Search results for: cybersecurity defense strategies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5571

Search results for: cybersecurity defense strategies

5301 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System

Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji

Abstract:

Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.

Keywords: Biba model, break the glass, context, cross-domain, fine-grained

Procedia PDF Downloads 518
5300 Science and Mathematics Instructional Strategies, Teaching Performance and Academic Achievement in Selected Secondary Schools in Upland

Authors: Maria Belen C. Costa, Liza C. Costa

Abstract:

Teachers have an important influence on students’ academic achievement. Teachers play a crucial role in educational attainment because they stand in the interface of the transmission of knowledge, values, and skills in the learning process through the instructional strategies they employ in the classroom. The level of achievement of students in school depends on the degree of effectiveness of instructional strategies used by the teacher. Thus, this study was conceptualized and conducted to examine the instructional strategies preferred and used by the Science and Mathematics teachers and the impact of those strategies in their teaching performance and students’ academic achievement in Science and Mathematics. The participants of the study comprised a total enumeration of 61 teachers who were chosen through total enumeration and 610 students who were selected using two-stage random sampling technique. The descriptive correlation design was used in this study with a self-made questionnaire as the main tool in the data gathering procedure. Relationship among variables was tested and analyzed using Spearman Rank Correlation Coefficient and Wilcoxon Signed Rank statistics. The teacher participants under study mainly belonged to the age group of ‘young’ (35 years and below) and most were females having ‘very much experienced’ (16 years and above) in teaching. Teaching performance was found to be ‘very satisfactory’ while academic achievement in Science and Mathematics was found to be ‘satisfactory’. Demographic profile and teaching performance of teacher participants were found to be ‘not significant’ to their instructional strategy preferences. Results implied that age, sex, level of education and length of service of the teachers does not affect their preference on a particular instructional strategy. However, the teacher participants’ extent of use of the different instructional strategies was found to be ‘significant’ to their teaching performance. The instructional strategies being used by the teachers were found to have a direct effect on their teaching performance. Academic achievement of student participants was found to be ‘significant’ to the teacher participants’ instructional strategy preferences. The preference of the teachers on instructional strategies had a significant effect on the students’ academic performance. On the other hand, teacher participants’ extent of use of instructional strategies was showed to be ‘not significant’ to the academic achievement of students in Science and Mathematics. The instructional strategy being used by the teachers did not affect the level of performance of students in Science and Mathematics. The results of the study revealed that there was a significant difference between the teacher participants’ preference of instructional strategy and the student participants’ instructional strategy preference as well as between teacher participants’ extent of use and student participants’ perceived level of use of the different instructional strategies. Findings found a discrepancy between the teaching strategy preferences of students and strategies implemented by teachers.

Keywords: academic achievement, extent of use, instructional strategy, preferences

Procedia PDF Downloads 288
5299 Learning to Learn: A Course on Language Learning Strategies

Authors: Hélène Knoerr

Abstract:

In an increasingly global world, more and more international students attend academic courses and programs in a second or foreign language, and local students register in language learning classes in order to improve their employability. These students need to quickly become proficient in the new language. How can we, as administrators, curriculum developers and teachers, make sure that they have the tools they need in order to develop their language skills in an academic context? This paper will describe the development and implementation of a new course, Learning to learn, as part of the Major in French/English as a Second Language at the University of Ottawa. This academic program was recently completely overhauled in order to reflect the current approaches in language learning (more specifically, the action-oriented approach as embodied in the Common European Framework of Reference for Languages, and the concept of life-long autonomous learning). The course itself is based on research on language learning strategies, with a particular focus on the characteristics of the “good language learner”. We will present the methodological and pedagogical foundations, describe the course objectives and learning outcomes, the language learning strategies, and the classroom activities. The paper will conclude with students’ feedback and suggest avenues for further exploration.

Keywords: curriculum development, language learning, learning strategies, second language

Procedia PDF Downloads 380
5298 Inductive Grammar, Student-Centered Reading, and Interactive Poetry: The Effects of Teaching English with Fun in Schools of Two Villages in Lebanon

Authors: Talar Agopian

Abstract:

Teaching English as a Second Language (ESL) is a common practice in many Lebanese schools. However, ESL teaching is done in traditional ways. Methods such as constructivism are seldom used, especially in villages. Here lies the significance of this research which joins constructivism and Piaget’s theory of cognitive development in ESL classes in Lebanese villages. The purpose of the present study is to explore the effects of applying constructivist student-centered strategies in teaching grammar, reading comprehension, and poetry on students in elementary ESL classes in two villages in Lebanon, Zefta in South Lebanon and Boqaata in Mount Lebanon. 20 English teachers participated in a training titled “Teaching English with Fun”, which focused on strategies that create a student-centered class where active learning takes place and there is increased learner engagement and autonomy. The training covered three main areas in teaching English: grammar, reading comprehension, and poetry. After participating in the training, the teachers applied the new strategies and methods in their ESL classes. The methodology comprised two phases: in phase one, practice-based research was conducted as the teachers attended the training and applied the constructivist strategies in their respective ESL classes. Phase two included the reflections of the teachers on the effects of the application of constructivist strategies. The results revealed the educational benefits of constructivist student-centered strategies; the students of teachers who applied these strategies showed improved engagement, positive attitudes towards poetry, increased motivation, and a better sense of autonomy. Future research is required in applying constructivist methods in the areas of writing, spelling, and vocabulary in ESL classrooms of Lebanese villages.

Keywords: active learning, constructivism, learner engagement, student-centered strategies

Procedia PDF Downloads 119
5297 Research on Autonomous Controllability of BeiDou Navigation Satellite System Based on Knowledge Transformation

Authors: Hang Ju, Changmin Zhu

Abstract:

The development level of the BeiDou Navigation Satellite System (BDS) can strongly reflect national defense strength as an important spatial information infrastructure. BDS can be not only used for military purposes, such as intelligence gathering, nuclear explosion monitoring, emergency communications, but also for location services, transportation, mapping, precision agriculture. In order to ensure the national defense security and the wide application of BDS in civil and military areas, BDS must be autonomous and controllable. As a complex system of knowledge-intensive, knowledge transformation runs through the whole process of research and development, production, operation, and maintenance of BDS. Based on the perspective of knowledge transformation, this paper expounds on the meaning of socialization, externalization, combination, and internalization of knowledge transformation, and the coupling relationship of autonomy and control on the basis of analyzing the status quo and problems of the autonomy and control of BDS. The autonomous and controllable framework of BDS based on knowledge transformation is constructed from six dimensions of management capability, R&D capability, technical capability, manufacturing capability, service support capability, and application capability. It can provide support for the smooth implementation of information security policy, provide a reference for the autonomy and control of the upstream and downstream industrial chains in Beidou, and provide a reference for the autonomous and controllable research of aerospace components, military measurement test equipment, and other related industries.

Keywords: knowledge transformation, BeiDou Navigation Satellite System, autonomy and control, framework

Procedia PDF Downloads 158
5296 Preventing Farmer-Herder Conflicts in Ghana: A Constellation of Local Strategies and Solutions

Authors: Abdulai Abubakari

Abstract:

The rollercoaster relationship between farmers and herders in Sub-Saharan Africa has compelled most governments to undertake different mitigating strategies. Over the past two decades, the expulsion of migrant herdsmen, the killing of cattle and human beings, and fines have been used by the state and aggrieved individuals to resolve the conflicts. Unlike this paper, most of the research conducted on this subject matter has been largely theoretical and lacks practical solutions to the conflicts. This paper is unique because it focuses on concrete strategies and practical solutions to ending the century-old phenomenon of farmer-herder conflicts in Ghana. The paper employed power or compete (fight) theory as well as compromise and negotiation theories in the analyses. The paper employed, basically, socio-anthropological methods: interviews, focus group discussions, and observations to gather data. The paper found that compromises through negotiation with the stakeholders are the best ways of resolving these conflicts. Through this, we support the compromise and negotiation approach rather than expulsion to resolve farmer-herder conflicts.

Keywords: farmer-herder, conflict, prevention, strategies, stakeholders

Procedia PDF Downloads 25
5295 Positive Behaviour Management Strategies: An Action Research Conducted in a Kindergarten Classroom in Remote Regional Queensland

Authors: Suxiang Yu

Abstract:

As an early childhood teacher in a socially and economically highly disadvantaged suburb in regional QLD, the author endeavors to find out effective positive approaches to behavior management for a classroom that is overwhelmed with challenging behaviors. After evaluating the first-hand data collected from the action research, the author summarizes a few innovative, positive behavior management strategies. The research also implies that behavior management opportunities are actually great social and emotional teachable moments, and by tapping into those teachable moments effectively, the teacher and children will have a closer relationship.

Keywords: action research, behavior management, classroom strategies, social and emotional teaching

Procedia PDF Downloads 145
5294 Developing Reading Methods of Industrial Education Students at King Mongkut’s Institute of Technology Ladkrabang

Authors: Rattana Sangchan, Pattaraporn Thampradit

Abstract:

Teaching students to use a variety of reading methods in developing reading is essential for Thai university students. However, there haven’t been a lot of studies concerned about developing reading methods that are used by Thai students in the industrial education field. Therefore, this study was carried out not only to investigate the developing reading methods of Industrial Education students at King Mongkut’s Institute of Technology Ladkrabang, but also to determine if the developing reading strategies differ among the students’ reading abilities and differ gender: male and female. The research instrument used in collecting the data consisted of fourteen statements which include either metacognitive strategies, cognitive strategies or social / affective strategies. Results of this study revealed that students could develop their reading methods in moderate level (mean=3.13). Furthermore, high reading ability students had different levels of using reading methods to develop their reading from those of mid reading ability students. In addition, high reading ability students could use either metacognitive reading methods or cognitive reading methods to develop their reading much better than mid reading ability students. Interestingly, male students could develop their reading methods in great levels while female students could develop their reading methods only in moderate level. Last but not least, male students could use either metacognitive reading methods or cognitive reading methods to develop their reading much better than female students. Thus, the results of this study could indicate that most students need to apply much more reading strategies to develop their reading. At the same time, suggestions on how to motivate and train their students to apply much more appropriate effective reading strategies to better comprehend their reading were also provided.

Keywords: developing reading methods, industrial education, reading abilities, reading method classification

Procedia PDF Downloads 262
5293 Early Diagnosis and Treatment of Cancer Using Synthetic Cationic Peptide

Authors: D. J. Kalita

Abstract:

Cancer is one of the prime causes of early death worldwide. Mutation of the gene involve in DNA repair and damage, like BRCA2 (Breast cancer gene two) genes, can be detected efficiently by PCR-RFLP to early breast cancer diagnosis and adopt the suitable method of treatment. Host Defense Peptide can be used as blueprint for the design and synthesis of novel anticancer drugs to avoid the side effect of conventional chemotherapy and chemo resistance. The change at nucleotide position 392 of a -› c in the cancer sample of dog mammary tumour at BRCA2 (exon 7) gene lead the creation of a new restriction site for SsiI restriction enzyme. This SNP may be a marker for detection of canine mammary tumour. Support vector machine (SVM) algorithm was used to design and predict the anticancer peptide from the mature functional peptide. MTT assay of MCF-7 cell line after 48 hours of post treatment showed an increase in the number of rounded cells when compared with untreated control cells. The ability of the synthesized peptide to induce apoptosis in MCF-7 cells was further investigated by staining the cells with the fluorescent dye Hoechst stain solution, which allows the evaluation of the nuclear morphology. Numerous cells with dense, pyknotic nuclei (the brighter fluorescence) were observed in treated but not in control MCF-7 cells when viewed using an inverted phase-contrast microscope. Thus, PCR-RFLP is one of the attractive approach for early diagnosis, and synthetic cationic peptide can be used for the treatment of canine mammary tumour.

Keywords: cancer, cationic peptide, host defense peptides, Breast cancer genes

Procedia PDF Downloads 65
5292 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 63
5291 The Impact of Instructing Interpretation Specific Strategies on Interpretation Performance of Undergraduate Translation Students

Authors: Abolfazl Ghelichi, Ghasem Modarresi

Abstract:

The problem with interpretation courses arises from the fact that Interpretation Courses at University levels are presented by most of the instructors based on listening activities and testing listening performance while interpretation strategies have been underrated. The data are gathered from30 students majoring in Translation Studies to fulfill the major aims of the study including. The study aimed at: 1) examining the significant relationship between specific interpretation strategies and interpretation performance of translation students in interpretation courses, 2) investigating the significant difference between males and females in their interpretation performance, and 3) exploring the interpretation strategies which are more effective for the translation students to improve their interpretation performance from students’ opinions. The results of the study revealed that there was a statistically significant difference in the mean scores for the two groups. The experimental group outperformed the control group in their interpretation performance and the effect size was large. However, there was no significant difference between male and female with respect to their cognition [t (28) =.79, p<.05]. As for the results obtained from the interviews with the students, the commonalities emerged from the students’ responses were analyzed and reported by the researchers.

Keywords: anticipation, interpretation performance, interpretation strategy, shadowing

Procedia PDF Downloads 265
5290 From Ondoy to Habagat: Comparison of the Community Coping Strategies between Barangay Tumana and Provident Village, Marikina City

Authors: Dinnah Feye H. Andal, Ann Laurice V. Salonga

Abstract:

The paper investigates the flooding event that was experienced by Marikina City residents during the onslaught of Tropical Storm Ondoy on September 26, 2009 and during the heavy downpour caused by the southwest monsoon (Habagat) on August 1-8, 2012. Typhoon Ketsana, locally known as Tropical Storm Ondoy, devastated the whole of Marikina City, displacing a lot of people from their homes and damages properties as well, as flood rose at a very short period of time. Meanwhile, the massive amount of rain water brought by the southwest monsoon lasted for a week that also caused flooding to different parts of Metro Manila including Marikina City. This paper examines how the respondents’ experiences of the flooding caused by Tropical Storm Ondoy informed the coping strategies that the households in Barangay Tumana and Provident Village employed during the flooding brought by the southwest monsoon rains. Specifically, the research compares the coping strategies to flood hazards between residents of Barangay Tumana and Provident Village before, during and after the flooding caused by the southwest monsoon rains. Both study sites have relatively low elevation and are located along rivers and creeks which make them highly susceptible to flood. Interviews with affected residents were undertaken to understand how a household's coping strategies contribute to the development of community coping strategies at the respective neighborhood level. Based from the findings, income levels, local politics, religion and social relations between and among neighbors affect the way household and community coping strategies differ in the two case study sites.

Keywords: community coping strategies, Habagat, Marikina, Ondoy

Procedia PDF Downloads 296
5289 The Marketing Strategies of Five-Star Rated Herbal Businesses of One Tambon One Product (OTOP) Entrepreneurs in Songkhla Province, Thailand

Authors: S. Lungtae, C. Noknoi

Abstract:

The main purpose of this research is to analyze the marketing strategies of the various five-star rated herbal businesses of One Tambon One Product (OTOP) entrepreneurs in Songkhla province, Thailand. This includes the targeting, positioning and marketing mix in order to develop marketing strategies for OTOP entrepreneurs. The data were collected from the presidents of herbal-product enterprises in Songkhla province. The products of all these enterprises were selected as five-star herbal products for the OTOP project in 2012. In-depth interviews were conducted, and content analysis was used to analyze the data. The research found that the community enterprises should 1) increase the range of product sizes offered, 2) increase their distribution channels, 3) publicize more to inform consumers about their identities and products, 4) undertake promotional activities during the festival, and 5) choose salespeople who are knowledgeable about the features of their products.

Keywords: marketing mix, market positioning, marketing strategies, target market.

Procedia PDF Downloads 268
5288 Interaction between Kazal-Type Serine Proteinase Inhibitor SPIPm2 and Cyclophilin A from the Black Tiger Shrimp Penaeus monodon

Authors: Sirikwan Ponprateep, Anchalee Tassanakajon, Vichien Rimphanitchayakit

Abstract:

A Kazal-type serine proteinase inhibitor, SPIPm2, was abundantly expressed in the hemocytes and secreted into shrimp plasma has anti-viral property against white spot syndrome virus (WSSV). To discover the molecular mechanism of antiviral activity, the binding assay showed that SPIPm2 bind to the components of viral particle and shrimp hemocyte. From our previous report, viral target protein of SPIPm2 was identified, namely WSV477 using yeast two-hybrid screening. WSV477 is an early gene product of WSSV and involved in viral propagation. In this study, the co-immunoprecipitation technique and Tandem Mass Spectrometry (LC-MS/MS) was used to identify the target protein of SPIPm2 from shrimp hemocyte. The target protein of SPIPm2 was cyclophilin A. In vertebrate, cyclophilin A or peptidylprolyl isomerase A was reported to be the immune suppressor interacted with cyclosporin A involved in immune defense response. The recombinant cyclophilin A from Penaeus monodon (rPmCypA) was produced in E.coli system and purified using Ni-NTA column to confirm the protein-protein interaction. In vitro pull-down assay showed the interaction between rSPIPm2 and rPmCypA. To study the biological function of these proteins, the expression analysis of immune gene in shrimp defense pathways will be investigated after rPmCypA administration.

Keywords: cyclophilin A, protein-protein interaction, Kazal-type serine proteinase inhibitor, Penaeus monodon

Procedia PDF Downloads 211
5287 Examining Coping Resources and Ways of Strategic Coping for Individuals with Spinal Cord Injury During the COVID-19 Crisis

Authors: Se-Hyuk Park, Hee-Jung Seo

Abstract:

Previous studies have investigated effective coping strategies for excessive stress, positive adaptation, resilience, mental health, and personal growth. However, to the best of the authors' knowledge, little research has been conducted to investigate how Koreans with physical disabilities deal with the COVID-19 pandemic. The purpose of this study was to identify coping strategies and coping resources that Koreans with physical disabilities utilized during the COVID-19 crisis. This study used semi-structured, in-depth interviews with 15 participants. Data were qualitatively analyzed using the constant comparative method with content mapping and content mining questions. We identified three salient themes that were used by participants as coping strategies to deal with various COVID-related challenges: (a) engagement in meaningful activities, (b) improvement of social and emotional support, and (c) experience of resilience. The findings of the present study highlighted that Korean adults with SCI actively engaged in various leisure activities, maintained and developed closer social relationships, and experienced resilience to face COVID-19-related stressors. These coping strategies were noted as a catalyst for physical health as well as psychological well-being of individuals with SCI.

Keywords: spinal cord injury, covid-19 pandemic, coping strategies, coping resources, leisure

Procedia PDF Downloads 9
5286 Strategies to Enhance Export Performance of Thai Furniture Industry

Authors: Khomsan Laosillapacharoen

Abstract:

This research paper was aimed to analyze the current situation of the furniture industry and embark a plan to enhance the export volume of Thai furniture. This is a qualitative research which utilized meta-analysis and focus group. A total of 24 experts in both government and private sectors were interviewed. The findings revealed that Thai furniture had some advantages of access to raw material, high quality of labors, and have a unique skill. However, the threat included a tendency to have more foreign competitors in domestic market. In addition, the strategies to enhance the level of export included increase the standard quality of Thai furniture, offer new and modern designs, use marketing on the internet, use modern technology, and gain tax incentive from the government.

Keywords: export, furniture, strategies, marketing

Procedia PDF Downloads 376
5285 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 18
5284 Strategies Considered Effective for Funding Public Tertiary Institutions in Nigeria

Authors: Jacinta Ifeoma Obidile

Abstract:

The study sought to ascertain from the opinions of the business educators, effective strategies for funding public tertiary institutions in Anambra State Nigeria, for effective functioning and delivery. Funding of tertiary institutions has become so important following the dilapidated state of most of the public tertiary institutions in Nigeria. Tertiary institutions are known for the production of competitive and competent workforce in the nation. Considering the state of public tertiary institutions currently, one wonders if their objectives are achieved. Many scholars have identified funding as one of the major barriers to effective functioning of tertiary institutions. Although federal and state governments have been supporting the tertiary institutions, but their support seems not to be adequate. This study therefore ascertained from the perspective of business educators, other strategies for funding public tertiary institutions in Anambra State Nigeria, for effective functioning and delivery. Survey research design was adopted for the study. A total of 104 business educators from the public tertiary institutions in the State constituted the population. There was no sampling, hence the whole population was used. Structured questionnaire validated by three experts with a reliability coefficient of 0.82 was the instrument for data collection. Data collected were analyzed using mean and standard deviation. Findings from the study revealed that public-private partnership and external aids were among the strategies considered effective for funding public tertiary institutions. It was therefore recommended among others that associations like alumni should be strongly instituted in each of the public tertiary institutions so as to assist in the funding of tertiary institutions for effective functioning and delivery.

Keywords: strategies, funding, tertiary institutions, business educators

Procedia PDF Downloads 126
5283 Optimality of Shapley Value Mechanism under Sybil Strategies

Authors: Bruno Mazorra Roig

Abstract:

In the realm of cost-sharing mechanisms, the vulnerability to Sybil strategies, where agents can create fake identities to manipulate outcomes, has not yet been studied. In this paper, we delve into the intricacies of different cost-sharing mechanisms proposed in the literature, highlighting its non-Sybil-resistance nature. Furthermore, we prove that under mild conditions, a Sybil-proof cost-sharing mechanism for public excludable goods is at least (n/2 + 1)−approximate. This finding reveals an exponential increase in the worst-case social cost in environments where agents are restricted from using Sybil strategies. We introduce the concept of Sybil Welfare Invariant mechanisms, where a mechanism maintains its worst-case welfare under Sybil strategies for every set of prior beliefs with full support even when the mechanism is not Sybil-proof. Finally, we prove that the Shapley value mechanism for public excludable goods holds this property and so deduce that the worst-case social cost of this mechanism is the nth harmonic number Hn under the equilibrium of the game with Sybil strategies, matching the worst-case social cost bound for cost-sharing mechanisms. This finding carries important implications for decentralized autonomous organizations (DAOs), indicating that they are capable of funding public excludable goods efficiently, even when the total number of agents is unknown.

Keywords: game theory, mechanism design, cost sharing, false-name proofness

Procedia PDF Downloads 32
5282 Socio-Economic Factors Influencing the Use of Coping Strategies among Conflict Actors (Farmers and Herders) in Giron Masa Village, Kebbi State, Nigeria

Authors: S. Umar, B. F. Umar

Abstract:

This study was conducted at Giron Masa village, located 30 km from Yauri town. The study determines the socio-economic factors influencing the use of coping strategies among farmers and herders during post-conflict situation. Simple random sampling was employed to select one hundred respondents (50 farmers and 50 herders) from the study area. Logistic regression analysis (LR) was used to ascertain the socioeconomic variables that influenced the use of the coping strategies. The results of the study shows that age, income, family size and farming experience were individually significant and thus influenced the use of POCS by farmers. Annual income and production system influenced the use of POCS by herders. Age, farm size and farming experience were found to be individually significant in influencing the use of EOCS among farmers. Specifically, years of occupation experience among the herders increased the use of emotion oriented coping strategies among herders. The use of SSCS among farmers was influenced by educational level; farm size and farming experience, while the variables are not collectively significant in influencing the use of SSCS among the herders. The research recommends a need to adopt the strategy of community coping to cope with stress.

Keywords: farmers, herders, conflict, coping strategies

Procedia PDF Downloads 346
5281 Towards the Use of Innovative Teaching Methodologies in Nursing Education : A South African Study

Authors: R. Bhagwan, M. Subbhan

Abstract:

Nursing is a very challenging field in South Africa and due to the burden of disease it is critical that nursing students are prepared with the adequate knowledge and skills to deliver effective patient care. Despite this very little research has been done on the teaching strategies used by nurse educators to teach nursing students. It is in this context that a survey of all nurse educators at Nursing Colleges and Universities in Kwa-Zulu Natal was undertaken (n=300) to explore what current pedagogical strategies were being used and which more creative methodologies should be implemented in relation to specific nursing content. Findings revealed that most nurse educators still utlize the lecture approach, but although believe other methodologies such as e-learning are important have not done so because of inadequate training. The recommendations made are that more creative pedagogical strategies such as simultation, portfoloios and case studies be adopted.

Keywords: creative, teaching methodologies, dydactic, nursing

Procedia PDF Downloads 578
5280 Ten Patterns of Organizational Misconduct and a Descriptive Model of Interactions

Authors: Ali Abbas

Abstract:

This paper presents a descriptive model of organizational misconduct based on observed patterns that occur before and after an ethical collapse. The patterns were classified by categorizing media articles in both "for-profit" and "not-for-profit" organizations. Based on the model parameters, the paper provides a descriptive model of various organizational deflection strategies under numerous scenarios, including situations where ethical complaints build-up, situations under which whistleblowers become more prevalent, situations where large scandals that relate to leadership occur, and strategies by which organizations deflect blame when pressure builds up or when media finds out. The model parameters start with the premise of a tolerance to double standards in unethical acts when conducted by leadership or by members of corporate governance. Following this premise, the model explains how organizations engage in discursive strategies to cover up the potential conflicts that arise, including secret agreements and weakening stakeholders who may oppose the organizational acts. Deflection strategies include "preemptive" and "post-complaint" secret agreements, absence of (or vague) documented procedures, engaging in blame and scapegoating, remaining silent on complaints until the media finds out, as well as being slow (if at all) to acknowledge misconduct and fast to cover it up. The results of this paper may be used to guide organizational leaders into the implications of such shortsighted strategies toward unethical acts, even if they are deemed legal. Validation of the model assumptions through numerous media articles is provided.

Keywords: ethical decision making, prediction, scandals, organizational strategies

Procedia PDF Downloads 88
5279 Supplier Relationship Management and Selection Strategies: A Literature Review

Authors: Priyesh Kumar Singh, S. K. Sharma, Sanjay Verma, C. Samuel

Abstract:

Supplier Relationship Management (SRM), is strategic planning and managing of all interactions with suppliers to maximize its value. Its application varies from construction industries to healthcare system and investment banks to aviation industries. Several buyer-supplier relationship models, as well as supplier selection and evaluation strategies, have been documented by many academicians and researchers. In this paper, through a comprehensive literature review of over 30 published papers, different theoretical models, empirical data and conclusions were analysed relating to SRM to find its role in establishing better supplier relationships. These journal articles were searched by using the keyword “supplier relationship management,” in databases of Mendeley Library, ProQuest, EBSCO and Google Scholar. This paper reviews the academic literature on different relationship models, supplier evaluation, and selection strategies to discuss its implications in different situations. It also describes the dominant factors responsible for buyer-supplier relationships such trust and power. Finally, conclusions have been drawn which can be validated by various researchers and can help practitioners in industries.

Keywords: supplier relationship management, supplier performance, supplier evaluation, supplier selection strategies

Procedia PDF Downloads 230
5278 Strategies for the Development of Cultural Intelligence in the Foreign Language Classroom

Authors: Azucena Yearby

Abstract:

This study examined if cultural intelligence can be developed through the study of a foreign language. Specifically, the study sought to determine if strategies such as the Arts/History, Vocabulary and Real or Simulated Experiences have an effect on the development of cultural intelligence in the foreign language classroom. Students enrolled in Spanish 1114 or level 1 Spanish courses at the University of Central Oklahoma (UCO) completed Linn Van Dyne’s 20-item questionnaire that measures Cultural Intelligence (CQ). Results from the study indicated a slight cultural intelligence increase in those students who received an intervention. Therefore, the study recommended that foreign language educators implement the considered strategies in the classroom in order to increase their students’ cultural intelligence.

Keywords: cultural competency, cultural intelligence, foreign language, language

Procedia PDF Downloads 444
5277 Strategies for E-Waste Management: A Literature Review

Authors: Linh Thi Truc Doan, Yousef Amer, Sang-Heon Lee, Phan Nguyen Ky Phuc

Abstract:

During the last few decades, with the high-speed upgrade of electronic products, electronic waste (e-waste) has become one of the fastest growing wastes of the waste stream. In this context, more efforts and concerns have already been placed on the treatment and management of this waste. To mitigate their negative influences on the environment and society, it is necessary to establish appropriate strategies for e-waste management. Hence, this paper aims to review and analysis some useful strategies which have been applied in several countries to handle e-waste. Future perspectives on e-waste management are also suggested. The key findings found that, to manage e-waste successfully, it is necessary to establish effective reverse supply chains for e-waste, and raise public awareness towards the detrimental impacts of e-waste. The result of the research provides valuable insights to governments, policymakers in establishing e-waste management in a safe and sustainable manner.

Keywords: e-waste, e-waste management, life cycle assessment, recycling regulations

Procedia PDF Downloads 245
5276 Computer Assisted Strategies Help to Pharmacist

Authors: Komal Fizza

Abstract:

All around the world in every field professionals are taking great support from their computers. Computer assisted strategies not only increase the efficiency of the professionals but also in case of healthcare they help in life-saving interventions. The background of this current research is aimed towards two things; first to find out if computer assisted strategies are useful for Pharmacist for not and secondly how much these assist a Pharmacist to do quality interventions. Shifa International Hospital is a 500 bedded hospital, and it is running Antimicrobial Stewardship, during their stewardship rounds pharmacists observed that a lot of wrong doses of antibiotics were coming at times those were being overlooked by the other pharmacist even. So, with the help of MIS team the patients were categorized into adult and peads depending upon their age. Minimum and maximum dose of every single antibiotic present in the pharmacy that could be dispensed to the patient was developed. These were linked to the order entry window. So whenever pharmacist would type any order and the dose would be below or above the therapeutic limit this would give an alert to the pharmacist. Whenever this message pop-up this was recorded at the back end along with the antibiotic name, pharmacist ID, date, and time. From 14th of January 2015 and till 14th of March 2015 the software stopped different users 350 times. Out of this 300 were found to be major errors which if reached to the patient could have harmed them to the greater extent. While 50 were due to typing errors and minor deviations. The pilot study showed that computer assisted strategies can be of great help to the pharmacist. They can improve the efficacy and quality of interventions.

Keywords: antibiotics, computer assisted strategies, pharmacist, stewardship

Procedia PDF Downloads 467
5275 The Effect of Merger Transference on the Maintenance of a Narcissistic Patient with a History of Treatment Interruption with Previous Therapists

Authors: Mehravar Javid

Abstract:

This case study delves into the psychological complexities of a 33-year-old woman, the second of three children, whose upbringing under a critical mother and a high-expectation father has significantly shaped her psychological landscape. Exhibiting a blend of worthlessness and a grandiose self, her life is a constant struggle between idealizing her father and devaluing her mother and sisters, coupled with a fear of intimacy and a desire for merger. This internal conflict manifests in symptoms of depression, anxiety, and a pattern of forming and quitting multiple relationships, all driven by a deep-seated need for validation and approval. The therapeutic journey reveals her resistance to treatment, particularly when her defense mechanisms are challenged, reflecting a complex transference dynamic where she yearns for merger yet fears it. The treatment focuses on empathetically addressing her idealization and mirroring needs, allowing for autonomy while repairing communication gaps. This approach not only confronts her emotional deficits rooted in her family dynamics but also aids in her quest for self-identity, navigating through her feelings of emptiness, inferiority, and powerlessness. The study highlights the nuanced interplay of family influence on the development and maintenance of narcissistic traits, offering insights into the therapeutic strategies that can facilitate growth and self-awareness in similar cases.

Keywords: narcissistic personality disorder, merger transference, treatment interruption, case study, family dynamics

Procedia PDF Downloads 39
5274 Protective Effect of Cinnamomum zeylanicum Bark Extract against Doxorubicin Induced Cardiotoxicity: A Preliminary Study

Authors: J. A. N. Sandamali, R. P. Hewawasam, K. A. P. W. Jayatilaka, L. K. B. Mudduwa

Abstract:

Introduction: Doxorubicin is widely used in the treatment of solid organ tumors and hematological malignancies, but the dose-dependent cardiotoxicity due to free radical formation compromises its clinical utility. Therapeutic strategies which enhance cellular endogenous defense systems have been identified as promising approaches to combat oxidative stress-associated conditions. Cinnamomum zeylanicum (Ceylon cinnamon) has a number antioxidant compounds, which can effectively scavenge reactive oxygen including superoxide anions, hydroxyl radicals and as well as other free radicals. Therefore, the objective of the study was to elucidate the most effective dose of Cinnamomum bark extract which ameliorates doxorubicin-induced cardiotoxicity. Materials and methods: Wistar rats were divided into seven groups of 10 animals in each. Group 1: normal control (distilled water, orally, for 14 days, 10 mL/kg saline, ip, after 16 hours fast on the 11th day); Group 2: doxorubicin control (distilled water, orally, for 14 days, 18 mg/kg doxorubicin, ip, after 16 hour fast on the 11th day); Groups 3-7: five doses of freeze dried aqueous bark extracts (0.125, 0.25, 0.5, 1.0, 2.0g/kg, orally, daily for 14 days, 18 mg/kg doxorubicin, ip, after 16 hours fast on the 11th day). Animals were sacrificed on the 15th day and blood was collected for the estimation of cardiac troponin I (cTnI), AST and LDH concentrations and myocardial tissues were collected for histopathological assessment of myocardial damage and irreversible changes were graded by developing a score. Results: cTnI concentration of groups 1-7 were 0, 161.9, 128.6, 95.9, 38, 19.41 & 12.36 pg/mL showing significant differences (p<0.05) between group 2 and groups 4-7. In groups 1-7, serum AST concentration were 26.82, 68.1, 37.18, 36.23, 26.8, 26.62 & 22.43U/L and LDH concentrations were 1166.13, 2428.84, 1658.35, 1474.34, 1277.58, 1110.21 & 974.40U/L and a significant difference (p<0.05) was observed between group 2 and groups 3-7. The maximum score for myocardial necrosis was observed in group 2. Parallel to the increase of the dosage of plant extract, a gradual reduction of the score for myocardial necrosis was observed in groups 3-7. Reversible histological changes such as vacuolation, congestion were observed in group 2 and all plant treated groups. Haemorrhages, inflammatory cell infiltrations, and interstitial oedema were observed in group 2, but absent in groups treated with higher doses of the plant extract. Discussion & Conclusion: According to the in vitro antioxidant assays performed, Cinnamomum zeylanicum (Ceylon cinnamon) bark possesses high amounts of polyphenolic substances and high antioxidant activity. The present study showed that Cinnamomum zeylanicum extract at 2.0 g/kg possesses the most significant cardioprotective effect against doxorubicin-induced cardiotoxicity. It can be postulated that pretreatment with Cinnamomum bark extract may replenish the cardiomyocytes with antioxidants that are needed for the defense against oxidative stress induced by doxorubicin.

Keywords: cardioprotection, Cinnamomum zeylanicum, doxorubicin, free radicals

Procedia PDF Downloads 140
5273 Modeling and Optimal Control of Pneumonia Disease with Cost Effective Strategies

Authors: Getachew Tilahun, Oluwole Makinde, David Malonza

Abstract:

We propose and analyze a non-linear mathematical model for the transmission dynamics of pneumonia disease in a population of varying size. The deterministic compartmental model is studied using stability theory of differential equations. The effective reproduction number is obtained and also the local and global asymptotically stability conditions for the disease free and as well as for the endemic equilibria are established. The model exhibit a backward bifurcation and the sensitivity indices of the basic reproduction number to the key parameters are determined. Using Pontryagin’s maximum principle, the optimal control problem is formulated with three control strategies; namely disease prevention through education, treatment and screening. The cost effectiveness analysis of the adopted control strategies revealed that the combination of prevention and treatment is the most cost effective intervention strategies to combat the pneumonia pandemic. Numerical simulation is performed and pertinent results are displayed graphically.

Keywords: cost effectiveness analysis, optimal control, pneumonia dynamics, stability analysis, numerical simulation

Procedia PDF Downloads 299
5272 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 123