CINXE.COM
Search results for: border security
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: border security</title> <meta name="description" content="Search results for: border security"> <meta name="keywords" content="border security"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="border security" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="border security"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3136</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: border security</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3136</span> Resource Allocation Modeling and Simulation in Border Security Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kai%20Jin">Kai Jin</a>, <a href="https://publications.waset.org/abstracts/search?q=Hua%20Li"> Hua Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Qing%20Song"> Qing Song</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Homeland security and border safety is an issue for any country. This paper takes the border security of US as an example to discuss the usage and efficiency of simulation tools in the homeland security application. In this study, available resources and different illegal infiltration parameters are defined, including their individual behavior and objective, in order to develop a model that describes border patrol system. A simulation model is created in Arena. This simulation model is used to study the dynamic activities in the border security. Possible factors that may affect the effectiveness of the border patrol system are proposed. Individual and factorial analysis of these factors is conducted and some suggestions are made. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=resource%20optimization" title="resource optimization">resource optimization</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=modeling" title=" modeling"> modeling</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20security" title=" border security"> border security</a> </p> <a href="https://publications.waset.org/abstracts/12476/resource-allocation-modeling-and-simulation-in-border-security-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12476.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">516</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3135</span> Analysis on Cyber Threat Actors Targeting Automated Border Security Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mirko%20Sailio">Mirko Sailio</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20automation" title="border automation">border automation</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-security" title=" cyber-security"> cyber-security</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20actors" title=" threat actors"> threat actors</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20cyber-security" title=" border cyber-security"> border cyber-security</a> </p> <a href="https://publications.waset.org/abstracts/136134/analysis-on-cyber-threat-actors-targeting-automated-border-security-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136134.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3134</span> Stressors Faced by Border Security Officers: The Singapore Experience</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jansen%20Ang">Jansen Ang</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Neo"> Andrew Neo</a>, <a href="https://publications.waset.org/abstracts/search?q=Dawn%20Chia"> Dawn Chia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20security" title="border security">border security</a>, <a href="https://publications.waset.org/abstracts/search?q=Singapore" title=" Singapore"> Singapore</a>, <a href="https://publications.waset.org/abstracts/search?q=stress" title=" stress"> stress</a>, <a href="https://publications.waset.org/abstracts/search?q=operations" title=" operations"> operations</a> </p> <a href="https://publications.waset.org/abstracts/41300/stressors-faced-by-border-security-officers-the-singapore-experience" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/41300.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">325</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3133</span> World on the Edge: Migration and Cross Border Crimes in West Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Adeyemi%20Kamil%20Hamzah">Adeyemi Kamil Hamzah</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cross-border%20migration" title="cross-border migration">cross-border migration</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20crimes" title=" border crimes"> border crimes</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=West%20Africa" title=" West Africa"> West Africa</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=globalisation" title=" globalisation"> globalisation</a> </p> <a href="https://publications.waset.org/abstracts/88736/world-on-the-edge-migration-and-cross-border-crimes-in-west-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88736.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">226</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3132</span> The Effects of Cross-Border Use of Drones in Nigerian National Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.%20P.%20Kerry">H. P. Kerry</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=armed%20drones" title="armed drones">armed drones</a>, <a href="https://publications.waset.org/abstracts/search?q=drones" title=" drones"> drones</a>, <a href="https://publications.waset.org/abstracts/search?q=cross-border" title=" cross-border"> cross-border</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security"> national security</a> </p> <a href="https://publications.waset.org/abstracts/127425/the-effects-of-cross-border-use-of-drones-in-nigerian-national-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/127425.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3131</span> Strengthening the Security of the Thai-Myanmar Border Trade of the People in the Mae Sot Customs Checkpoint Area, Tak Province</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sakapas%20Saengchai">Sakapas Saengchai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A Study on Strengthening the Security of the Thai-Myanmar Border Trade Area of the people in the Mae Sot customs checkpoint area, Tak province, was designed as a qualitative research study. Its objectives were to study the principles of strengthening border trade security and enhancing people's participation. To develop a border trade model that enhances the spatial economy and improves people's quality of life by collecting data using a participant observation method. In-depth interview group chats border checkpoint administrators, Mae Sot customs checkpoint, Tak province, private entrepreneurs, community leaders, and the opening of a community forum to exchange opinions with people in the area. The results of the study found that 1. Security development is to promote crime reduction. Reduce drug trafficking problems Smuggling and human trafficking have been reduced. Including planning and preparation to protect people from terrorism, epidemics, and communicable diseases, including cooperation with Burma on border rules for people and workers, 2. Wealth development is to promote investment. Transport links value chain logistics Cross-border goods and services on the Thai-Myanmar border Both amending regulations and laws to promote fair trade. Emphasis on convenient and fast service as well as promoting the Thai border area to be a tourist attraction that can create prosperity and income for the community in the area By using balanced natural resources, with production and consumption that are environmentally friendly, and emphasizes the participation of the public sector, the private sector, and people from all sectors in the sustainable development of the Thai border. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20trade" title=" border trade"> border trade</a>, <a href="https://publications.waset.org/abstracts/search?q=customs" title=" customs"> customs</a>, <a href="https://publications.waset.org/abstracts/search?q=participation" title=" participation"> participation</a>, <a href="https://publications.waset.org/abstracts/search?q=people" title=" people"> people</a> </p> <a href="https://publications.waset.org/abstracts/140124/strengthening-the-security-of-the-thai-myanmar-border-trade-of-the-people-in-the-mae-sot-customs-checkpoint-area-tak-province" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140124.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">181</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3130</span> In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nuhu%20Bitrus%20Mailabari">Nuhu Bitrus Mailabari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border" title="border">border</a>, <a href="https://publications.waset.org/abstracts/search?q=cross%20border" title=" cross border"> cross border</a>, <a href="https://publications.waset.org/abstracts/search?q=migration" title=" migration"> migration</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=northeast%20region" title=" northeast region"> northeast region</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/116189/in-a-situation-of-great-distress-cross-border-migration-and-the-quest-for-enduring-security-in-north-east-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/116189.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">164</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3129</span> Border Trade Policy to Promote Thailand - Myanmar Mae Sai, Chiang Rai Province</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sakapas%20Saengchai">Sakapas Saengchai</a>, <a href="https://publications.waset.org/abstracts/search?q=Pichamon%20Chansuchai"> Pichamon Chansuchai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Research Thai- Myanmar Border Trade Promotion Policy, Mae Sai District, Chiang Rai Province The objectives of this study were to study the policy of promoting Thai- Myanmar border trade in Mae Sai district, Chiang Rai province. And suitable models for the development of border trade in Mae Sai. Chiang Rai province This research uses qualitative methodology. The method of collecting data from research papers. Participatory Observation In-depth interviews in which the information is important, the governor of Chiang Rai. Chiang Rai Customs Service Executive Office of Mae Sai Immigration Bureau Maesai Chamber of Commerce and Private Entrepreneurs By specific sampling Data analysis uses content analysis. The study indicated that Border Trade Promotion Policy The direction taken by the government to focus on developing 1. Security is further reducing crime. Smuggling and human trafficking Including the preparation to protect people from terrorism and natural disasters. And cooperation with Burma on border security. 2. The development of wealth is the promotion of investment. The transport links, logistics value chain. Products and services across the Thai-Myanmar border. Improve the regulations and laws to promote fair trade. Convenient and fast 3. Sustainable development is the ability to generate income, quality of life of people in the Thai border to increase continuously. By using balanced natural resources, production and consumption are environmentally friendly. Which featured the participation of all sectors of the public and private sectors in the region to drive the development of the border with Thailand. Chiang Rai province To be more competitive . <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Border" title="Border">Border</a>, <a href="https://publications.waset.org/abstracts/search?q=Trade" title=" Trade"> Trade</a>, <a href="https://publications.waset.org/abstracts/search?q=Policy" title=" Policy"> Policy</a>, <a href="https://publications.waset.org/abstracts/search?q=Promote" title=" Promote"> Promote</a> </p> <a href="https://publications.waset.org/abstracts/104489/border-trade-policy-to-promote-thailand-myanmar-mae-sai-chiang-rai-province" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104489.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">171</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3128</span> The Effects of European Union’s Bordering Process</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebru%20Dalgakiran">Ebru Dalgakiran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border and bordering studies have come to the forefront in recent years especially with parallel to increase in international migratory movements. Although conceptualizations of the border and bordering are quite contested within academia, the general point of view is that borders are politically and socially constructed. It means that borders have always their own ‘us vs. them’, and bordering process produce separate identities as well. In that case, Turkey and Greece are notable examples since these two nation-states constructed their borders upon each other’s for years although the Turkish-Greek border was drawn with the Lausanne Treaty of 1923. Nevertheless, on the other hand, The European Union (EU) has been externalized of border management policies to build a stronger area of freedom, security, and justice within the borders. Thus, Turkish-Greek border has become one of the significant external borders of the EU. In this context, this study aims to understand whether the EU’s bordering process through externalizing border management policies can affect Turkey’s and Greece’s bordering processes. By examining official documents of the EU and conducting in-depth interviews with local actors of the border management policies of the EU in Edirne, where is the border city of Turkey with Greece, this study’s main finding is that the EU’s bordering process to control migration at the external borders affects Turkey’s and Greece’s bordering processes. It seems that Turkey and Greece construct their borders upon a common Other, ‘irregular migrants’ now. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border" title="border">border</a>, <a href="https://publications.waset.org/abstracts/search?q=bordering" title=" bordering"> bordering</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20European%20Union" title=" the European Union"> the European Union</a>, <a href="https://publications.waset.org/abstracts/search?q=externalization" title=" externalization"> externalization</a> </p> <a href="https://publications.waset.org/abstracts/73814/the-effects-of-european-unions-bordering-process" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/73814.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3127</span> Sea Border Dispute between Greece and Turkey in the Mediterrenean: Implications for Turkey’s Maritime Security and Its Military Spending</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aslihan%20Caliskan">Aslihan Caliskan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The term Mediterranean comes from the Latin “mediterraneus” (Medius, "middle" plus Terra, "land, earth"). For the ancient Romans, the Mediterranean was the center of the earth as they knew it. The desire to gain control of the Mediterranean has led to disputes between many nations throughout history, some of which continue to this day. The recent major natural gas discoveries in the Mediterranean have aggravated ongoing tensions in some neighboring countries. The sea border dispute between Turkey and Greece & Greek-Cypriot side is one of the most critical conflicts in the Mediterranean Sea region. This unresolved dispute has many implications for all countries involved, as well as for third parties that have direct or indirect interests in the region. The research question of this context is what are the implications of this controversial sea border problem on the maritime security of Turkey and its military spending. In this paper, the quantitative method is used. Records from the Turkish Defense Ministry, data from the Turkish naval forces have been obtained. In addition, literature research and the United Nations Convention on the Law of the Sea (UNCLOS) application cases were evaluated, and an incident analysis was carried out. This research shows that the sea border dispute issue has a significant impact on the Turkish military both in terms of the structures required to ensure maritime and border security, as well as rising military costs and its macroeconomic implications. The paper begins with a brief overview of relevant principles and methods applied for delimiting th esea borders. The paper continues with a brief description and a background of the sea border dispute between Turkey and Greece & Greek-Cypriot side in the light of the United Nations Convention on the Law of the Sea (UNCLOS). An analysis of the implications of the dispute on Turkey’s maritime security and its military spending is provided in the following chapters. The paper ends with concluding remarks of the author, including suggestions for the way forward. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=sea%20border%20security" title="sea border security">sea border security</a>, <a href="https://publications.waset.org/abstracts/search?q=mediterranean%20sea" title=" mediterranean sea"> mediterranean sea</a>, <a href="https://publications.waset.org/abstracts/search?q=greece-turkey%20dispute" title=" greece-turkey dispute"> greece-turkey dispute</a>, <a href="https://publications.waset.org/abstracts/search?q=limitation%20of%20sea" title=" limitation of sea"> limitation of sea</a>, <a href="https://publications.waset.org/abstracts/search?q=united%20nations%20convention%20on%20the%20law%20of%20the%20sea%20%28UNCLOS%29" title=" united nations convention on the law of the sea (UNCLOS)"> united nations convention on the law of the sea (UNCLOS)</a> </p> <a href="https://publications.waset.org/abstracts/134368/sea-border-dispute-between-greece-and-turkey-in-the-mediterrenean-implications-for-turkeys-maritime-security-and-its-military-spending" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134368.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">186</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3126</span> Women's Vulnerability to Cross-Border Criminality in Saki/Iseyin Area of Oyo State in Nigeria: Insight and Experiences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samuel%20Kehinde%20Okunade">Samuel Kehinde Okunade</a>, <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Sunday%20Tolorunshagba"> Daniel Sunday Tolorunshagba</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Globally women are classified to be part of the vulnerable group in any environment. In a conflict-ridden environment, women being vulnerable often suffer the consequences as it relates to security and access to basic social services such as medical care. This is the situation in border communities in Nigeria where cross-border crimes are on the rife, thus, putting women at a disadvantaged position and, eventually, victims of such inimical activities. Border communities in the Saki/Iseyin area of Oyo state are a case in point where the lives of inhabitants are daily threatened most, especially women. In light of the above, this article examined the security situation of the Saki/Iseyin area of Oyo State with a view to ascertaining its status in terms of safety of lives and property. This paper also explored the experiences of women in the border communities within the area as it relates to their safety, the safety of their children, access to good health facilities in their immediate environment, and above all, how they have been able to cope or manage the situation. The qualitative research model was adopted utilizing a phenomenological case study approach. A Focused Group Discussion was conducted with 10 pregnant women and 10 mothers in Okerete and Abugudu communities while a Key Informant Interview was conducted with the women leaders in both communities of the Saki/Iseyin border area of Oyo State. The findings of the study revealed the poor state of basic infrastructure. So bad to a point that inhabitants of these communities no longer see themselves as Nigerians because they have been neglected by the government for too long. The only solution is for the government to embark on developmental projects within these communities so that they can live a good life just as those in the cities do. More importantly, this will increase the loyalty of these communities to the Nigeria state by defending and resisting all forms of cross-border criminal activities that go on along the porous borders. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=women" title=" women"> women</a>, <a href="https://publications.waset.org/abstracts/search?q=Saki%2FIseyin%20border%20area" title=" Saki/Iseyin border area"> Saki/Iseyin border area</a>, <a href="https://publications.waset.org/abstracts/search?q=cross-border%20criminalities" title=" cross-border criminalities"> cross-border criminalities</a>, <a href="https://publications.waset.org/abstracts/search?q=basic%20infrastructure" title=" basic infrastructure"> basic infrastructure</a> </p> <a href="https://publications.waset.org/abstracts/114225/womens-vulnerability-to-cross-border-criminality-in-sakiiseyin-area-of-oyo-state-in-nigeria-insight-and-experiences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114225.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">129</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3125</span> Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Syed%20Ahsan">Syed Ahsan</a>, <a href="https://publications.waset.org/abstracts/search?q=Saleh%20Alshomrani"> Saleh Alshomrani</a>, <a href="https://publications.waset.org/abstracts/search?q=Ishtiaq%20Rasool"> Ishtiaq Rasool</a>, <a href="https://publications.waset.org/abstracts/search?q=Ali%20Hassan"> Ali Hassan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20security" title="border security">border security</a>, <a href="https://publications.waset.org/abstracts/search?q=sensors" title=" sensors"> sensors</a>, <a href="https://publications.waset.org/abstracts/search?q=abnormal%20activity%20detection" title=" abnormal activity detection"> abnormal activity detection</a>, <a href="https://publications.waset.org/abstracts/search?q=ontologies" title=" ontologies"> ontologies</a> </p> <a href="https://publications.waset.org/abstracts/22859/saudi-arabia-border-security-informatics-challenges-of-a-harsh-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22859.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">481</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3124</span> Study of the Economic Development of Border Areas Malinau District</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Indri%20Nilam%20Sari">Indri Nilam Sari</a>, <a href="https://publications.waset.org/abstracts/search?q=Aris%20Subagiyo"> Aris Subagiyo</a>, <a href="https://publications.waset.org/abstracts/search?q=Nindya%20Sari"> Nindya Sari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Malinau Regency border area is an area which is based on the RTRWN and the development priority. But, in real border area Malinau Regency placed as backyard from Indonesian area and caused development lag that is fairly large compared by town area in Malinau Regency. This research aimed to know the condition of the gap in the Malinau Regency border and its influence on the development of the border region as well as knowing the problems related to the economy development of society in the area of the border district of Malinau. Methods of analysis are used in namely descriptive analysis that represent analysis of land use and analysis of movement activities of the population, level analysis facility and infrastructure, economy analysis that represent top commodity determination analysis (LQ and Growth Share) and accessibility. The results of the study showed that the condition of the Malinau Regency border come within the gap as seen from the contributions of infrastructure repair facilities and accessibility advocates, communities, scattered seed commodities come within the borders and human resources with the condition of the most Upstream Bahau town in the backwaters of the town more. There are a few problems that cause the condition area of the border experiencing inequality, lack of human resources, poor infrastructure, lack of accessibility and low levels of security so that it brings development recommendations was the development of the flagship commodities and infrastructure as well as supporting community economic infrastructure, as well as human resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border" title="border">border</a>, <a href="https://publications.waset.org/abstracts/search?q=economy" title=" economy"> economy</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=Malinau" title=" Malinau"> Malinau</a> </p> <a href="https://publications.waset.org/abstracts/19787/study-of-the-economic-development-of-border-areas-malinau-district" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19787.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">451</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3123</span> Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mar%C3%ADa%20Elena%20Men%C3%A9ndez%20Ib%C3%A1%C3%B1ez">María Elena Menéndez Ibáñez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20control" title="border control">border control</a>, <a href="https://publications.waset.org/abstracts/search?q=immigration" title=" immigration"> immigration</a>, <a href="https://publications.waset.org/abstracts/search?q=international%20cooperation" title=" international cooperation"> international cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security"> national security</a> </p> <a href="https://publications.waset.org/abstracts/108420/border-control-and-human-rights-violations-lessons-learned-from-the-united-states-and-potential-solutions-for-the-european-union" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/108420.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">138</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3122</span> Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Debby%20Rizqie%20Amelia%20Gustin">Debby Rizqie Amelia Gustin</a>, <a href="https://publications.waset.org/abstracts/search?q=Purnomo%20Yusgiantoro"> Purnomo Yusgiantoro</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20security" title="border security">border security</a>, <a href="https://publications.waset.org/abstracts/search?q=defense" title=" defense"> defense</a>, <a href="https://publications.waset.org/abstracts/search?q=energy" title=" energy"> energy</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20interest" title=" national interest"> national interest</a>, <a href="https://publications.waset.org/abstracts/search?q=threat" title=" threat"> threat</a> </p> <a href="https://publications.waset.org/abstracts/61497/energy-in-the-nexus-of-defense-and-border-security-securing-energy-deposits-in-the-natuna-islands-of-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61497.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">482</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3121</span> A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Walid%20Abdallah">Walid Abdallah</a>, <a href="https://publications.waset.org/abstracts/search?q=Noureddine%20Boudriga"> Noureddine Boudriga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wireless%20sensor%20networks" title="wireless sensor networks">wireless sensor networks</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20surveillance" title=" border surveillance"> border surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20distribution" title=" key distribution"> key distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=location-based" title=" location-based"> location-based</a> </p> <a href="https://publications.waset.org/abstracts/19484/a-location-based-authentication-and-key-management-scheme-for-border-surveillance-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19484.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">659</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3120</span> Development of Border Trade of Thailand-Myanmar: Case Study of Ranong Province</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sakapas%20Saengchai">Sakapas Saengchai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research has objective to study and analysis, expending linkage of trading border of Thai-Myanmar and the way of development trading of Thai-Myanmar border. There are advantage of competition in ASEAN Community on collection data and observation, in-depth interview, group conversation and exchange opinion of public agency, entrepreneur and people. Result of study found that main development of border trade is 1) Cross-border service should be development infrastructure of land telecommunication, sea has support economics of cross-border trade, 2) International consumption service should be expand service with Myanmar and India for linkage with entrepreneur and trading from international to Thailand, 3) Establish business for provide service has development cooperation of logistics via Andaman of Thailand, and 4) Mobility personnel, exchange personnel including labor for development potential of border trade has competition advantage. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20trade" title="border trade">border trade</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=service" title=" service"> service</a>, <a href="https://publications.waset.org/abstracts/search?q=ASEAN" title=" ASEAN"> ASEAN</a> </p> <a href="https://publications.waset.org/abstracts/55739/development-of-border-trade-of-thailand-myanmar-case-study-of-ranong-province" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/55739.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">322</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3119</span> Potential of Tourism Logistic Service Business in the Border Areas of Chong Anma, Chong Sa-Ngam, and Chong Jom Checkpoints in Thailand to Increase Competitive Efficiency among the ASEAN Community</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pariwat%20Somnuek">Pariwat Somnuek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study focused on tourism logistic services in the border areas of Thailand by an analysis and comparison of the opinions of tourists, villagers, and entrepreneurs of these services. Sample representatives of this study were a total of 600 villagers and 15 entrepreneurs in the three border areas consisting of Chong Anma, Chong Sa-Ngam, and Chong Jom checkpoints. For methodology, survey questionnaires, situation analysis, TOWS matrix, and focus group discussions were used for data collection, as well as descriptive analysis and statistics such as arithmetic means and standard deviations, were employed for data analysis. The findings revealed that business potential was at the medium level and entrepreneurs were satisfied with their turnovers. However, perspectives of transportation and tourism services provided for tourists need to be immediately improved. Recommendations for the potential development included promotion of border tourism destinations and foreign investments into accommodation, restaurants, and transport, as well as the establishment of business networks between Thailand and Cambodia, along with the introduction of new tourism destinations by co-operation between entrepreneurs in both countries. These initiatives may lead to increased visitors, collaboration of security offices, and an improved image of tourism security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business%20potential" title="business potential">business potential</a>, <a href="https://publications.waset.org/abstracts/search?q=potential%20development" title=" potential development"> potential development</a>, <a href="https://publications.waset.org/abstracts/search?q=tourism%20logistics" title=" tourism logistics"> tourism logistics</a>, <a href="https://publications.waset.org/abstracts/search?q=services" title=" services"> services</a> </p> <a href="https://publications.waset.org/abstracts/65293/potential-of-tourism-logistic-service-business-in-the-border-areas-of-chong-anma-chong-sa-ngam-and-chong-jom-checkpoints-in-thailand-to-increase-competitive-efficiency-among-the-asean-community" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65293.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">308</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3118</span> Arms and Light Weapons Flow in Nigerian/Chad Border: A Reflection on the How Insurgents Had Access to Their Target</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lawan%20Ja%E2%80%99afar%20Tahir">Lawan Ja’afar Tahir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research work centered on the problem of free Arms flow around the Nigeria and Chad Border. The whole of the northeastern Nigerian region has been devastated by the crisis of insecurity facilitated by more than a decade of insurgency. One of the major issues of concern to security experts and personnel in the country is how the insurgents are getting access to weapons, which gave them more strength to fight the war for this long period, which has become so difficult to overcome. Among the possible avenues that continue to strengthen the enemies is the easy access to the arms flow from the neighboring countries, especially the Republic of Chad, which borders Nigeria to the east, where Boko Haram gained firm roots. This paper, therefore, looked at the nature of the waterway of the Nigeria/Chad Border, which has become a source of strength to the insurgents as the flow of weapons is one of the cheapest things on the Border. The availability of such arms flow has also led to the People abandoning their lands and economic and commercial activities, especially those settlements between the Border of these two countries. For more than eight years now, they have suspended their livelihood activities, roads were blocked and chances of survival in the rural areas were minimal due to the frequent attacks carried out by the insurgents. However, this research looks at the causes of the arms flow along the Border of these neighboring countries, the extent of damage done as a result of the availability of the weapons, and how far the Nigerian government has gone in curtailing the menace of the flow of dangerous weapons into the country. The research looked at the ways arm dealers are conniving with settlers along the border as well as the various ways they followed to reach their target. The work provided suggestion as to how the fragile Border should be managed with the view to reduce the influx of arms without control, which, according to this research, is the central factor that continues to unleash and give terror groups the opportunity to destroy people for more than a decade. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border" title="border">border</a>, <a href="https://publications.waset.org/abstracts/search?q=insecurity" title=" insecurity"> insecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=weapons" title=" weapons"> weapons</a>, <a href="https://publications.waset.org/abstracts/search?q=management" title=" management"> management</a> </p> <a href="https://publications.waset.org/abstracts/176364/arms-and-light-weapons-flow-in-nigerianchad-border-a-reflection-on-the-how-insurgents-had-access-to-their-target" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/176364.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">68</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3117</span> Border Security: Implementing the “Memory Effect” Theory in Irregular Migration</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iliuta%20Cumpanasu">Iliuta Cumpanasu</a>, <a href="https://publications.waset.org/abstracts/search?q=Veronica%20Oana%20Cumpanasu"> Veronica Oana Cumpanasu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=migration" title="migration">migration</a>, <a href="https://publications.waset.org/abstracts/search?q=border" title=" border"> border</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=memory%20effect" title=" memory effect"> memory effect</a> </p> <a href="https://publications.waset.org/abstracts/157489/border-security-implementing-the-memory-effect-theory-in-irregular-migration" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157489.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">92</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3116</span> The Role of Cryptocurrency in Cross-Border Payments: A Case Study of Bangladesh</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Abdul%20Matin">Mohammad Abdul Matin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research paper aims to investigate the use of cryptocurrency in facilitating cross-border payments, with a specific focus on the case of Bangladesh. With thousands of Bangladeshi living abroad, the demand for efficient and cost-effective remittance channels is high. This paper will examine the current challenges in cross-border payments for Bangladeshi expatriates and explore the potential benefits and barriers to the adoption of cryptocurrency as a solution. Through a combination of literature review, qualitative interviews, and data analysis, the research will provide valuable insights into the opportunities and risks associated with using cryptocurrency for cross-border payments in Bangladesh. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptocurrency" title="cryptocurrency">cryptocurrency</a>, <a href="https://publications.waset.org/abstracts/search?q=cross-border%20payments" title=" cross-border payments"> cross-border payments</a>, <a href="https://publications.waset.org/abstracts/search?q=Bangladesh" title=" Bangladesh"> Bangladesh</a>, <a href="https://publications.waset.org/abstracts/search?q=remittance" title=" remittance"> remittance</a>, <a href="https://publications.waset.org/abstracts/search?q=expatriates" title=" expatriates"> expatriates</a> </p> <a href="https://publications.waset.org/abstracts/186744/the-role-of-cryptocurrency-in-cross-border-payments-a-case-study-of-bangladesh" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186744.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">33</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3115</span> A Comparative Study of Environmental, Social and Economic Cross-Border Cooperation in Post-Conflict Environments: The Israel-Jordan Border</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tamar%20Arieli">Tamar Arieli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cross-border cooperation has long been hailed as a means for stabilizing and normalizing relations between former enemies. Cooperation in problem-solving and realizing of local interests in post-conflict environments can indeed serve as a basis for developing dialogue and meaningful relations between neighbors across borders. Hence the potential for formerly sealed borders to serve as a basis for generating local and national perceptions of interdependence and as a buffer against the resume of conflict. Central questions which arise for policy-makers and third parties are how to facilitate cross-border cooperation and which areas of cooperation best serve to normalize post-conflict border regions. The Israel-Jordan border functions as a post-conflict border, in that it is a peaceful border since the 1994 Israel-Jordan peace treaty yet cross-border relations are defined but the highly securitized nature of the border region and the ongoing Arab-Israel regional conflict. This case study is based on long term qualitative research carried out in the border regions of both Israel and Jordan, which mapped and analyzed cross-border in a wide range of activities – social interactions sponsored by peace-facilitating NGOs, government sponsored agricultural cooperation, municipal initiated emergency planning in cross-border continuous urban settings, private cross-border business ventures and various environmental cooperative initiatives. These cooperative initiatives are evaluated through multiple interviews carried out with initiators and partners in cross-border cooperation as well as analysis of documentation, funding and media. These cooperative interactions are compared based on levels of cross-border local and official awareness and involvement as well as sustainability over time. This research identifies environmental cooperation as the most sustainable area of cross- border cooperation and as most conducive to generating perceptions of regional interdependence. This is a variation to the ‘New Middle East’ vision of business-based cooperation leading to conflict amelioration and regional stability. Environmental cooperation serving the public good rather than personal profit enjoys social legitimization even in the face of widespread anti-normalization sentiments common in the post-conflict environment. This insight is examined in light of philosophical and social aspects of the natural environment and its social perceptions. This research has theoretical implications for better understanding dynamics of cooperation and conflict, as well as practical ramifications for practitioners in border region policy and management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=borders" title="borders">borders</a>, <a href="https://publications.waset.org/abstracts/search?q=cooperation" title=" cooperation"> cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=post-conflict" title=" post-conflict"> post-conflict</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/60268/a-comparative-study-of-environmental-social-and-economic-cross-border-cooperation-in-post-conflict-environments-the-israel-jordan-border" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/60268.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3114</span> Digital Humanities in The US/Mexico Borderlands: Activism, Literature, and Border Crossers</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Martin%20Camps">Martin Camps</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The two-thousand-mile border that divides the United States and Mexico is a “contact zone” of cultural friction and unbalanced power relations as defined by Mary Louise Pratt. The interest of this paper is to analyze digital platforms created to address the study and comprehension of the borderlands with pedagogical and research reasons. The paper explores ways to engage students in archival and analytical practices to build a repository of resources, links, and digital tools and consider how to adapt them to the study of the borderlands. Sites such as “Torn Apart / Separados,” “Digital Borderlands,” “Borderlands Archives Cartography,” and “Juaritos Literario” show visualizations, mapping, and access to materials and marginal literature on the border phenomenon. Analyzing these projects contributes to highlighting digital projects and the study of the border and how to engage in activism via the study of literature and the representation of a human tragedy that underscores the divisions and biopolitics imposed on the Global South and imagine the digital border futures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=borderlands" title="borderlands">borderlands</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20humanities" title=" digital humanities"> digital humanities</a>, <a href="https://publications.waset.org/abstracts/search?q=activism" title=" activism"> activism</a>, <a href="https://publications.waset.org/abstracts/search?q=border%20literature" title=" border literature"> border literature</a> </p> <a href="https://publications.waset.org/abstracts/165911/digital-humanities-in-the-usmexico-borderlands-activism-literature-and-border-crossers" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/165911.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">77</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3113</span> The Tourist Satisfaction on Logo Design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Panupong%20Chanplin">Panupong Chanplin</a>, <a href="https://publications.waset.org/abstracts/search?q=Wilailuk%20Mepracha"> Wilailuk Mepracha</a>, <a href="https://publications.waset.org/abstracts/search?q=Sathapath%20Kilaso"> Sathapath Kilaso</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aims of this research were twofold: 1) to logo design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province and 2) to study the level of tourist satisfaction towards logo design of Huay Kon Border Market, Chaloemphrakiat District, Nan Province. Tourist satisfaction was measured using four criteria: a unique product identity, ease of remembrance, product utility, and beauty/impressiveness. The researcher utilized a probability sampling method via simple random sampling. The sample consisted of 30 tourists in the Huay Kon Border Market. Statistics utilized for data analysis were percentage, mean, and standard deviation. The results suggest that tourist had high levels of satisfaction towards all four criteria of the logo design that was designed to target them. This study proposes that specifically logo designed of Huay Kon Border Market could also be implemented with other real media already available on the market. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=satisfaction" title="satisfaction">satisfaction</a>, <a href="https://publications.waset.org/abstracts/search?q=logo" title=" logo"> logo</a>, <a href="https://publications.waset.org/abstracts/search?q=design" title=" design"> design</a>, <a href="https://publications.waset.org/abstracts/search?q=Huay%20Kon%20border%20market" title=" Huay Kon border market"> Huay Kon border market</a> </p> <a href="https://publications.waset.org/abstracts/82085/the-tourist-satisfaction-on-logo-design-of-huay-kon-border-market-chaloemphrakiat-district-nan-province" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82085.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">223</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3112</span> Efficiency Analysis of Trader in Thailand and Laos Border Trade: Case Study of Textile and Garment Products</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Varutorn%20Tulnawat">Varutorn Tulnawat</a>, <a href="https://publications.waset.org/abstracts/search?q=Padcharee%20Phasuk"> Padcharee Phasuk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper investigates the issue of China’s dumping on border trade between Thailand and Laos. From the pass mostly, the border trade goods are traditional textile and garment mainly served locals and tourists which majority of traders is of small and medium size. In the present day the competition is fierce, the volume of trade has expanded far beyond its original intent. The major competitors in Thai-Laos border trade are China, Vietnam and also South Korea. This research measures and compares the efficiency and ability to survive the onslaught of Thai and Laos firm along Thailand (Nong Kai province) and Laos (Vientiane) border. Two attack strategies are observed, price cutting and incense such as full facilitation for big volume order. Data Envelopment Analysis (DEA) is applied to data surveyed from 90 Thai and Laos entrepreneurs. The expected results are the proportion of efficiency and inefficiency firms. Points of inefficiency and suggested improvement are also discussed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20trade" title="border trade">border trade</a>, <a href="https://publications.waset.org/abstracts/search?q=dea" title=" dea"> dea</a>, <a href="https://publications.waset.org/abstracts/search?q=textile" title=" textile"> textile</a>, <a href="https://publications.waset.org/abstracts/search?q=garment" title=" garment"> garment</a> </p> <a href="https://publications.waset.org/abstracts/65905/efficiency-analysis-of-trader-in-thailand-and-laos-border-trade-case-study-of-textile-and-garment-products" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65905.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">245</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3111</span> Different Approaches to the Study of Territorial Dispute between China and India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Albina%20Muratbekova">Albina Muratbekova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the main tensions and challenges in the development of Sino-Indian relation is the demarcation of its frontiers. The fact that throughout the history borders had never been demarcated on ground occur a dispute between China and India after receiving sovereignty. Boundaries of India and China are divided into three sectors: Eastern, Middle and Western. The middle sector runs from India’s Uttar Pradesh to the Punjab, 545 km length of the Line of Actual Control, the lines of which was confirmed at the 9th meeting of the Expert Group held in 2001, in New Delhi. Other two sectors are still not determined and cause disputes. A western sector of the frontier is the Aksai Chin plateau, covers areas of Ladakh, Tibet, and Sinkiang. Another disputed area lies in the Eastern sector in the Himalayan region, which after 1986 became the Indian state called Arunachal Pradesh. There are two different approaches in the ways of resolving the border dispute. Chinese side keeps an opinion that the border dispute must be resolved in a timely matter unless it is favorable for China, the resolution can be left to a later generation. While India’s government due to security reasons is eager to demarcate the border. In order to study this conflict was used as a descriptive-comparative-analytical method. Also, it was done a profound analyze of conflict nature. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border%20dispute" title="border dispute">border dispute</a>, <a href="https://publications.waset.org/abstracts/search?q=China" title=" China"> China</a>, <a href="https://publications.waset.org/abstracts/search?q=India" title=" India"> India</a>, <a href="https://publications.waset.org/abstracts/search?q=territorial%20claim" title=" territorial claim"> territorial claim</a> </p> <a href="https://publications.waset.org/abstracts/42372/different-approaches-to-the-study-of-territorial-dispute-between-china-and-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/42372.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">308</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3110</span> Long-Term Modal Changes in International Traffic - Example of the Polish Eastern Border</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tomasz%20Komornicki">Tomasz Komornicki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The possibilities of cross-border traffic depend on the degree of permeability of a given border as well as the state of the existing transport infrastructure. The aim of this paper is to identify the impact of economic transformation, EU accession, and infrastructure development on modal shifts in border traffic through the Polish eastern boundary. In the 1980s railway was still the main mode of cross-border transport in Poland. At the beginning of the 1990s, the role of the road and rail transborder passenger traffic was similar, but since 1993, the role of rail was decreasing. The general decline in rail infrastructure in Poland continued uninterruptedly until accession to the European Union. The slow opposite trend can be observed later as a result of the inflow of European funds. In the countries neighbouring Poland from the east, these processes took place with some delay, and the loss of railway position was not so drastic. Therefore, cross-border railway connections have been maintained for quite a long time since the break-up of the USSR. However, finally, cross-border rail transport proved to be completely inflexible in relation to both economic, geopolitical, and transport transformations. It has been shown that the current modal split of the passenger border traffic was shaped by the following factors: a) closure of many transborder railway lines, especially local ones; b) the signing of an agreement on minor border traffic with Ukraine; c) rapidly growing number of citizens of Ukraine working in Poland (unofficial transportation of workers by car directly to their workplaces in Poland); d) the emergence of low-cost air connections between Ukraine and Poland and the growing role of air transport in the Russia-Poland relationship. The summary points to the possibility of a renewed increase in the importance of rail transport on the eastern border of the European Union. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=modal%20change" title="modal change">modal change</a>, <a href="https://publications.waset.org/abstracts/search?q=border" title=" border"> border</a>, <a href="https://publications.waset.org/abstracts/search?q=rail%20transport" title=" rail transport"> rail transport</a>, <a href="https://publications.waset.org/abstracts/search?q=Poland" title=" Poland"> Poland</a> </p> <a href="https://publications.waset.org/abstracts/138771/long-term-modal-changes-in-international-traffic-example-of-the-polish-eastern-border" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138771.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">200</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3109</span> System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alicja%20Starczewska">Alicja Starczewska</a>, <a href="https://publications.waset.org/abstracts/search?q=Aleksander%20Nawrat"> Aleksander Nawrat</a>, <a href="https://publications.waset.org/abstracts/search?q=Krzysztof%20Daniec"> Krzysztof Daniec</a>, <a href="https://publications.waset.org/abstracts/search?q=Jaros%C5%82aw%20Homa"> Jarosław Homa</a>, <a href="https://publications.waset.org/abstracts/search?q=Kacper%20Ho%C5%82da"> Kacper Hołda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=BGP" title="BGP">BGP</a>, <a href="https://publications.waset.org/abstracts/search?q=BGP%20hijacking" title=" BGP hijacking"> BGP hijacking</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a> </p> <a href="https://publications.waset.org/abstracts/174286/system-detecting-border-gateway-protocol-anomalies-using-local-and-remote-data" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174286.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">77</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3108</span> Long-Term Modal Changes in International Traffic - Modelling Exercise</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tomasz%20Komornicki">Tomasz Komornicki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The primary aim of the presentation is to try to model border traffic and, at the same time to explain on which economic variables the intensity of border traffic depended in the long term. For this purpose, long series of traffic data on the Polish borders were used. Models were estimated for three variants of explanatory variables: a) for total arrivals and departures (total movement of Poles and foreigners), b) for arrivals and departures of Poles, and c) for arrivals and departures of foreigners. Each of the defined explanatory variables in the models appeared as the logarithm of the natural number of persons. Data from 1994-2017 were used for modeling (for internal Schengen borders for the years 1994-2007). Information on the number of people arriving in and leaving Poland was collected for a total of 303 border crossings. On the basis of the analyses carried out, it was found that one of the main factors determining border traffic is generally differences in the level of economic development (GDP) and the condition of the economy (level of unemployment) and the degree of border permeability. Also statistically significant for border traffic are differences in the prices of goods (fuels, tobacco, and alcohol products) and services (mainly basic ones, e.g., hairdressing services). Such a relationship exists mainly on the eastern border (border traffic determined largely by differences in the prices of goods) and on the border with Germany (in the first analysed period, border traffic was determined mainly by the prices of goods, later - after Poland's accession to the EU and the Schengen area - also by the prices of services). The models also confirmed differences in the set of factors shaping the volume and structure of border traffic on the Polish borders resulting from general geopolitical conditions, with the year 2007 being an important caesura, after which the classical population mobility factors became visible. The results obtained were additionally related to changes in traffic that occurred as a result of the CPOVID-19 pandemic and as a result of the Russian aggression against Ukraine. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=border" title="border">border</a>, <a href="https://publications.waset.org/abstracts/search?q=modal%20structure" title=" modal structure"> modal structure</a>, <a href="https://publications.waset.org/abstracts/search?q=transport" title=" transport"> transport</a>, <a href="https://publications.waset.org/abstracts/search?q=Ukraine" title=" Ukraine"> Ukraine</a> </p> <a href="https://publications.waset.org/abstracts/162583/long-term-modal-changes-in-international-traffic-modelling-exercise" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162583.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">115</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3107</span> Factors Influencing the Acceptance of Y Series among the Residents in Three Southern Border Provinces of Thailand</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chetsada%20Noknoi">Chetsada Noknoi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The acceptance of Y series refers to the willingness and enjoyment of watching Y series without feeling different from general series. This occurs when people watch Y series and derive happiness and entertainment from it. The viewing experience has the most significant impact on Y series acceptance. This research aims to 1) investigate the levels of acceptance of sexual diversity, image of Y series Actors, media exposure, and Y series acceptance among the residents in three southern border provinces of Thailand, and 2) examine how acceptance of sexual diversity, actor perceptions in Y series, and media exposure influence Y series acceptance in these provinces. The sample consisted of 322 participants from the three southern border provinces of Thailand. The research instrument used was a questionnaire, and data were analyzed using frequency, percentage, mean, standard deviation, and multiple regression analysis. The findings revealed that overall, acceptance of sexual diversity, Image of Y series Actors, and Y series acceptance among the residents in three southern border provinces of Thailand were at a high level, while media exposure was moderate overall. However, the two factors that had the most significant impact on Y series acceptance in these provinces, ranked from highest to lowest influence, were media exposure and acceptance of sexual diversity. Both of these factors had a positive effect on Y series acceptance among the residents in three southern border provinces of Thailand. Collectively, these factors accounted for 40.7% of the variance in Y series acceptance among the residents in three southern border provinces of Thailand. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=acceptance" title="acceptance">acceptance</a>, <a href="https://publications.waset.org/abstracts/search?q=acceptance%20of%20sexual%20diversity" title=" acceptance of sexual diversity"> acceptance of sexual diversity</a>, <a href="https://publications.waset.org/abstracts/search?q=image%20of%20Y%20series%20actors" title=" image of Y series actors"> image of Y series actors</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20exposure" title=" media exposure"> media exposure</a>, <a href="https://publications.waset.org/abstracts/search?q=Y%20series" title=" Y series"> Y series</a> </p> <a href="https://publications.waset.org/abstracts/174083/factors-influencing-the-acceptance-of-y-series-among-the-residents-in-three-southern-border-provinces-of-thailand" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/174083.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">77</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=104">104</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=105">105</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=border%20security&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>