scholarly journals Classification of food security threats

2020 ◽  
Author(s):  
O.YU. SHibarshina
2017 ◽  
Vol 2 (3) ◽  
pp. 1
Author(s):  
Hanane Bennasar ◽  
Mohammad Essaaidi ◽  
Ahmed Bendahmane ◽  
Jalel Benothmane

Cloud computing cyber security is a subject that has been in top flight for a long period and even in near future. However, cloud computing permit to stock up a huge number of data in the cloud stockage, and allow the user to pay per utilization from anywhere via any terminal equipment. Among the major issues related to Cloud Computing security, we can mention data security, denial of service attacks, confidentiality, availability, and data integrity. This paper is dedicated to a taxonomic classification study of cloud computing cyber-security. With the main objective to identify the main challenges and issues in this field, the different approaches and solutions proposed to address them and the open problems that need to be addressed.


2021 ◽  
Vol 13 (9) ◽  
pp. 4728
Author(s):  
Zinhle Mashaba-Munghemezulu ◽  
George Johannes Chirima ◽  
Cilence Munghemezulu

Rural communities rely on smallholder maize farms for subsistence agriculture, the main driver of local economic activity and food security. However, their planted area estimates are unknown in most developing countries. This study explores the use of Sentinel-1 and Sentinel-2 data to map smallholder maize farms. The random forest (RF), support vector (SVM) machine learning algorithms and model stacking (ST) were applied. Results show that the classification of combined Sentinel-1 and Sentinel-2 data improved the RF, SVM and ST algorithms by 24.2%, 8.7%, and 9.1%, respectively, compared to the classification of Sentinel-1 data individually. Similarities in the estimated areas (7001.35 ± 1.2 ha for RF, 7926.03 ± 0.7 ha for SVM and 7099.59 ± 0.8 ha for ST) show that machine learning can estimate smallholder maize areas with high accuracies. The study concludes that the single-date Sentinel-1 data were insufficient to map smallholder maize farms. However, single-date Sentinel-1 combined with Sentinel-2 data were sufficient in mapping smallholder farms. These results can be used to support the generation and validation of national crop statistics, thus contributing to food security.


Author(s):  
Bisma Gulzar ◽  
Ankur Gupta

As IoT applications are pervasively deployed across multiple domains, the potential impact of their security vulnerabilities are also accentuated. Sensor nodes represent a critical security vulnerability in the IoT ecosystem as they are exposed to the environment and accessible to hackers. When compromised or manipulated, sensor nodes can transmit incorrect data which can have a damaging impact on the overall operation and effectiveness of the system. Researchers have addressed the security vulnerabilities in sensor nodes with several mechanisms being proposed to address them. This paper presents DAM (Detect, Avoid, Mitigate), a theoretical framework to evaluate the security threats and solutions for sensor security in IoT applications and deployments. The framework leads to the classification of sensor security threats and categorization of available solutions which can be used to either detect vulnerabilities and attacks, recover from them or completely avoid them. The proposed framework will be useful for evaluating sensor security in real-world IoT deployments in terms of potential threats and designing possible solution


2017 ◽  
Vol 11 (2) ◽  
pp. 191
Author(s):  
Suharyanto Suharyanto

Household food security level essentially is the ability of households meet food sufficiency. These capabilities are greatly influenced by many complex factors, but  generally  associated  with  changes  in  behavioral  aspects  of  food  production, consumption and allocation of households resources. The purpose of this study was to analyze  the  level  of  household  food  security  based  on  low  land  rice  irrigated.  The study was conducted in three districts of rice production center in the province of Bali in 2012, i.e. Tabanan district, Gianyar and Buleleng. Data collection was conducted through interviews with 216 respondents. Household food security was measured by cross classification of the share of food expenditure and consumption of energy. The results  of  the  analysis  showed  58.33  %  of  households  have  a  lower  share  of  food expenditure  and  41.67%  household  have  higher  share  of  food  expenditure.  In aggregate  86.57%  of  farm  households  is  quite  in  consuming  energy  and  13.43% is less  in  energy  consume.  The  level  of  household  food  security  of  farmers  in  the aggregate 49.07% of the household were categorized as secure, 37.9% as vulnerable, 8.79% as insufficient, and 4.17% as insecure. There is a correlation between the level of  household food  security  with  age  of  housewife,  level  of  education,  farm  size  and household income.


Financial law ◽  
2021 ◽  
Vol 1 ◽  
pp. 37-39
Author(s):  
Nadezhda G. Dolmatova ◽  

Currently, Russia has begun to form a legal framework for the development of the digital economy. The introduction of digital technologies affects all areas of public relations, including budgetary legal relations. In connection with digitalization, issues of budget security are becoming more relevant. The article substantiates the need to improve the legal regulation of budget relations in terms of ensuring budget security and the use of digital technologies. The author’s classification of budget security threats is given. Legal contradictions in the field of digital currency regulation are revealed. Measures are proposed to eliminate conflicts and gaps in the current legislation regulating budgetary legal relations and relations arising in connection with the use of digital currency.


2011 ◽  
pp. 1364-1378
Author(s):  
Aikaterini Mitrokotsa ◽  
Christos Douligeris

The use of electronic technologies in government services has played a significant role in making citizens’ lives more convenient. Even though the transition to digital governance has great advantages for the quality of government services it may be accompanied with many security threats. One of the major threats and hardest security problems e-Government faces are the Denial of Service (DoS) attacks. DoS attacks have already taken some of the most popular e-government sites off-line for several hours causing enormous losses and repair costs. In this chapter, important incidents of DoS attacks and results from surveys that indicate the seriousness of the problem are presented. In order to limit the problem of DoS attacks in government organisations we also present a list of best practices that can be used to combat the problem together with a classification of attacks and defense mechanisms.


2020 ◽  
Vol 28 (6) ◽  
pp. 635-653
Author(s):  
Miguel Ángel Díaz de León Guillén ◽  
Víctor Morales-Rocha ◽  
Luis Felipe Fernández Martínez

Among the service models provided by the cloud, the software as a service (SaaS) model has had the greatest growth. This service model is an attractive option for organizations, as they can transfer part or all of their IT functions to a cloud service provider. However, there is still some uncertainty about deciding to carry out a migration of all data to the cloud, mainly due to security concerns. The SaaS model not only inherits the security problems of a traditional application, but there are unique attacks and vulnerabilities for a SaaS architecture. Additionally, some of the attacks in this environment are more devastating due to nature of shared resources in the SaaS model. Some of these attacks and vulnerabilities are not yet well known to software designers and developers. This lack of knowledge has negative consequences as it can expose sensitive data of users and organizations. This paper presents a rigorous systematic review using the SALSA framework to know the threats, attacks and countermeasures to mitigate the security problems that occur in a SaaS environment. As part of the results of this review, a classification of threats, attacks and countermeasures in the SaaS environment is presented.


2011 ◽  
Vol 14 (12) ◽  
pp. 2254-2259 ◽  
Author(s):  
Anna C Holland ◽  
Matthew C Kennedy ◽  
Stephen W Hwang

AbstractObjectiveTo compare the Household Food Insecurity Access Scale (HFIAS), the US Food Security Survey Module (US FSSM) and a modified version of the US FSSM in which references to buying food were changed to references to getting food, in terms of their classification of food security levels among homeless individuals, and to determine which of these instruments was most preferred by homeless individuals.DesignA cross-sectional survey.SettingRecruitment of participants took place at seven shelters and from three drop-in programmes that serve homeless individuals in Toronto, Canada.SubjectsFifty individuals who were ≥18 years of age, able to communicate in English and currently homeless.ResultsThe modified US FSSM assigned 20 % of participants to a lower ordinal food security category compared with the US FSSM, and only 8 % to a higher food security category. The HFIAS assigned 30 % of participants to a lower food security category compared with either the US FSSM or the modified US FSSM, and only 10–16 % of participants to a higher food security category. When asked to compare all three instruments, the majority of respondents (62 %) selected the HFIAS as the best instrument for people who are homeless.ConclusionsA majority of homeless individuals selected the HFIAS as the best food security instrument for people who are homeless. Our findings suggest that the HFIAS is a more appropriate instrument than the US FSSM for measuring food security in the homeless population.


Sign in / Sign up

Export Citation Format

Share Document