SECURITY AND PRIVACY CONFERENCE


Security and Privacy Conference is one of the leading research topics in the international research conference domain. Security and Privacy is a conference track under the Economics Conference which aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of Economics.

internationalconference.net provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of (Economics).

Security and Privacy is not just a call for academic papers on the topic; it can also include a conference, event, symposium, scientific meeting, academic, or workshop.

You are welcome to SUBMIT your research paper or manuscript to Security and Privacy Conference Track will be held at .

Security and Privacy is also a leading research topic on Google Scholar, Semantic Scholar, Zenedo, OpenAIRE, BASE, WorldCAT, Sherpa/RoMEO, Elsevier, Scopus, Web of Science.

FINISHED

I. INTERNATIONAL ECONOMICS CONFERENCE

MARCH 19 - 20, 2019
ISTANBUL, TURKEY

FINISHED

II. INTERNATIONAL ECONOMICS CONFERENCE

JUNE 26 - 27, 2019
PARIS, FRANCE

FINISHED

III. INTERNATIONAL ECONOMICS CONFERENCE

AUGUST 21 - 22, 2019
LONDON, UNITED KINGDOM

FINISHED

IV. INTERNATIONAL ECONOMICS CONFERENCE

OCTOBER 08 - 09, 2019
NEW YORK, UNITED STATES

FINISHED

V. INTERNATIONAL ECONOMICS CONFERENCE

DECEMBER 12 - 13, 2019
ROME, ITALY

FINISHED

VI. INTERNATIONAL ECONOMICS CONFERENCE

FEBRUARY 13 - 14, 2020
LONDON, UNITED KINGDOM

FINISHED

VII. INTERNATIONAL ECONOMICS CONFERENCE

APRIL 15 - 16, 2020
BARCELONA, SPAIN

FINISHED

VIII. INTERNATIONAL ECONOMICS CONFERENCE

MAY 11 - 12, 2020
ISTANBUL, TURKEY

FINISHED

IX. INTERNATIONAL ECONOMICS CONFERENCE

JUNE 05 - 06, 2020
SAN FRANCISCO, UNITED STATES

FINISHED

X. INTERNATIONAL ECONOMICS CONFERENCE

JULY 20 - 21, 2020
PARIS, FRANCE

FINISHED

XI. INTERNATIONAL ECONOMICS CONFERENCE

AUGUST 10 - 11, 2020
NEW YORK, UNITED STATES

FINISHED

XII. INTERNATIONAL ECONOMICS CONFERENCE

SEPTEMBER 10 - 11, 2020
TOKYO, JAPAN

FINISHED

XIII. INTERNATIONAL ECONOMICS CONFERENCE

SEPTEMBER 16 - 17, 2020
ZÜRICH, SWITZERLAND

FINISHED

XIV. INTERNATIONAL ECONOMICS CONFERENCE

OCTOBER 21 - 22, 2020
BARCELONA, SPAIN

FINISHED

XV. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 02 - 03, 2020
SAN FRANCISCO, UNITED STATES

FINISHED

XVI. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 12 - 13, 2020
ISTANBUL, TURKEY

FINISHED

XVII. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 19 - 20, 2020
SINGAPORE, SINGAPORE

FINISHED

XVIII. INTERNATIONAL ECONOMICS CONFERENCE

DECEMBER 15 - 16, 2020
BANGKOK, THAILAND

FINISHED

XIX. INTERNATIONAL ECONOMICS CONFERENCE

DECEMBER 28 - 29, 2020
PARIS, FRANCE

FINISHED

XX. INTERNATIONAL ECONOMICS CONFERENCE

FEBRUARY 13 - 14, 2021
LONDON, UNITED KINGDOM

FINISHED

XXI. INTERNATIONAL ECONOMICS CONFERENCE

APRIL 15 - 16, 2021
BARCELONA, SPAIN

FINISHED

XXII. INTERNATIONAL ECONOMICS CONFERENCE

MAY 11 - 12, 2021
ISTANBUL, TURKEY

FINISHED

XXIII. INTERNATIONAL ECONOMICS CONFERENCE

JUNE 05 - 06, 2021
SAN FRANCISCO, UNITED STATES

FINISHED

XXIV. INTERNATIONAL ECONOMICS CONFERENCE

JULY 20 - 21, 2021
PARIS, FRANCE

FINISHED

XXV. INTERNATIONAL ECONOMICS CONFERENCE

AUGUST 10 - 11, 2021
NEW YORK, UNITED STATES

FINISHED

XXVI. INTERNATIONAL ECONOMICS CONFERENCE

SEPTEMBER 10 - 11, 2021
TOKYO, JAPAN

FINISHED

XXVII. INTERNATIONAL ECONOMICS CONFERENCE

SEPTEMBER 16 - 17, 2021
ZÜRICH, SWITZERLAND

FINISHED

XXVIII. INTERNATIONAL ECONOMICS CONFERENCE

OCTOBER 21 - 22, 2021
BARCELONA, SPAIN

FINISHED

XXIX. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 02 - 03, 2021
SAN FRANCISCO, UNITED STATES

FINISHED

XXX. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 12 - 13, 2021
ISTANBUL, TURKEY

FINISHED

XXXI. INTERNATIONAL ECONOMICS CONFERENCE

NOVEMBER 19 - 20, 2021
SINGAPORE, SINGAPORE

FINISHED

XXXII. INTERNATIONAL ECONOMICS CONFERENCE

DECEMBER 15 - 16, 2021
BANGKOK, THAILAND

FINISHED

XXXIII. INTERNATIONAL ECONOMICS CONFERENCE

DECEMBER 28 - 29, 2021
PARIS, FRANCE

Economics Conference Call For Papers are listed below:

Previously Published Papers on "Security and Privacy Conference"

  • The Effects of Cross-Border Use of Drones in Nigerian National Security
    Authors: H. P. Kerry, Keywords: Armed drones, cross-border, drones, national security. DOI:10.5281/zenodo. Abstract: Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.
  • Privacy Protection Principles of Omnichannel Approach
    Authors: Renata Mekovec, Dijana Peras, Ruben Picek, Keywords: Personal data, privacy protection, omnichannel communication, retail. DOI:10.5281/zenodo. Abstract: The advent of the Internet, mobile devices and social media is revolutionizing the experience of retail customers by linking multiple sources through various channels. Omnichannel retailing is a retailing that combines multiple channels to allow customers to seamlessly leverage all the distribution information online and offline while shopping. Therefore, today data are an asset more critical than ever for all organizations. Nonetheless, because of its heterogeneity through platforms, developers are currently facing difficulties in dealing with personal data. Considering the possibilities of omnichannel communication, this paper presents channel categorization that could enhance the customer experience of omnichannel center called hyper center. The purpose of this paper is fundamentally to describe the connection between the omnichannel hyper center and the customer, with particular attention to privacy protection. The first phase was finding the most appropriate channels of communication for hyper center. Consequently, a selection of widely used communication channels has been identified and analyzed with regard to the effect requirements for optimizing user experience. The evaluation criteria are divided into 3 groups: general, user profile and channel options. For each criterion the weight of importance for omnichannel communication was defined. The most important thing was to consider how the hyper center can make user identification while respecting the privacy protection requirements. The study carried out also shows what customer experience across digital networks would look like, based on an omnichannel approach owing to privacy protection principles.
  • Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security
    Authors: Rosmini Yanti, Safira Aviolita, Marsetio, Keywords: Archipelago State, maritime law, maritime security, traffic separation scheme. DOI:10.5281/zenodo. Abstract: Indonesia has several straits that are very important as a shipping lane, including the Sunda Strait and the Lombok Strait, which are the part of the Indonesian Archipelagic Sea Lane (IASL). An increase in traffic on the Marine Archipelago makes the task of monitoring sea routes increasingly difficult. Indonesia has proposed the establishment of a Traffic Separation Scheme (TSS) in the Sunda Strait and the Lombok Strait and the country now has the right to be able to conceptualize the TSS as well as the obligation to regulate it. Indonesia has the right to maintain national safety and sovereignty. In setting the TSS, Indonesia needs to issue national regulations that are in accordance with international law and the general provisions of the IMO (International Maritime Organization) can then be used as guidelines for maritime safety and security in the Sunda Strait and the Lombok Strait. The research method used is a qualitative method with the concept of linguistic and visual data collection. The source of the data is the analysis of documents and regulations. The results show that the determination of TSS was justified by International Law, in accordance with article 22, article 41, and article 53 of the United Nations Convention on the Law of the Sea (UNCLOS) 1982. The determination of TSS by the Indonesian government would be in accordance with COLREG (International Convention on Preventing Collisions at Sea) 10, which has been designed to follow IASL. Thus, TSS can provide a function as a safety and monitoring medium to minimize ship accidents or collisions, including the warship and aircraft of other countries that cross the IASL.
  • Influence of Security on Fan Attendance during Nigeria Professional Football League Matches
    Authors: B. O. Diyaolu, Keywords: Adequate Security, fans attendance, football fans, football stadium, Nigeria Professional Football League. DOI:10.5281/zenodo. Abstract: The stadium transcends a field of play to cultural heritage of a club especially when there is security of life and property and a conducive environment with exciting media facilities, CCTV and adequate field of play. Football fans love watching their clubs’ matches especially when nothing discourages their presence in the stadium. This study investigated the influence of security on fans’ attendance during Nigeria Professional Football League matches. Descriptive survey research design was used and the population consists of all Nigeria Professional Football League fans. Simple random sampling technique was used to pick a state from the six geo-political zones. 600 respondents comprising male and female fans were sampled from the ten selected vendors’ stands in each selected state. A structured questionnaire on Security and Fan attendance scale (SFAS) was used. The instrument consists of two sections. Section A seeks information on demographic data of the respondents, while section B was used to elicit information on security and fans’ attendance. The modified instrument which consists of 20 items has a reliability coefficient of 0.73. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded and analyzed using descriptive statistics of frequency counts and percentage and inferential statistics of chi-square (X2). Findings of this study revealed that adequate security significantly influences fan attendance during Nigeria Professional Football League matches. There is no sport that can develop if the facilities in use are inadequate. Improving the condition of the stadium in Nigeria is paramount to the development of the Nigeria Professional Football League. All stakeholders in the organization of the League must put into consideration the need to improve the standard of the stadium as it will help to increase the attendance of fans during matches. Only the standard ones should be used during matches.
  • The U.S. Missile Defense Shield and Global Security Destabilization: An Inconclusive Link
    Authors: Michael A. Unbehauen, Gregory D. Sloan, Alberto J. Squatrito, Keywords: Arms control, arms race, global security, GMD, ICBM, missile defense, proliferation. DOI:10.5281/zenodo.3299365 Abstract: Missile proliferation and global stability are intrinsically linked. Missile threats continually appear at the forefront of global security issues. North Korea’s recently demonstrated nuclear and intercontinental ballistic missile (ICBM) capabilities, for the first time since the Cold War, renewed public interest in strategic missile defense capabilities. To protect from limited ICBM attacks from so-called rogue actors, the United States developed the Ground-based Midcourse Defense (GMD) system. This study examines if the GMD missile defense shield has contributed to a safer world or triggered a new arms race. Based upon increased missile-related developments and the lack of adherence to international missile treaties, it is generally perceived that the GMD system is a destabilizing factor for global security. By examining the current state of arms control treaties as well as existing missile arsenals and ongoing efforts in technologies to overcome U.S. missile defenses, this study seeks to analyze the contribution of GMD to global stability. A thorough investigation cannot ignore that, through the establishment of this limited capability, the U.S. violated longstanding, successful weapons treaties and caused concern among states that possess ICBMs. GMD capability contributes to the perception that ICBM arsenals could become ineffective, creating an imbalance in favor of the United States, leading to increased global instability and tension. While blame for the deterioration of global stability and non-adherence to arms control treaties is often placed on U.S. missile defense, the facts do not necessarily support this view. The notion of a renewed arms race due to GMD is supported neither by current missile arsenals nor by the inevitable development of new and enhanced missile technology, to include multiple independently targeted reentry vehicles (MIRVs), maneuverable reentry vehicles (MaRVs), and hypersonic glide vehicles (HGVs). The methodology in this study encapsulates a period of time, pre- and post-GMD introduction, while analyzing international treaty adherence, missile counts and types, and research in new missile technologies. The decline in international treaty adherence, coupled with a measurable increase in the number and types of missiles or research in new missile technologies during the period after the introduction of GMD, could be perceived as a clear indicator of GMD contributing to global instability. However, research into improved technology (MIRV, MaRV and HGV) prior to GMD, as well as a decline of various global missile inventories and testing of systems during this same period, would seem to invalidate this theory. U.S. adversaries have exploited the perception of the U.S. missile defense shield as a destabilizing factor as a pretext to strengthen and modernize their militaries and justify their policies. As a result, it can be concluded that global stability has not significantly decreased due to GMD; but rather, the natural progression of technological and missile development would inherently include innovative and dynamic approaches to target engagement, deterrence, and national defense.
  • High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy
    Authors: F. Pagliara, F. Mauriello, Keywords: Tourists, overnights, high speed rail, attractions, security. DOI:10.5281/zenodo.3298641 Abstract: The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.
  • Analyzing Environmental Emotive Triggers in Terrorist Propaganda
    Authors: Travis Morris, Keywords: Emotive triggers, environmental security, natural language processing, propaganda analysis. DOI:10.5281/zenodo. Abstract: The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.
  • The Two Layers of Food Safety and GMOs in the Hungarian Agricultural Law
    Authors: Gergely Horváth, Keywords: Food law, food safety, food security, GMO, agri-environmental measures. DOI:10.5281/zenodo. Abstract: The study presents the complexity of food safety dividing it into two layers. Beyond the basic layer of requirements, there is a more demanding higher level linked with quality and purity aspects. It would be important to give special prominence to both layers, given that massive illnesses are caused by foods even though officially licensed. Then the study discusses an exciting safety challenge stemming from the risks of genetically modified organisms (GMOs). Furthermore, it features legal case examples that illustrate how certain liability questions are solved or not yet decided in connection with the production of genetically modified crops. In addition, a special kind of land grabbing, more precisely land grabbing from non-GMO farming systems can also be noticed as well as a new phenomenon eroding food sovereignty. Coexistence, the state where organic, conventional, and GM farming systems are standing alongside each other is an unsuitable experiment that cannot be successful, because of biophysical reasons (such as cross-pollination). Agricultural and environmental lawyers both try to find the optimal solution. Agri-environmental measures are introduced as a special subfield of law maintaining also food safety. The important steps of agri-environmental legislation are aiming at the protection of natural values, the environmental media and strengthening food safety as well, practically the quality of agricultural products intended for human consumption. The major findings of the study focus on searching for the appropriate approach capable of solving the security and safety problems of food production. The most interesting concepts of the Hungarian national and EU food law legislation are analyzed in more detail with descriptive, analytic and comparative methods.
  • SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud
    Authors: Somayeh Sobati Moghadam, Keywords: BPMN, security threats, cloud computing, graphical representation. DOI:10.5281/zenodo.1474423 Abstract: Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.
  • Strengthening Legal Protection of Personal Data through Technical Protection Regulation in Line with Human Rights
    Authors: Tomy Prihananto, Damar Apri Sudarmadi, Keywords: Indonesia, protection, personal data, privacy, human rights, encryption. DOI:10.5281/zenodo.1474387 Abstract: Indonesia recognizes the right to privacy as a human right. Indonesia provides legal protection against data management activities because the protection of personal data is a part of human rights. This paper aims to describe the arrangement of data management and data management in Indonesia. This paper is a descriptive research with qualitative approach and collecting data from literature study. Results of this paper are comprehensive arrangement of data that have been set up as a technical requirement of data protection by encryption methods. Arrangements on encryption and protection of personal data are mutually reinforcing arrangements in the protection of personal data. Indonesia has two important and immediately enacted laws that provide protection for the privacy of information that is part of human rights.

Conferences by Location