclusively be confined to alleged victims but must also protect the rights of those charged to a fair Judicial process. This oral presentation/paper will illustrate that fulsome disclosure enhances the rule of law and law enforcement rather than hinders the prosecution of charges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=defence" title="defence">defence</a>, <a href="https://publications.waset.org/abstracts/search?q=law" title=" law"> law</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20rights" title=" human rights"> human rights</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20assault" title=" sexual assault"> sexual assault</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20misconduct" title=" sexual misconduct"> sexual misconduct</a> </p> <a href="https://publications.waset.org/abstracts/189376/disclosure-in-the-defence-of-sexual-assault" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/189376.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">24</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6710</span> The Role of British Public Opinion in the Process of the Great Britain’s Involvement in the Crimean War</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aysen%20Muderrisoglu">Aysen Muderrisoglu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As a result of the policies constituted and pursued by Russia which aimed to gain territory and power at Ottoman expense, Crimean War broke out in 1853. Nevertheless, the Eastern policies of Russia were in contradiction with the interests of Great Britain which was the great power of the era. Yet, it did hesitate to be confronted with Russian on its route to India, so the Ottoman territorial integrity was defended. In that period, Tzar Nicholas II, to begin with, tried to eliminate a probable opposition coming from the British side, and then tried its chance to build up cooperation with Britain on the territories of the sick man. As a more positive relation was being observed between these two states before the Crimean War, Great Britain initially had adopted a neutral policy. However, in the end, Britain entered the war against Russia due to the efforts of the opposing side in the British Parliament and the rising pressure of the public opinion. The article aims to examine the role of British public opinion in the process of Great Britain’s Involvement in this war. Also, the article will try to find an answer to the following question: to what extent did the public opinion become effective on the foreign policy-making of Great Britain before the war? <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=British%20press" title="British press">British press</a>, <a href="https://publications.waset.org/abstracts/search?q=Crimean%20war" title=" Crimean war"> Crimean war</a>, <a href="https://publications.waset.org/abstracts/search?q=Great%20Britain" title=" Great Britain"> Great Britain</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20opinion" title=" public opinion"> public opinion</a> </p> <a href="https://publications.waset.org/abstracts/95464/the-role-of-british-public-opinion-in-the-process-of-the-great-britains-involvement-in-the-crimean-war" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95464.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6709</span> Design and Realization of Computer Network Security Perception Control System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=El%20Miloudi%20Djelloul">El Miloudi Djelloul</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20network" title="computer network">computer network</a>, <a href="https://publications.waset.org/abstracts/search?q=perception%20control%20system%0D%0Asecurity%20strategy" title=" perception control system security strategy"> perception control system security strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=Radio%20Frequency%20Identification%20%28RFID%29" title=" Radio Frequency Identification (RFID) "> Radio Frequency Identification (RFID) </a> </p> <a href="https://publications.waset.org/abstracts/18725/design-and-realization-of-computer-network-security-perception-control-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18725.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">446</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6708</span> Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Erhan%20Turgut">Erhan Turgut</a>, <a href="https://publications.waset.org/abstracts/search?q=Salih%20Erg%C3%BCn"> Salih Ergün</a>, <a href="https://publications.waset.org/abstracts/search?q=Abd%C3%BClkadir%20%C3%96z"> Abdülkadir Öz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=terrorism" title="terrorism">terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=counter-terrorism" title=" counter-terrorism"> counter-terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=military%20status%20law-enforcement" title=" military status law-enforcement"> military status law-enforcement</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorist%20groups" title=" terrorist groups"> terrorist groups</a> </p> <a href="https://publications.waset.org/abstracts/2383/analyzing-and-determining-the-ideal-response-force-for-combatting-terrorist-groups" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2383.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">461</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6707</span> Factors Affecting the Critical Understanding of the Strategies Which Children Use to Motivate Parents in the Family Buying Process: Case of British Bangladeshi Children in the UK</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Salma%20Akter">Salma Akter</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20M.%20Haque"> Mohammad M. Haque</a>, <a href="https://publications.waset.org/abstracts/search?q=Lawrence%20Akwetey"> Lawrence Akwetey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An empirical research design will analyze different factors/predictors children use to influence their parents in the family buying decision process in the unexplored area of British Bangladeshi children in the United Kingdom. The proposed conceptual model of factors- buying decision making process will be tested by the Structure Equation Model. A structured Questionnaire and secondary sources will employ to collect data and analyse and measure the validity by Statistical tools (SPSS) and Microsoft Excel. The Contemporary research aims to use the deductive approach developing the research questions and testing the hypothesis to identify the impact of different strategies British Bangladeshi children used to influence their parents in the family buying decision which was overlooked in the previous research. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=British%20Bangladeshi%20children" title="British Bangladeshi children">British Bangladeshi children</a>, <a href="https://publications.waset.org/abstracts/search?q=buying%20decision%20process" title=" buying decision process"> buying decision process</a>, <a href="https://publications.waset.org/abstracts/search?q=children%20influence" title=" children influence"> children influence</a>, <a href="https://publications.waset.org/abstracts/search?q=influential%20factors" title=" influential factors"> influential factors</a> </p> <a href="https://publications.waset.org/abstracts/42499/factors-affecting-the-critical-understanding-of-the-strategies-which-children-use-to-motivate-parents-in-the-family-buying-process-case-of-british-bangladeshi-children-in-the-uk" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42499.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6706</span> Secret Agents in the Azores during the Second World War and the Impact of Espionage on Portuguese-British Relations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marisa%20Galiza%20Filipe">Marisa Galiza Filipe</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In 1942, at the height of the Second World War, Roosevelt and Churchill planned to occupy the Azores to establish air and naval bases. The islands' privileged position in the middle of the Atlantic made them a strategic location for both the Axis and the Allies. For the Germans, the occupation of the island was also a strategic place to launch an attack on the United States of America, and for the British and Americans, the islands were the perfect spot to counterattack the German sinking of British boats and submarines. Salazar avoided the concession of the islands until 1943, claiming, on the one hand, the policy of neutrality, a decision made in agreement with England, and on the other hand, the reaffirmation of Portuguese sovereignty over the territory. Aware of the constant changes and supported by a network of informers on the islands, the German and British spies played a crucial role in the negotiations between Portugal and the Allies and the ceding of the bases by Salazar, which prevented their forced occupation. The espionage caused several diplomatic tensions, and the large number of German spies denounced by the British, operating on the islands under the watchful eye of the PVDE and Salazar, weakened the Portuguese-British alliance. Using primary source documents in the Ministério dos Negócios Estrangeiros (MNE) archives, this paper introduces the spies that operated on the islands, their missions and motives, organizations, and modus operandi. As a chess game, any move was careful thinking and the spies were valuable assets to control and use information that could lead to the occupation of the islands and, ultimately, change the tide of the war. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=espionage" title="espionage">espionage</a>, <a href="https://publications.waset.org/abstracts/search?q=Azores" title=" Azores"> Azores</a>, <a href="https://publications.waset.org/abstracts/search?q=WWI" title=" WWI"> WWI</a>, <a href="https://publications.waset.org/abstracts/search?q=neutrality" title=" neutrality"> neutrality</a> </p> <a href="https://publications.waset.org/abstracts/181579/secret-agents-in-the-azores-during-the-second-world-war-and-the-impact-of-espionage-on-portuguese-british-relations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/181579.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">66</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6705</span> Arabic Scholar’s Governance Advocacy and Nigeria’s National Security in Nigeria: Perspective of Al-Shaykh Usman Bin Fodio</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Jamiu%20Abdullahi">Mohammad Jamiu Abdullahi</a>, <a href="https://publications.waset.org/abstracts/search?q=Shykh%20Ahmed%20Abdussalam"> Shykh Ahmed Abdussalam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of Arabic on the shore of West Africa heralded the practise of Islam and advocation for a just and egalitarian society. Islam, it was argued, has been perverted and subverted by the Hausa leadership. This necessitated the call for reforming Islam. Al-Shaykh Usman Bin Fodio grabbed the opportunity and fought the perverts to restore the glory of Islam and establish shari'ah way of life. This was the practice, especially in the northern part of Nigeria until the incursion of colonialism. The conquest of the colonial master halted the rule of jihadi leaderships and subjected them to colonialism under which only some aspects of Islamic system considered potentially beneficial to the British interest were retained. The current socio-political and economic crises in Nigeria has necessitated the need to look inwardly to the bulk of works, in Arabic, left behind by the Muslim scholars to help to salvage the country from its present political crisis, economic paralysis and legal decadence. This paper, therefore, examines the relevance of Arabic literary works that housed political/legal theories to salvaging the country from its present political crises, economic paralysis and legal decadence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arabic%20Fodio%20Nigeria%20security" title="Arabic Fodio Nigeria security">Arabic Fodio Nigeria security</a>, <a href="https://publications.waset.org/abstracts/search?q=advocacy%20governance%20scholar%20Usman" title=" advocacy governance scholar Usman"> advocacy governance scholar Usman</a>, <a href="https://publications.waset.org/abstracts/search?q=British%20colonial%20perspective%20shaykh" title=" British colonial perspective shaykh"> British colonial perspective shaykh</a>, <a href="https://publications.waset.org/abstracts/search?q=leadership%20Islam%20jihad%20politics" title=" leadership Islam jihad politics"> leadership Islam jihad politics</a> </p> <a href="https://publications.waset.org/abstracts/71774/arabic-scholars-governance-advocacy-and-nigerias-national-security-in-nigeria-perspective-of-al-shaykh-usman-bin-fodio" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71774.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">336</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6704</span> Demographic Variations of Multiple Sclerosis Patients between Britain and Kuwait</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20Fuad%20Ashour">Ali Fuad Ashour</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: Multiple sclerosis (MS) is a chronic, progressive and degenerative disease that affects the central nervous system (CNS). MS has been described to result in the debilitating symptom of the disease. It is reported to have a negative impact on the patient’s mental activities, brings a lower quality of life, leads to unemployment, causes distress and psychological disorders, generates low levels of motivation and self-esteem, and result in disability and neurological impairment. The aim of this study was to compare the effects of MS on patients from Britain and Kuwait. Methodology: A questionnaire was distributed to 200 individuals with MS (100 Kuwaiti and 100 British). The questionnaire consists of three parts; 1. General demographics, 2. Disease-specific data (symptoms, severity levels, relapse frequency, and support system), and 3. Attitudes towards physical exercise. Results: A response rate of 62% from the British sample and 50% from the Kuwaiti sample was achieved. 84% of the sample (n=52) were 41 years old or over. The duration of the disease was less than 10 years in 43.4% of British and 68% of Kuwaiti respondents. The majority of British respondents (56.5%) reported the disease severity to be moderate, while the majority of Kuwaitis was mild (72%). The annual relapse rates in Kuwait were relatively low, with 82% of the Kuwaiti sample had one relapse per year, compared to the 64.5% of British. The most common symptoms reported by British respondents were balance (75.8%), fatigue (74.2%), and weakness (71%), and by Kuwaiti respondents were fatigue (86%), balance (76%), and weakness (66%). The help and support for MS were by far more diverse for the British than Kuwaiti respondents. Discussion: The results unveiled marked differences between two groups of British and Kuwaiti MS patients in terms of patients’ age and disease duration, and severity. The overwhelming majority of Kuwaiti patients are young individuals who have been with the disease for a relatively short period of time, and their MS in most cases was mild. On the other hand, British patients were relatively older, many have been with the disease for a long period of time, and their average MS condition was more serious than that of their Kuwaiti counterparts. The main support in Kuwait comes from the neurologist, who primarily prescribe medications and advise patients to try to be active. The Kuwaiti respondents thought that lack of encouragement was the main reason for them not to engage in social activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multiple%20sclerosis" title="multiple sclerosis">multiple sclerosis</a>, <a href="https://publications.waset.org/abstracts/search?q=Kuwait" title=" Kuwait"> Kuwait</a>, <a href="https://publications.waset.org/abstracts/search?q=exercise" title=" exercise"> exercise</a>, <a href="https://publications.waset.org/abstracts/search?q=demographic" title=" demographic"> demographic</a> </p> <a href="https://publications.waset.org/abstracts/134589/demographic-variations-of-multiple-sclerosis-patients-between-britain-and-kuwait" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134589.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">118</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6703</span> Innovative Technology to Sustain Food Security in Qatar</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sana%20Abusin">Sana Abusin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20security" title="food security">food security</a>, <a href="https://publications.waset.org/abstracts/search?q=innovative%20technology" title=" innovative technology"> innovative technology</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainability" title=" sustainability"> sustainability</a>, <a href="https://publications.waset.org/abstracts/search?q=food%20waste" title=" food waste"> food waste</a>, <a href="https://publications.waset.org/abstracts/search?q=Qatar" title=" Qatar"> Qatar</a> </p> <a href="https://publications.waset.org/abstracts/156901/innovative-technology-to-sustain-food-security-in-qatar" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156901.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">122</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6702</span> British Aristocratic Irony on Screen: Subtitling Shifts in Downton Abbey</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nahed%20Almutairi">Nahed Almutairi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The subtitling process for period dramas implies a set of linguistic challenges. Audio-visual (AV) texts in this genre weave a rich tapestry of verbal irony blended with humor. The famous TV series Downtown Abbey contains such irony as one of the British aristocracy's linguistic markers. This study aims to examine subtitling strategies utilized in rendering such verbal irony. To counteract the negative postulated by Berman with the positive shifts, a qualitative analysis is conducted to examine the impact of the presence and absence of negative deforming tendencies in the Arabic subtitles of the first season of the British drama. This research is significant because it contributes to the discipline of translation studies, specifically the realm of AV translation. It seeks to provide a set of guidelines for optimal subtitling strategies that maintain the stylistic peculiarities of a social class that don’t exist in the target culture while also considering the practical aspects of translating subtitles. The findings indicate that negative shifts in the use of ironic expressions distort not only the stylistic elements of British aristocracy's utterances but also result in a loss of the intended meaning. This implies that what Berman’s model identifies as negative is also perceived as negative linguistic shifts in the Arabic subtitles of the British aristocracy’s verbal irony. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Downton%20Abbey" title="Downton Abbey">Downton Abbey</a>, <a href="https://publications.waset.org/abstracts/search?q=deforming%20tendencies" title=" deforming tendencies"> deforming tendencies</a>, <a href="https://publications.waset.org/abstracts/search?q=berman" title=" berman"> berman</a>, <a href="https://publications.waset.org/abstracts/search?q=subtitling%20shifts" title=" subtitling shifts"> subtitling shifts</a>, <a href="https://publications.waset.org/abstracts/search?q=verbal%20irony" title=" verbal irony"> verbal irony</a> </p> <a href="https://publications.waset.org/abstracts/176501/british-aristocratic-irony-on-screen-subtitling-shifts-in-downton-abbey" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">82</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6701</span> Effectiveness of Language Learning Strategy Instruction Based on CALLA on Iranian EFL Language Strategy Use</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reza%20Khani">Reza Khani</a>, <a href="https://publications.waset.org/abstracts/search?q=Ziba%20Hosseini"> Ziba Hosseini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Ever since the importance of language learning strategy instruction (LLS) has been distinguished, there has been growing interest on how to teach LLS in language learning classrooms. So thus this study attempted to implement language strategy instruction based on CALLA approach for Iranian EFL learners in a real classroom setting. The study was testing the hypothesis that strategy instruction result in improved linguistic strategy of students. The participant of the study were 240 EFL learners who received language learning instruction for four months. The data collected using Oxford strategy inventory for language learning. The results indicated the instruction had statistically significant effect on language strategy use of intervention group who received instruction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CALLA" title="CALLA">CALLA</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20learning%20strategy" title=" language learning strategy"> language learning strategy</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20learning%20strategy%20instruction" title=" language learning strategy instruction"> language learning strategy instruction</a>, <a href="https://publications.waset.org/abstracts/search?q=Iranian%20EFL%20language%20strategy" title=" Iranian EFL language strategy"> Iranian EFL language strategy</a> </p> <a href="https://publications.waset.org/abstracts/23853/effectiveness-of-language-learning-strategy-instruction-based-on-calla-on-iranian-efl-language-strategy-use" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23853.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">570</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6700</span> Cross-Dialect Sentence Transformation: A Comparative Analysis of Language Models for Adapting Sentences to British English</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shashwat%20Mookherjee">Shashwat Mookherjee</a>, <a href="https://publications.waset.org/abstracts/search?q=Shruti%20Dutta"> Shruti Dutta</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores linguistic distinctions among American, Indian, and Irish English dialects and assesses various Language Models (LLMs) in their ability to generate British English translations from these dialects. Using cosine similarity analysis, the study measures the linguistic proximity between original British English translations and those produced by LLMs for each dialect. The findings reveal that Indian and Irish English translations maintain notably high similarity scores, suggesting strong linguistic alignment with British English. In contrast, American English exhibits slightly lower similarity, reflecting its distinct linguistic traits. Additionally, the choice of LLM significantly impacts translation quality, with Llama-2-70b consistently demonstrating superior performance. The study underscores the importance of selecting the right model for dialect translation, emphasizing the role of linguistic expertise and contextual understanding in achieving accurate translations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cross-dialect%20translation" title="cross-dialect translation">cross-dialect translation</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20models" title=" language models"> language models</a>, <a href="https://publications.waset.org/abstracts/search?q=linguistic%20similarity" title=" linguistic similarity"> linguistic similarity</a>, <a href="https://publications.waset.org/abstracts/search?q=multilingual%20NLP" title=" multilingual NLP"> multilingual NLP</a> </p> <a href="https://publications.waset.org/abstracts/184401/cross-dialect-sentence-transformation-a-comparative-analysis-of-language-models-for-adapting-sentences-to-british-english" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184401.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6699</span> Security of Internet of Things: Challenges, Requirements and Future Directions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjad%20F.%20Alharbi">Amjad F. Alharbi</a>, <a href="https://publications.waset.org/abstracts/search?q=Bashayer%20A.%20Alotaibi"> Bashayer A. Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fahd%20S.%20Alotaibi"> Fahd S. Alotaibi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things%20%28IoT%29" title="Internet of Things (IoT)">Internet of Things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20challenges" title=" IoT security challenges"> IoT security challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20requirements" title=" IoT security requirements"> IoT security requirements</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20architecture" title=" IoT security architecture"> IoT security architecture</a> </p> <a href="https://publications.waset.org/abstracts/71488/security-of-internet-of-things-challenges-requirements-and-future-directions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">375</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6698</span> Economic Conflict between the United Kingdom and the European Community 1945-1975 </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Soumia%20Hebbri">Soumia Hebbri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The relationship between Britain and the European Union is phenomenally complex with a great opposition to Europe in the British Conservative and Labour Parties emerged since 1945. During the history and development of the European Union, Europe saw a lack of British involvement until 1961, after refusing to sign the Treaties of Rome of 1957 for being a member of the European Economic Community. Britain then applied to join the EEC in 1961 under Harold Macmillan’s Conservative Government, its application led by the Chief Negotiator Edward Heath. This application was vetoed by President de Gaulle. With de Gaulle out of power Britain. finally could joined in 1973. But again Labour and conservative both found themselves divided on the issue and they hold a referendum under labour on whether to continue the UK’s membership. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=the%20European%20Union" title="the European Union">the European Union</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20British" title=" the British"> the British</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20community" title=" economic community"> economic community</a>, <a href="https://publications.waset.org/abstracts/search?q=de%20Gaulle" title=" de Gaulle"> de Gaulle</a> </p> <a href="https://publications.waset.org/abstracts/28839/economic-conflict-between-the-united-kingdom-and-the-european-community-1945-1975" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28839.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">490</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">6697</span> Traveling Abroad and the Construction of British Identity and Culture in Selected Women Writers: Lady Elizabeth Craven's A Journey Through the Crimea to Constantinople (1789) and Lady Mary Wortley Montagu's Embassy Letters (1716-1718)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raja%20Al-Khalili">Raja Al-Khalili</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Traveling abroad for British citizens in the eighteenth century was usually performed for two reasons. The first major form was for administering the expanding realm of the British Empire and its need for officials in governing the natives and facilitating the work of business companies. The other form of travel was for pleasure and involved a manifestation of wealth. This form of travel was a prelude for the modern industry of tourism and usually involved a tour of Europe and the Mediterranean. In both forms of travel the British encountered a myriad of cultures. Travel had fostered a sense of pride and confirmed an ethnocentric view of British superiority, but it also brought a critical self-examination of belonging to a colonial empire that thrives on the weaknesses of other nations. Women writers in particular have sought in the travels a kind of self-exploration of the nature of social patriarchy in a diversity of cultures. Both Lady Elizabeth Craven in A Journey through the Crimea to Constantinople (1789) and Lady Mary Wortley Montagu in Embassy Letters (1716-1718) have observed the culture of the Ottomans and then pursued to reflect on the social role of women in England. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=travel%20writing" title="travel writing">travel writing</a>, <a href="https://publications.waset.org/abstracts/search?q=Elizabeth%20Craven" title=" Elizabeth Craven"> Elizabeth Craven</a>, <a href="https://publications.waset.org/abstracts/search?q=Lady%20Mary%20Wortley" title=" Lady Mary Wortley"> Lady Mary Wortley</a>, <a href="https://publications.waset.org/abstracts/search?q=patriarchy" title=" patriarchy"> patriarchy</a> </p> <a href="https://publications.waset.org/abstracts/62182/traveling-abroad-and-the-construction-of-british-identity-and-culture-in-selected-women-writers-lady-elizabeth-cravens-a-journey-through-the-crimea-to-constantinople-1789-and-lady-mary-wortley-montagus-embassy-letters-1716-1718" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62182.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=224">224</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=225">225</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=british%20security%20strategy&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>