Search results for: information security competencies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13230

Search results for: information security competencies

13230 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 95
13229 IT Skills and Soft Skills for Accountants in Thailand

Authors: Manirath Wongsim

Abstract:

Information technology management has become important for the achievement of organisations. An increase in the pace of technological change has revolutionised the way accountants perform their jobs. In response to this challenge, the identification of a new comprehensive set of information technology competencies combined with information technology skills and other skills (namely, soft skills) are necessary. Thus, this study aims to investigate IT competencies among professional accountants to enhance firm performance. This research was conducted with 42 respondents at ten organisations in Thailand. This research used qualitative, interpretive evidence.The results indicate that the factor IT competencies within the organizational issues defines19 factors. Specifically, these new factors, based on the research findings and the literature and unique to IT competences for professional accountants, include ERP software skills, BI software skills and accounting law and legal skills. The evidence in this study suggests that ERP software, spreadsheets, BI software and accounting software were ranked as much-needed skills to be acquired by accountants while communication skills were ranked as the most required skills, and delegation skills as the least required. The findings of the research’s empirical evidence suggest that organizations should understand appropriate into developing information technology related competencies for knowledge workers in general and professional accountants in particular and provide assistance in all processes of decision making.

Keywords: IT competencies, IT competencies for accountants, IT skills for accounting, soft skills for accountants

Procedia PDF Downloads 415
13228 Competencies and Training Needs for School Sport Managers in the North West Province, South Africa

Authors: Elriena Eksteen, Yolandi Willemse, Dawie D. J. Malan, Suria Ellis

Abstract:

It is important to understand which competencies are needed for managerial and administrative effectiveness of school sport managers with regard to the design, delivery and direction of school sport programmes. The purpose of this study was to determine the competencies and training needs for secondary school sport managers in the North West Province. Data were gathered from 79 school sport managers in the North West Province by means of a validated self-compiled questionnaire. Descriptive statistics, factor analysis and a dependent t-test were used to compare which competencies school sport managers perceive as important in their work with the competencies they actually perform. Functional competencies and core competencies were both found to be important for managing school sport effectively. There were statistically significant differences between the perceived importance of competencies and the frequency with which competencies were actually performed. Respondents attached greater importance to functional and core competencies than the proportion of time spent actually performing them. Furthermore, results indicated the need to train teachers in managing sport finance, sport facilities and human resources, as well as presenting workshops in public relations, sport marketing and sport organisation.

Keywords: competencies, functional competencies, core competencies, school sport manager, training needs

Procedia PDF Downloads 427
13227 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 575
13226 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 705
13225 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 430
13224 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 237
13223 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 542
13222 The Role of Social Civil Competencies in Organizational Performance

Authors: I. Martins, A. Martins

Abstract:

The European Union supports social and civil competencies as being a core element to develop sustainability of organizations, people and regions. These competencies are fundamental for the well-being of the community because they include interpersonal, intrapersonal as well as their civil, active and democratic participation in organizations. The combination of these competencies reveals the organizational socio-emotional maturity and allows relevant levels of performance. It also allows the development of various capitals, namely, human, structural, relational and social, with direct influence on performance. But along this path, the emotional aspect has not been valued as a capital, given that contemporary society is based on knowledge capital and is flooded with information viewed as a capital. The present study, based on the importance of these socio-emotional capitals, aims to show that the competencies of cooperation, interpersonal understanding, empathy, kindness, ability to listen, and tolerance, to mention a few, are strategic in consolidating knowledge within organizations. This implies that the humanizing processes, both inside and outside the organizations, are revitalized. The question is how to go about doing this and its implementation; as well as, where to begin and which guidelines to take on. These are the foci that guide the present study, bearing in mind the directions of the knowledge economy.

Keywords: civil competencies, humanizing, performance, social competencies

Procedia PDF Downloads 145
13221 Lobbyists’ Competencies as a Basis for Shaping the Positive Image of Modern Lobbying

Authors: Joanna Dzieńdziora

Abstract:

Lobbying is an instrument of influence in various decision-making processes. It is also the underestimated issue as a research problem. The lack of research on the modern lobbyist competencies is the most crucial element. The paper presents attempts of finding answers to the following questions: Who should run the lobbying activity? What competencies should a lobbyist possess in order to implement lobbying activities effectively? Searching for answers for the mentioned above questions requires positioning the opportunity to change the image of lobbying in the area of competencies of entities that provide lobbying activities. The aim of the paper is presenting the lobbyist competencies profile in the framework of his professional role. The essence of lobbying activity and its significance in the modern economy as well as areas, the scope of lobbying activities, diagnosis of a modern lobbyist’s competences, lobbyist’s competencies profile that is focused on the professionalization of the lobbying activity, will have been presented in this paper. Indicated research tasks let emerge lobbyist’s competencies in the way that allows identifying and elaborating the lobbyist competencies profile. The profile lets improve lobbying activities. Its elaboration is based on the author’s research results analysis. Taking into consideration the shortages within the theory and research on the lobbying activity, the implementation of this research enables to fill the cognitive gap existing in the theory of management sciences.

Keywords: competencies, competencies profile, lobbying, lobbyist

Procedia PDF Downloads 155
13220 Information Technology Competences for Professional Accountants in Thai Small to Medium Accounting Practice

Authors: Manirath Wongsim, Chatchawarn Srimontree, Pornpichit Phosri

Abstract:

Today, the majority of the data innovation may be currently majorly influencing business, what more accepted part of the accountant may be evolving. Information Technology elements have been appearing to be crucial in triggering changes of accountants’ roles. Thus, this study aims to investigate IT competencies among professional accountants to enhance firm performance. This research was conducted with 47 respondents at five organizations in Thailand and used quantitative research. The results indicate that the factor IT competencies for professional accountants in Thai small to medium accounting within the organizational issues defines18 factors. Specifically, these new factors, based on the research findings and the literature, then unique to IT competencies for professional accountants, include ERP software skills and accounting law and legal skills. The evidence in this study suggests that Analytical skills, teamwork skills, and accounting software were ranked as much-needed skills to be acquired by accountants while communication skills were ranked as the most required skills and delegation skills as the least required. The findings of the research’s empirical evidence suggest that organizations should understand appropriate in developing information technology influence competencies for knowledge employees in general and professional accountants in particular and provide assistance in all processes of decision making.

Keywords: IT competencies, IT competences for professional accountants, IT skills for accounting, IT skills in SMEs

Procedia PDF Downloads 231
13219 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 440
13218 Characterization of Group Dynamics for Fostering Mathematical Modeling Competencies

Authors: Ayse Ozturk

Abstract:

The study extends the prior research on modeling competencies by positioning students’ cognitive and language resources as the fundamentals for pursuing their own inquiry and expression lines through mathematical modeling. This strategy aims to answer the question that guides this study, “How do students’ group approaches to modeling tasks affect their modeling competencies over a unit of instruction?” Six bilingual tenth-grade students worked on open-ended modeling problems along with the content focused on quantities over six weeks. Each group was found to have a unique cognitive approach for solving these problems. Three different problem-solving strategies affected how the groups’ modeling competencies changed. The results provide evidence that the discussion around groups’ solutions, coupled with their reflections, advances group interpreting and validating competencies in the mathematical modeling process

Keywords: cognition, collective learning, mathematical modeling competencies, problem-solving

Procedia PDF Downloads 159
13217 Policy Compliance in Information Security

Authors: R. Manjula, Kaustav Bagchi, Sushant Ramesh, Anush Baskaran

Abstract:

In the past century, the emergence of information technology has had a significant positive impact on human life. While companies tend to be more involved in the completion of projects, the turn of the century has seen importance being given to investment in information security policies. These policies are essential to protect important data from adversaries, and thus following these policies has become one of the most important attributes revolving around information security models. In this research, we have focussed on the factors affecting information security policy compliance in two models : The theory of planned behaviour and the integration of the social bond theory and the involvement theory into a single model. Finally, we have given a proposal of where these theories would be successful.

Keywords: information technology, information security, involvement theory, policies, social bond theory

Procedia PDF Downloads 371
13216 A Pattern Practise for Awareness Educations on Information Security: Information Security Project

Authors: Fati̇h Apaydin

Abstract:

Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics.

Keywords: computer, information security, education, technology, development

Procedia PDF Downloads 594
13215 The Relationship of Entrepreneurial Competencies and Business Success of Malaysian SMEs: The Mediating Role of Innovation and Brand Equity

Authors: Azmi Umar, Rohana Ngah

Abstract:

The aim of this paper is to examine the relationship of entrepreneurial competencies on business success in the context of Malaysian SMEs. In the recent study, when the business environment is hostile and dynamic, the entrepreneurial competencies are identified as the most important factor in business success. Entrepreneurial competencies are also connected directly to business performance. Beside entrepreneurial competencies, the entrepreneurs should also be competent to create an innovation and brand equity for business growth. The innovation and brand equity contributed to competitive advantages that lead to business growth and success. This paper adopts the Resource Based Theory (RBT) which emphasize that entrepreneurial competencies, innovation and brand equity are valuable and intangible resources that lead towards the success of business; and Brand Equity Creation Process Model (BECPM). A quantitative methodology was used to collect the data from owner/managers of Malaysian SMEs. Data were analyzed by using SPSS and SEM software. Hence, findings of the present study would be essential for owner/managers and strategy makers to enhance the entrepreneurial competencies; innovation and brand equity of SMEs in Malaysia towards global competition.

Keywords: entrepreneurial competencies, innovation, brand equity, business success, SMEs

Procedia PDF Downloads 383
13214 Implementation of 5S Lean Methodology in Reviewing Competencies in a Higher Education Institution

Authors: Jasim Saleh Said AlDairi

Abstract:

The potential of applying Lean Management in Higher Education Institutions has increased significantly in last few years, leading to tremendous savings. Reviewing and updating competencies’ curriculum matrix is one of the critical and complicated processes that consume time and effort, and this has triggered searching for a scientific and sustainable approach to manage the such review. This paper presents a novel approach of implementing Lean (5S) methodology in reviewing technical competencies required for the graduates of the Military Technological College (MTC) in the Sultanate of Oman. The 5S framework has been imbedded into an action plan using the PDCA cycle. As a result, the method applied has helped in sorting out the actual required competencies, the team has identified the required (new, amended, and deleted) competencies in all of the targeted Engineering Departments, in addition, the major wastes within the overall process were identified, and the future review process was standardized and documented.

Keywords: PDCA, 5S, lean, MTC, competencies, curriculum matrix, higher education

Procedia PDF Downloads 94
13213 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 537
13212 Students Competencies in the Use of Computer Assistive Technology at Akropong School for the Blind in the Eastern of Ghana

Authors: Joseph Ampratwum, Yaw Nyadu Offei, Afua Ntoaduro, Frank Twum

Abstract:

The use of computer assistive technology has captured the attention of individuals with visual impairment. Children with visual impairments who are tactual learners have one unique need which is quite different from all other disability groups. They depend on the use of computer assistive technology for reading, writing, receiving information and sending information as well. The objective of the study was to assess students’ competencies in the use of computer assistive technology at Akropong School for the Blind in Ghana. This became necessary because little research has been conducted to document the competencies and challenges in the use of computer among students with visual impairments in Africa. A case study design with a mixed research strategy was adopted for the study. A purposive sampling technique was used to sample 35 students from Akropong School for the Blind in the eastern region of Ghana. The researcher gathered both quantitative and qualitative data to measure students’ competencies in keyboarding skills and Job Access with Speech (JAWS), as well as the other challenges. The findings indicated that comparatively students’ competency in keyboard skills was higher than JAWS application use. Thus students had reached higher stages in the conscious competencies matrix in the former than the latter. It was generally noted that challenges limiting effective use of students’ competencies in computer assistive technology in the School were more personal than external influences. This was because most of the challenges were due to the individual response to the training and familiarity in developing their competencies in using computer assistive technology. Base on this it was recommended that efforts should be made to stock up the laboratory with additional computers. Directly in line with the first recommendation, it was further suggested that more practice time should be created for the students to maximize computer use. Also Licensed JAWS must be acquired by the school to advance students’ competence in using computer assistive technology.

Keywords: computer assistive technology, job access with speech, keyboard, visual impairment

Procedia PDF Downloads 343
13211 Elucidation of Leaders' Intrapersonal Competencies in the Workplace

Authors: Prakash Singh

Abstract:

Employees who are satisfied at their place of work rate their leaders’ intrapersonal competencies as being high. They also believe that a leader’s intrapersonal competencies influence their sense of job satisfaction. Employees who indicate that they are unhappy at their place of work rate their leaders’ intrapersonal competencies as being low. They also believe that a leader’s intrapersonal intelligence influence their feeling of job satisfaction. The leader’s appropriate intrapersonal competencies are crucial to the creation of a motivated and satisfied employee team. In this study, the quantitative research method was used to determine the employees’ perceptions of their leaders’ intrapersonal competencies and their influence on their job satisfaction; the six competencies being self-awareness, self-confidence, self-expression, self-control, adaptability, and optimism. All the competencies of leaders identified in this quantitative study can therefore be described as intervening variables that influence an employee’s sense of job satisfaction. The number of responses that indicate that each of the intrapersonal competencies of a leader that will have an influence on an employee’s sense of job satisfaction, ranges from 93% (a leader’s sense of self-awareness) to 99% (a leader’s ability to be adaptable). As the responses are significantly similar, it can be stated that the respondents indicate that all the intrapersonal competencies of a leader can influence an employee’s sense of job satisfaction. The findings of this study strongly suggest that in order to be satisfied at work, employees prefer to be led by leaders who are confident in their leadership roles; who send out clear, unambiguous messages; who maintain self-control; who are adaptable and flexible;, who face the future with optimism and who support the establishment of a collegial working environment. Evidently, the findings corroborate the hypothesis that employees believe that the intrapersonal competencies of leaders have a positive influence on the employees’ sense of job satisfaction. This study’s findings, therefore, confirm that the key to the leaders’ self-knowledge is access to their own feelings and the ability to discriminate among them and draw upon them to guide behaviour in their organisations. This exploratory study makes a contribution to the emerging research being accomplished on leaders’ intrapersonal intelligence with more research still needing to be attempted to determine to what extent these competencies of leaders can reshape the organizational climate and culture.

Keywords: emotional intelligence, employees’ job satisfaction, leaders’ intrapersonal competencies, leaders’ self-knowledge

Procedia PDF Downloads 265
13210 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 208
13209 The Influence of Gender on Job-Competencies Requirements of Chemical-Based Industries and Undergraduate-Competencies Acquisition of Chemists in South West, Nigeria

Authors: Rachael Olatoun Okunuga

Abstract:

Developing young people’s employability is a key policy issue for ensuring their successful transition to the labour market and their access to career oriented employment. The youths of today irrespective of their gender need to acquire the knowledge, skills and attitudes that will enable them to create or find jobs as well as cope with unpredictable labour market changes throughout their working lives. In a study carried out to determine the influence of gender on job-competencies requirements of chemical-based industries and undergraduate-competencies acquisition by chemists working in the industries, all chemistry graduates working in twenty (20) chemical-based industries that were randomly selected from six sectors of chemical-based industries in Lagos and Ogun States of Nigeria were administered with Job-competencies required and undergraduate-competencies acquired assessment questionnaire. The data were analysed using means and independent sample t-test. The findings revealed that the population of female chemists working in chemical-based industries is low compared with the number of male chemists; furthermore, job-competencies requirements are found not to be gender sensitive while there is no significant difference in undergraduate-competencies acquisition of male and female chemists. This suggests that females should be given the same opportunity of employment in chemical-based industries as their male counterparts. The study also revealed the level of acquisition of undergraduate competencies as related to the needs of chemical-based industries.

Keywords: knowledge, skill, attitude, acquired, required, employability

Procedia PDF Downloads 379
13208 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 375
13207 Information Asymmetry and Governing Boards in Higher Education: The Heat Map of Information Asymmetry Across Competencies and the Role of Training in Mitigating Information Asymmetry

Authors: Ana Karaman, Dmitriy Gaevoy

Abstract:

Successful and effective governing boards play an essential role in higher education by providing essential oversight and helping to steer the direction of an institution while creating and maintaining a thriving culture of stewardship. A well-functioning board can also help mitigate conflicts of interest, ensure responsible use of an organization's assets, and maintain institutional transparency. However, boards’ functions in higher education are inhibited by the presence of information asymmetry between the board and management. Board members typically have little specific knowledge about the business side of the higher education, in general, and an institution under their oversight in particular. As a result, boards often must rely on the discretion of the institutional upper administration as to what type of pertinent information being disclosed to the board. The phenomenon of information asymmetry is not unique to the higher education and has been studied previously in the context of both corporate and non-for-profit boards. Various board characteristics have been analyzed with respect to mitigating the information asymmetry between an organizational board and management. For example, it has been argued that such board characteristics as its greater size, independence, and a higher proportion of female members tend to reduce information asymmetry by raising levels of information disclosure and organizational transparency. This paper explores the phenomenon of information asymmetry between boards and management in the context of higher education. In our analysis, we propose a heat map of information asymmetry based on the categories of board competencies in higher education. The proposed heat map is based on the assessment of potential risks to both the boards and its institutions. It employs an assumption that a potential risk created by the presence of information asymmetry varies in its magnitude across various areas of boards’ competencies. Then, we explore the role of board members’ training in mitigating information asymmetry between the boards and the management by increasing the level of information disclosure and enhancing transparency in management communication with the boards. The paper seeks to demonstrate how appropriate training can provide board members with an adequate preparation to request a sufficient level of information disclose and transparency by arming them with knowledge of what questions to ask of the management.

Keywords: higher education, governing boards information asymmetry, board competencies, board training

Procedia PDF Downloads 70
13206 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207

Authors: Mazhar Hamayun

Abstract:

Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.

Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207

Procedia PDF Downloads 87
13205 Towards a Competence Management Approach Based on Continuous Improvement

Authors: N. Sefiani, C. Fikri Benbrahim, A. Boumane, K. Reklaoui

Abstract:

Nowadays, the reflection on competence management is the basic for new competitive strategies. It is considered as the core of the problems of the global supply chain. It interacts a variety of actors: information, physical and activities flows, etc. Even though competence management is seen as the key factor for any business success, the existing approaches demonstrate the deficiencies and limitations of the competence concept. This research has two objectives: The first is to make a contribution by focusing on the development of a competence approach, based on continuous improvement. It allows the enterprise to spot key competencies, mobilize them in order to serve its strategic objectives and to develop future competencies. The second is to propose a method to evaluate the level of Collective Competence. The approach was confirmed through an application carried out at an automotive company.

Keywords: competence, competencies’ approach, competence management, continuous improvement, collective competence level, performance indicator

Procedia PDF Downloads 489
13204 Assessment of the Professional Competencies of Agriculture Officers in North West Frontier Province (NWFP), Pakistan

Authors: Muhammad Zafarullah Khan, Khalid Nawab, Shahid Ali, Mubashir Habib, Shakirullah Khan, Sajjad Ahmad, Javid Ullah, Ikramul Haq

Abstract:

Professionally competent Agriculture Officers (AOs) can play an important role in the development of agriculture in the country. This study was conducted in North West Frontier Province (NWFP) (Pakistan) to assess professional competencies of Agriculture Officers (AOs) in January 2007. Data were collected from all (112) AOs through a mailed questionnaire. The study examines existing level of professional competencies of AOs and the required level of possessed competencies needed by them for their job performance in the areas of participatory extension methodologies. Both the possessed and required levels of competencies were scaled from 1-5 on Liker scale, 1 being very low and 5 being very high. . The study revealed a numerical difference between possessed and required levels regarding the professional competencies of the participatory extension methodology. It was also observed that higher levels of job experience increase the professional competencies in participatory extension methodology. It is recommended that periodic training and refresher courses are arranged for AOs so that their learning may become more practicable to diffuse agricultural innovations among members of participatory learning groups and convey modern technologies to the end users.

Keywords: professional competency, agriculture officers, assessment and participatory extension methodology, participatory extension

Procedia PDF Downloads 340
13203 Enhancing Students’ Language Competencies through Cooperative Learning

Authors: Raziel Felix-Aguelo

Abstract:

Language competencies refer to the knowledge and abilities to use English in four inter-related skills: Speaking, listening, reading, and writing. Cooperative learning is a type of instruction where learners are grouped together to work on an assignment, project, or task. To become competent in second language, one needs to actively use English in each of four modalities. Learning English is challenging to second language learners. Sometimes, some students feel demotivated and scared to use English during class discussions and recitations. This paper explores the students’ attitude and perception towards cooperative learning in enhancing their language competencies. The primary method for this research is case study. Thirty-two grade 9 students within a single selected class are used as sample. The instruments used in data collection were questionnaire and semi-structured interviews. The finding shows that collaborative learning activities enhance the four skills of the students. The participants consider this approach motivational as they engage and interact with others. This indicates that students develop their language competencies as they rely to one another in doing meaningful language activities.

Keywords: language competencies, collaborative learning, motivation, language activities

Procedia PDF Downloads 344
13202 Multi-Perspective Learning in a Real Production Plant Using Experiential Learning in Heterogeneous Groups to Develop System Competencies for Production System Improvements

Authors: Marlies Achenbach

Abstract:

System competencies play a key role to ensure an effective and efficient improvement of production systems. Thus, there can be observed an increasing demand for developing system competencies in industry as well as in engineering education. System competencies consist of the following two main abilities: Evaluating the current state of a production system and developing a target state. The innovative course ‘multi-perspective learning in a real production plant (multi real)’ is developed to create a learning setting that supports the development of these system competencies. Therefore, the setting combines two innovative aspects: First, the Learning takes place in heterogeneous groups formed by students as well as professionals and managers from industry. Second, the learning takes place in a real production plant. This paper presents the innovative didactic concept of ‘multi real’ in detail, which will initially be implemented in October/November 2016 in the industrial engineering, logistics and mechanical master’s program at TU Dortmund University.

Keywords: experiential learning, heterogeneous groups, improving production systems, system competencies

Procedia PDF Downloads 426
13201 The Study of Digital Transformation Skills and Competencies Framework at Umm Alqura University

Authors: Anod H. Alhazmi, Hanaa A. Yamani

Abstract:

The lack of digital transformation professionals could prevent Saudi Arabia’s universities from providing digital services. The task of understanding what digital skills are needed within an organization, measuring the existing skills, and developing or attracting talents is a complex task. This paper provides a comprehensive analysis of the digital transformation skills needed in the organizations who seek digital transformation and identifies the skills and competencies framework DigSC built on Skills Framework for the Informational Age (SFIA) framework that is adopted by the Ministry of Communications and Information Technology (MCIT) in Saudi Arabia. The framework adopted identifies the main digital transformation skills clusters, categories and levels of responsibilities for each job description to fill the gap between this requirement and the digital skills supplied by the Umm Alqura University (UQU).

Keywords: competencies, digital transformation, framework, skills, Umm Alqura university

Procedia PDF Downloads 187