Search results for: security experiences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5355

Search results for: security experiences

2025 Terrorist Financing through Ilegal Fintech Hacking: Case Study of Rizki Gunawan

Authors: Ishna Indika Jusi, Rifana Meika

Abstract:

Terrorism financing method in Indonesia is developing at an alarming rate, to the point, it is now becoming more complex than before. Terrorists traditionally use conventional methods like robberies, charities, and courier services to fund their activities; today terrorists are able to utilize modern methods in financing their activities due to the rapid development in financial technology nowadays; one example is by hacking an illegal Fintech Company. Therefore, this research is conducted in order to explain and analyze the consideration behind the usage of an illegal fintech company to finance terrorism activities and how to prevent it. The analysis in this research is done by using the theory that is coined by Michael Freeman about the reasoning of terrorists when choosing their financing method. The method used in this research is a case study, and the case that is used for this research is the terrorism financing hacking of speedline.com in 2011 by Rizki Gunawan. Research data are acquired from interviews with the perpetrators, experts from INTRAC (PPATK), Special Detachment 88, reports, and journals that are relevant to the research. As a result, this study found that the priority aspects in terms of terrorist financing are security, quantity, and simplicity while obtaining funds.

Keywords: Fintech, illegal, Indonesia, technology, terrorism financing

Procedia PDF Downloads 167
2024 Application Research on Large Profiled Statues of Steel-Concrete Composite Shear Wall

Authors: Zhao Cai-qi, Ma Jun

Abstract:

Twin steel plates-concrete composite shear walls are composed of a pair of steel plate layers and a concrete layer sandwiched between them, which have the characteristics of both reinforced concrete shear walls and steel plate shear walls. Twin steel plates-composite shear walls contain very high ultimate bearing capacity and ductility, which have great potential to be applied in the super high-rise buildings and special structures. In this paper, we analyzed the basic characteristics and stress mechanism of the twin steel plates-composite shear walls. Specifically, we analyzed the effects of the steel plate thickness, wall thickness and concrete strength on the bearing capacity of the twin steel plates-composite shear walls. The analysis results indicate that:(1)the initial shear stiffness and ultimate shear-carrying capacity is not significantly affected by the thickness of concrete wall but by the class of concrete,(2)both factors significantly impact the shear distribution of the shear walls in ultimate shear-carrying capacity. The technique of twin steel plates-composite shear walls has been successfully applied in the construction of a 88-meter Huge Statue of Buddha located in Hunan Province, China. The analysis results and engineering experiences showed that the twin steel plates-composite shear walls have great potential for future research and applications.

Keywords: twin steel plates-concrete composite shear wall, huge statue of Buddha, shear capacity, initial lateral stiffness, overturning moment bearing

Procedia PDF Downloads 397
2023 Migration-Related Challenges during the Covid-19 Pandemic in South Africa. A Case of Alexandra Township

Authors: Edwin Mwasakidzeni Mutyenyoka

Abstract:

Without ignoring migration-related challenges in transit zones and places of origin, this inquiry focuses on arrived international immigrants’ exacerbated vulnerability during crises. The aim is to underline longstanding inequalities and demonstrate that crises merely amplify and exacerbate challenges that low-income migrants already face during ‘non-crises’ periods. Social protection, as an agenda for reducing vulnerability, poverty, and risk for low-income households, with regard to basic consumption and services, has been foregrounded in the post-apartheid development discourse in South Africa. Evidently, however, the state, through the South African Social Security Agency (SASSA), systemically excludes the majority of non-citizens from state-sponsored social assistance programs - often leaving them heavily dependent on sporadic non-state options and erosive coping mechanisms. In this paper, migration itself should not only be understood as a social protection strategy against poverty and risk but also as a source of vulnerability that often requires social protection. For quasi-ethnographic, it use one migrant destination, Alex Park Township, as a “contact zone” and space of negotiation during the pandemic.

Keywords: south-south migration, crises, social protection, Covid-19 pandemic

Procedia PDF Downloads 86
2022 Cybercrimes in Nigeria: Its Causes, Effects and Solutions

Authors: Uzoma Igboji

Abstract:

Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.

Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria

Procedia PDF Downloads 526
2021 Levels and Determinants of Experiencing Violence during Pregnancy among Adolescent Women - The Case of Southern Africa

Authors: Sibusiso Mkwananzi

Abstract:

The health of mother and child remain at risk among pregnant adolescents. Nevertheless, these are placed in even greater jeopardy when an expectant adolescent experiences violence. This paper sought to explore the levels and determinants of expecting adolescents in five Southern African countries. The study used the most recent (2010/2015) nationally representative demographic health survey (DHS) data from Malawi, Mozambique, Namibia, Zambia, and Zimbabwe. The highest levels of violence during pregnancy occurred amongst adolescent females living in Zimbabwe at 11.4%, followed by Zambia (8.3%) and Namibia (7.7%). Lowest levels were seen in Mozambique at 3.6%. Additionally, the determinants of experiencing violence during pregnancy included educational attainment, marital status, wealth and place of residence. Expectant adolescents that had a higher likelihood of experiencing violence were married and lived predominantly in rural settings. Higher risk was also associated with lower acquisition of education and poverty. These results show a very similar pattern to the risk factors associated with early pregnancy in the region. The predictors point to issues of possible lowered empowerment amongst younger women in their relationships and the structural challenges faced by this fledgling group. Nevertheless, addressing these dynamics could go a long way in not only decreasing the likelihood of unwanted motherhood at this early stage of the life course, but indeed even ensuring the prevention of violence during wanted early pregnancy. This would lead to improved levels of maternal and child health despite younger maternal age and aid in achieving a number of sustainable development goals.

Keywords: adolescents, determinants, Southern Africa, violence during pregnancy

Procedia PDF Downloads 96
2020 Benchmarking of Petroleum Tanker Discharge Operations at a Nigerian Coastal Terminal and Jetty Facilitates Optimization of the Ship–Shore Interface

Authors: Bassey O. Bassey

Abstract:

Benchmarking has progressively become entrenched as a requisite activity for process improvement and enhancing service delivery at petroleum jetties and terminals, most especially during tanker discharge operations at the ship – shore interface, as avoidable delays result in extra operating costs, non-productive time, high demurrage payments and ultimate product scarcity. The jetty and terminal in focus had been operational for 3 and 8 years respectively, with proper operational and logistic records maintained to evaluate their progress over time in order to plan and implement modifications and review of procedures for greater technical and economic efficiency. Regular and emergency staff meetings were held on a team, departmental and company-wide basis to progressively address major challenges that were encountered during each operation. The process and outcome of the resultant collectively planned changes carried out within the past two years forms the basis of this paper, which mirrors the initiatives effected to enhance operational and maintenance excellence at the affected facilities. Operational modifications included a second cargo receipt line designated for gasoline, product loss control at jetty and shore ends, enhanced product recovery and quality control, and revival of terminal–jetty backloading operations. Logistic improvements were the incorporation of an internal logistics firm and shipping agency, fast tracking of discharge procedures for tankers, optimization of tank vessel selection process, and third party product receipt and throughput. Maintenance excellence was achieved through construction of two new lay barges and refurbishment of the existing one; revamping of existing booster pump and purchasing of a modern one as reserve capacity; extension of Phase 1 of the jetty to accommodate two vessels and construction of Phase 2 for two more vessels; regular inspection, draining, drying and replacement of cargo hoses; corrosion management program for all process facilities; and an improved, properly planned and documented maintenance culture. Safety, environmental and security compliance were enhanced by installing state-of-the-art fire fighting facilities and equipment, seawater intake line construction as backup for borehole at the terminal, remediation of the shoreline and marine structures, modern spill containment equipment, improved housekeeping and accident prevention practices, and installation of hi-technology security enhancements, among others. The end result has been observed over the past two years to include improved tanker turnaround time, higher turnover on product sales, consistent product availability, greater indigenous human capacity utilisation by way of direct hires and contracts, as well as customer loyalty. The lessons learnt from this exercise would, therefore, serve as a model to be adapted by other operators of similar facilities, contractors, academics and consultants in a bid to deliver greater sustainability and profitability of operations at the ship – shore interface to this strategic industry.

Keywords: benchmarking, optimisation, petroleum jetty, petroleum terminal

Procedia PDF Downloads 360
2019 The Mask of Motherhood a Changing Identity During the Transition to Motherhood

Authors: Geraldine Mc Loughlin, Mary Horgan, Rosaleen Murphy

Abstract:

Childbirth is a life-changing event, a psychological transition for the mother that must be viewed in a social context. Much has been written and documented regarding the preparation for birth and the immediate postnatal period, but the full psychological impact on the mother is not clear. One aspect of the transition process is Identity. Depending on a person’s worldview, the concept of identity is viewed differently; the nature of reality and how they construct knowledge influence these perspectives. Becoming a mother is not just an event but a process that time and experience will help to shape the understanding of the woman. To explore the emotional and psychological aspects of first-time mother’s experience during the transition to new motherhood. To identify factors affecting women’s identities in the period of 36 weeks gestation to 12 weeks postpartum. Interpretative Phenomenological Analysis (IPA) was used. It explores how these women make sense of and give meaning to their experiences. IPA is underpinned by 3 key principles: phenomenology, hermeneutics and idiographics. A purposeful sample of 10 women was recruited for this longitudinal study, to enable data to be collected during the transition to motherhood. Individual identity was interpreted and viewed as developing in response to changing contexts, such as the birth event becoming a parent, enabling one to construct one’s own sense of a meaningful life. Women effectively differentiated themselves from their personal and social identities and took responsibility for their actions. Identity is culturally and socially shaped and experienced, though not experienced similarly by all women. The individualized perspective on identity recognizes that (a) social influences are seen as external to the individual and (b) the view that social influences are, in fact, internalized by the individual.

Keywords: motherhood, transition, identity, IPA

Procedia PDF Downloads 48
2018 Transnational Migration of Sports Workers from Africa to Foreign Countries: The Impact of their Assistance to the Domestic Community Through their Socioeconomic Choices of Action

Authors: Ernest Yeboah Acheampong, Malek Bouhaouala, Michel Raspaud

Abstract:

Studies on African sport workers’ migration have given less attention to examining the extent to which the individual (sports workers) contributes to a socio-economic development of their domestic communities. The decision to support or not to support can also have a debilitating effect on the domestic communities. This article therefore, analyses the choices of action of these actors with an exact focus on footballers to the domestic community. This exploratory survey focuses on 13 UEFA countries leagues of footballers from 43 African countries, including seventeen interviews and four autobiographies of the players. Max Weber theory of individual subjectivity can underpin their decisions making processes to either offer assistance or not to their locales. This study revealed some players closed relationships, particularly those raised in the typical locales as they often provide support via projects like building hospitals, schools, sporting facilities, health centres, and scholarship schemes among others. While others shown commitment and readiness to offer assistance, touch livelihood, and promote social development based on their lived experiences abroad. With many lamenting against lack of support from local and national authorities as disincentive to do more yet committed to the cause of the society. This article can conclude that football athletes logics of action depend on the individual values and conceptions from evidence of their socio-economic projects, as well as social embeddedness in the locality

Keywords: choices of action, domestic development, footballers, transnational migration

Procedia PDF Downloads 333
2017 The Effect of Religious Tourist Motivation and Satisfaction on Behavioral Intention

Authors: Tao Zhang, Nan Yan

Abstract:

In recent years, the Chaoshan area, a special place located in the southeast of Guangdong province in China, actively protects religious heritage and is developing religious tourism, which is attracting many expatriate Chinese who are coming back for travel and to worship. This paper discussed three questions. Firstly, what is the current situation about the different social background of tourists’ motivation, satisfaction and behavioral intention? Secondly, is there a relationship between the motivation, satisfaction and behavioral intention and the different social backgrounds of tourists? Thirdly, what is the relationship between religious tourists’ motivation, satisfaction and behavioral intention? The research methods use a combination of qualitative analysis and quantitative analysis. Qualitative analysis uses the method of observation and interviews. Convenient sampling technique was used for quantitative analysis. The study showed that the different social backgrounds of tourists’ forms diverse cognition and experiences about religious tourism, and their motivations, satisfaction and behavioral intention as tourists vary. Tourists’ motivation and satisfaction has a positive phase relation. Tourists’ motivation with satisfaction as the intervening variable also has a positive phase effect on tourists’ behavior intention. The result shows that religious tourists’ motivations include experiencing a religious atmosphere, and having a rest and recreation. The result also shows that religious tourists want to travel with their family members and friends. While traveling, religious tourists like to talk with Buddhist monks or nuns. Compared to other tourism types, religious tourists have higher expectations about temple environment, traveling experience, peripheral service and temple management.

Keywords: behavioral intension, motivation, religious tourism, satisfaction

Procedia PDF Downloads 314
2016 An Exploratory Case Study of the Interference of Erotic Transference in the Longevity of Psychoanalytic Treatment

Authors: Mehravar Javid, Rohma Hassan, J. DeSilva

Abstract:

In this exploratory case study, a 37-year-old male patient who previously terminated treatment after four months of therapy with a different therapist begins anew with a 38-year-old female therapist and undergoes a similar cycle of premature termination, with added discourse caused by erotic transference. Process notes and records of the therapy treatment indicate that during the short course of treatment, the patient explored his difficulties navigating personal relationships, both current and past, and his difficulties coping with hypochondriasis. The therapist becomes tasked with not only navigating the patient’s inner conflict but also how she relates to the patient in the countertransference process while maintaining professional boundaries. This includes empathizing with the patient while also experiencing discomfort in the erotic transference from a professional standpoint. When the patient terminates once more, the therapist reflects on the possible reasons for termination. This includes the patient’s difficulties with tolerating interpretations, which cause him to blame himself for past events. These interpretations were also very frequent, contributing to the emotional burden the patient experienced. The therapist reflected on the use of interpretation versus exploration of the patient’s feelings and how exploring his feelings, including his feelings towards her, would have allowed for an opportunity to explore the emotions that troubled him more deeply. This includes exploring the patient’s anger and fear, which stem from unresolved conflicts from his childhood. Moreover, the erotic transference served as an enactment of previous experiences in which the patient feared losing what he loved, leading him to opt for premature termination instead of losing his ability to control the relationship and experience loss.

Keywords: countertransference, erotic transference, premature termination, therapist-client boundaries, transference

Procedia PDF Downloads 62
2015 The Reason Why Al-Kashi’s Understanding of Islamic Arches Was Wrong

Authors: Amin Moradi, Maryam Moeini

Abstract:

It is a widely held view that Ghiyath al-Din Jamshid-e-Kashani, also known as al-Kashi (1380-1429 CE), was the first who played a significant role in the interaction between mathematicians and architects by introducing theoretical knowledge in Islamic architecture. In academic discourses, geometric rules extracted from his splendid volume titled as Key of Arithmetic has uncritically believed by historians of architecture to contemplate the whole process of arch design all throughout the Islamic buildings. His theories tried to solve the fundamental problem of structural design and to understand what makes an Islamic structure safe or unsafe. As a result, al-Kashi arrived at the conclusion that a safe state of equilibrium is achieved through a specific geometry as a rule. This paper reassesses the stability of al-Kashi's systematized principal forms to evaluate the logic of his hypothesis with a special focus on large spans. Besides the empirical experiences of the author in masonry constructions, the finite element approach was proposed considering the current standards in order to get a better understanding of the validity of geometric rules proposed by al-Kashi for the equilibrium conditions of Islamic masonry arches and vaults. The state of damage of his reference arches under loading condition confirms beyond any doubt that his conclusion of the geometrical configuration measured through his treaties present some serious operational limits and do not go further than some individualized mathematical hypothesis. Therefore, the nature of his mathematical studies regarding Islamic arches is in complete contradiction with the practical knowledge of construction methodology.

Keywords: Jamshid al-Kashani, Islamic architecture, Islamic geometry, construction equilibrium, collapse mechanism

Procedia PDF Downloads 119
2014 Parametric Study of the Structures: Influence of the Shells

Authors: Serikma Mourad, Mezidi Amar

Abstract:

The conception (design) of an earthquake-resistant structure is a complex problem seen the necessity of meeting the requirements of security been imperative by the regulations, and of economy been imperative by the increasing costs of the structures. The resistance of a building in the horizontal actions (shares) is mainly ensured by a mixed brace system; for a concrete building, this system is constituted by frame or shells; or both at the same time. After the earthquake of Boumerdes (May 23; 2003) in Algeria, the studies made by experts, ended in modifications of the Algerian Earthquake-resistant Regulation (AER 99). One of these modifications was to widen the use of shells for the brace system. This modification has create a conflict on the quantities, the positions and the type of the shells at adopt. In the present project, we suggest seeing the effect of the variation of the dimensions, the localization and the conditions of rigidity in extremities of shells. The study will be led on a building (F+5) implanted in zone of seismicity average. To do it, we shall proceed to a classic dynamic study of a structure by using 4 alternatives for shells by varying the lengths and number in order to compare the cost of the structure for 4 dispositions of the shells with a technical-economic study of the brace system by the use of different dispositions of shells and to estimate the quantities of necessary materials (concrete and steel).

Keywords: reinforced concrete, mixed brace system, dynamic analysis, beams, shells

Procedia PDF Downloads 322
2013 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 179
2012 Deciphering Information Quality: Unraveling the Impact of Information Distortion in the UK Aerospace Supply Chains

Authors: Jing Jin

Abstract:

The incorporation of artificial intelligence (AI) and machine learning (ML) in aircraft manufacturing and aerospace supply chains leads to the generation of a substantial amount of data among various tiers of suppliers and OEMs. Identifying the high-quality information challenges decision-makers. The application of AI/ML models necessitates access to 'high-quality' information to yield desired outputs. However, the process of information sharing introduces complexities, including distortion through various communication channels and biases introduced by both human and AI entities. This phenomenon significantly influences the quality of information, impacting decision-makers engaged in configuring supply chain systems. Traditionally, distorted information is categorized as 'low-quality'; however, this study challenges this perception, positing that distorted information, contributing to stakeholder goals, can be deemed high-quality within supply chains. The main aim of this study is to identify and evaluate the dimensions of information quality crucial to the UK aerospace supply chain. Guided by a central research question, "What information quality dimensions are considered when defining information quality in the UK aerospace supply chain?" the study delves into the intricate dynamics of information quality in the aerospace industry. Additionally, the research explores the nuanced impact of information distortion on stakeholders' decision-making processes, addressing the question, "How does the information distortion phenomenon influence stakeholders’ decisions regarding information quality in the UK aerospace supply chain system?" This study employs deductive methodologies rooted in positivism, utilizing a cross-sectional approach and a mono-quantitative method -a questionnaire survey. Data is systematically collected from diverse tiers of supply chain stakeholders, encompassing end-customers, OEMs, Tier 0.5, Tier 1, and Tier 2 suppliers. Employing robust statistical data analysis methods, including mean values, mode values, standard deviation, one-way analysis of variance (ANOVA), and Pearson’s correlation analysis, the study interprets and extracts meaningful insights from the gathered data. Initial analyses challenge conventional notions, revealing that information distortion positively influences the definition of information quality, disrupting the established perception of distorted information as inherently low-quality. Further exploration through correlation analysis unveils the varied perspectives of different stakeholder tiers on the impact of information distortion on specific information quality dimensions. For instance, Tier 2 suppliers demonstrate strong positive correlations between information distortion and dimensions like access security, accuracy, interpretability, and timeliness. Conversely, Tier 1 suppliers emphasise strong negative influences on the security of accessing information and negligible impact on information timeliness. Tier 0.5 suppliers showcase very strong positive correlations with dimensions like conciseness and completeness, while OEMs exhibit limited interest in considering information distortion within the supply chain. Introducing social network analysis (SNA) provides a structural understanding of the relationships between information distortion and quality dimensions. The moderately high density of ‘information distortion-by-information quality’ underscores the interconnected nature of these factors. In conclusion, this study offers a nuanced exploration of information quality dimensions in the UK aerospace supply chain, highlighting the significance of individual perspectives across different tiers. The positive influence of information distortion challenges prevailing assumptions, fostering a more nuanced understanding of information's role in the Industry 4.0 landscape.

Keywords: information distortion, information quality, supply chain configuration, UK aerospace industry

Procedia PDF Downloads 54
2011 International-Migration and Land Use Change in Ghana: Assessment of the Multidimensional Effects on National Development

Authors: Baffoe Kingsley

Abstract:

The consequence of the migration of young people from rural farming communities in the global south to the global north is a well-known phenomenon. While climate change and its accompanying socio-economic structures continue to be the driver, what is not really known is how left behinds are compelled to convert lands meant for the production of traditional staples such as cereals, vegetables, and tubers to the production of export-driven cashew plantations due to youth migration. The consequence of such migration on the development of Ghana and its food security is multidimensional. Using an ethnographic research design, the study revealed that the majority of farmers in the area are now aged, and farm labor has become scarce, which has impeded the cultivation of traditional staples for the population. It has also been established that in the absence of farm labor, most farmers have reduced farm sizes for the production of staples and increased the production of cashews. The practice has, in tend, resulted in a scarcity of land for the cultivation of staples. The study recommends further inquiry into how the effects of migration and cashew production as diversification in agriculture influence national development in Ghana.

Keywords: staple food crops, cashew plantations, climate change, migration

Procedia PDF Downloads 47
2010 In the Eyes of Basilyo at Crispin: A Phenomenological Lived Experience of the Filipino Children of Parents with Mental Illness

Authors: Cely D. Magpantay, Geolynne Marie Adel, Cire-rine Mae Concepcion, Dessa Jean Orcajada, Jorgette Andrea Santos, Orian Laurace Canaman

Abstract:

Mental illness initiative is very relevant in promoting the Mental Health Bill act of 2017. In the Philippines alone, the public is more open and receptive to people at risks with a mental condition. Although it is uncommon that parents can become more psychologically unfit compared to their children, research shows that parents who are suffering from mental illness have a more significant negative effect than another family member. The impact of parent’s mental health can put their children more susceptible to acquire the same disorder. The aim of the study is to explore the lived experiences of children whose parents suffered from mental illness. It discusses how their parent's mental condition in, anyway, affects their psychological development. Using Phenomenological Qualitative Research, an in-depth, interview was conducted to five (5) consenting adults who lived with their parents diagnosed with a mental disorder. Results are clustered into four themes. The first theme is the negative emotion towards parents, the second theme is the psychosocial dynamics in caring for the patient, third is accepting the disease, and fourth is a general perspective on the family. Each themes is validated by experts and the participants. This theme generates subcomponent like isolation, shallow relationship and debt of gratitude. Along with these themes comes the fear of having a family emerged. There is a growing need to strengthen the family ties even more because of parent’s mental illness. Therefore, parental mental illness has an effect on the children’s psychological and social development.

Keywords: lived experience in Philippines, mental health, parental mental illness, psychosocial dynamics

Procedia PDF Downloads 305
2009 Management and Conservation of Crop Biodiversity in Karnali Mountains of Nepal

Authors: Chhabi Paudel

Abstract:

The food and nutrition security of the people of the mountain of Karnali province of Nepal is dependent on traditional crop biodiversity. The altitude range of the study area is 1800 meters to 2700 meters above sea level. The climate is temperate to alpine. Farmers are adopting subsistent oriented diversified farming systems and selected crop species, cultivars, and local production systems by their own long adaptation mechanism. The major crop species are finger millet, proso millet, foxtail millet, potato, barley, wheat, mountain rice, buckwheat, Amaranths, medicinal plants, and many vegetable species. The genetic and varietal diversity of those underutilized indigenous crops is also very high, which has sustained farming even in uneven climatic events. Biodiversity provides production synergy, inputs, and other agro-ecological services for self-sustainability. But increase in human population and urban accessibility are seen as threats to biodiversity conservation. So integrated conservation measures are suggested, including agro-tourism and other monetary benefits to the farmers who conserve the local biodiversity.

Keywords: crop biodiversity, climate change, in-situ conservation, resilience, sustainability, agrotourism

Procedia PDF Downloads 92
2008 Perceived Effect of Livelihood Diversification on the Welfare of Rural Households in Niger State, Nigeria

Authors: Oladipo Joseph Ajayi, Yakubu Muhammed, Raufu Olusola Sanusi

Abstract:

This study determined the perceived effect of livelihood diversification on welfare of rural household in Niger state, Nigeria. Multi-stage sampling technique was adopted for sampling the respondents. Data used for the study were obtained from primary source. Structured questionnaire with interview schedule was administered to 180 randomly selected rural farmers in the study area. Descriptive statistics analysis and z-test statistics were used to analyse the data collected. The study revealed the mean age of the household to be 43 years, mean years of schooling was 8.5, mean household size was 6 people, mean farming experience of 17.5 years and mean farm size of 1.8 hectares. The effect of livelihood diversification revealed that livelihood diversification had positive and significant effect on food security (65.6%) and income generation (66.8%) in the study area. The major constraints to diversification in the study area were poor infrastructure, unavailability of credit and climatic risk and uncertainty. The study, therefore, recommended that rural household should be sensitised to diversify their income source into non-farm activities.

Keywords: income, livelihood diversification , rural household, welfare

Procedia PDF Downloads 409
2007 Immersive and Interactive Storytelling: Exploring Narratives and Online Multisensory Experience for Cultural Memory and Collective Awareness through Graphic Novel

Authors: Cristina Greco

Abstract:

The spread of the digital and we-based technologies has led to a transformation process, which has coincided with an increase in the number of cases who are beyond the mainstream storytelling and its codes on the interaction with the user. On the base of a previous research on i-docs and virtual museums, this study analyses interactive and immersive online Graphic Novel – one-page, animated, illustrated, and hybrid – to reflect on the transformational implications of this expressive form on the user perception, remembrance, and awareness. The way in which the user experiences a certain level of interaction with the story and immersion in the semantic and figurative universe would bring user’s attention, activating introspection and self-reflection processes, perception, imagination, and creativity. This would have to do with the involvement of different senses – visual, proprioceptive, tactile, auditory, and vestibular – and the activation of a phenomenon of synaesthesia (involuntary cross-modal sensory association) – where, for example, the aural reconnect the user to another sense, providing a multisensory experience. The case studies show specific forms of interactive and immersive graphic novel and reflect on application that has sought to engage innovative ways to communicate different messages and stimulate cultural memory and collective awareness. The visual semiotic and narrative analysis of the distinctive traits of such a complex textuality, along with a study of the user’s experience through observation in naturalistic settings and interviews, allows us to question the functioning of these configurations, with regard to the relationships between the figurative dimension, the perceptive activity, and their impact on the user’s engagement.

Keywords: collective awareness, cultural memory, graphic novel, interactive and immersive storytelling

Procedia PDF Downloads 142
2006 User-Perceived Quality Factors for Certification Model of Web-Based System

Authors: Jamaiah H. Yahaya, Aziz Deraman, Abdul Razak Hamdan, Yusmadi Yah Jusoh

Abstract:

One of the most essential issues in software products is to maintain it relevancy to the dynamics of the user’s requirements and expectation. Many studies have been carried out in quality aspect of software products to overcome these problems. Previous software quality assessment models and metrics have been introduced with strengths and limitations. In order to enhance the assurance and buoyancy of the software products, certification models have been introduced and developed. From our previous experiences in certification exercises and case studies collaborating with several agencies in Malaysia, the requirements for user based software certification approach is identified and demanded. The emergence of social network applications, the new development approach such as agile method and other varieties of software in the market have led to the domination of users over the software. As software become more accessible to the public through internet applications, users are becoming more critical in the quality of the services provided by the software. There are several categories of users in web-based systems with different interests and perspectives. The classifications and metrics are identified through brain storming approach with includes researchers, users and experts in this area. The new paradigm in software quality assessment is the main focus in our research. This paper discusses the classifications of users in web-based software system assessment and their associated factors and metrics for quality measurement. The quality model is derived based on IEEE structure and FCM model. The developments are beneficial and valuable to overcome the constraints and improve the application of software certification model in future.

Keywords: software certification model, user centric approach, software quality factors, metrics and measurements, web-based system

Procedia PDF Downloads 396
2005 Potentials and Impediments in the Development of Ikeji Festival for Cultural Tourism

Authors: Ifegbo Lawrencia Ifegbo

Abstract:

Nigeria is a country with many ethnic groups and therefore endowed with festival of different types and nature, yet no concerted effort is committed towards their development for cultural tourism. This paper assessed the adequacy of tourism potential of the festivals, and most importantly investigated the impediments surrounding their non-development. Ikeji, a masquerade festival of the people of Arondizuogu clan in Imo State of Nigeria was selected for the study. Ethnographic research using observer-as-participant technique was used for conducting the study. This was supplemented by focused group discussion (FGD), key informant and unstructured interviews. The result revealed that there exist so much potentials like masquerading, cultural dances, native and highlife music, drumming, role reversals and traditional dishes in the festival. It was further deduced that poor supply of amenities and infrastructural facilities, insecurity of life, lack of trained indigenous experts in tourism, lack of awareness and publicity for the festival on the part of the host communities were responsible for the non-development into tourism destinations. The implication of this is that unless the government resolves to provide the needed resources for the development of the enormous festivals, and restores security and peace in the country, cultural tourism will rarely thrive in Nigeria.

Keywords: festivals, cultural tourism, tourism potential, cultural resources, tourism development

Procedia PDF Downloads 328
2004 Norm Evolution through Contestation: Role of Legality from Humanitarian Intervention to Responsibility to Protect

Authors: Nazlı Üstünes Demirhan

Abstract:

International norms are subject to pressures of change through contestation during the course of their lifetimes. The nature of the contestation is one of the factors that are likely to have a determinative role in the direction of this change towards a stronger or weaker norm. This paper aims to understand the relation between the legality of contestation and the direction of change in norm strength. Based on a multidimensional norm strength conceptualization, it is hypothesized that use of legal logic and rhetoric of argumentation would have a positive influence for norm strength, whereas non-legal nature of contestation would lack this and weaken the norm. In order to show this, the evolution of the human protection norm between 1999 and 2018 will be examined with reference to two major contestation periods; Kosovo intervention of 1999, which led to the development of R2P doctrine, and Libya intervention of 2011, which is followed by the demise of the norm. The comparative analysis will be conducted through process tracing method with a document analysis on the Security Council meeting minutes, resolutions, and press releases. This study aims to contribute to the norm contestation literature with the introduction of legal process analysis. It also relates to further questions in IR/IL nexus, relating to the value added of norm legality as well as the politics of legalization.

Keywords: humanitarian intervention, legality, norm contestation, norm dynamics, norm strength, responsibility to protect

Procedia PDF Downloads 152
2003 Health Care Providers' Perceptions on mHealth Workplace Nutrition Wellness Program: A Thematic Analysis

Authors: Kim H. K. Choy, Oliva H. K. Chu, W. Y. Keung, B. Lim, Winnie P. Y. Tang

Abstract:

Background: Health care providers have been identified as an at-risk group for obesity. Mobile health technology can be used to motivate lifestyle behavioral changes. The aim of this study was to investigate hospital-based health care providers’ perceptions of mHealth Workplace Nutrition Wellness Program. Methods: This qualitative study was conducted at a regional hospital in Hong Kong. Ten health care providers were purposively selected for the study. Qualitative data was collected by individual face-to-face semi-structured interviews which were audio-taped, transcribed verbatim and analyzed by thematic analysis. Results: Four themes were identified: (1) mobile health technology motivates lifestyle changes, (2) self-perceived body weight initiates health behavioral changes, (3) organizational support promotes healthy behavior, (4) lack of self-confidence hinders lifestyle modification. The health care providers’ perceptions of mobile health technology, barriers, and facilitators to participation in the mHealth Workplace Nutrition Wellness Program were discussed in the study. Conclusions: Barriers, facilitators, self-perceived body weight and experiences of mobile health technology were associated with intention of participation in mHealth Workplace Nutrition Wellness Program. The knowledge generated from the study could be used to guide the design and implementation of effective interventions, strategies and policies of workplace wellness programs to promote participation for hospital’s employees.

Keywords: workplace wellness program, mobile health, barriers, facilitators, qualitative

Procedia PDF Downloads 252
2002 Strategic Redesign of Public Spaces with a Sustainable Approach: Case Study of Parque Huancavilca, Guayaquil

Authors: Juan Carlos Briones Macias

Abstract:

Currently, the Huancavilca City Park in Guayaquil is an abandoned public space that is discovering a growing problem of insecurity, where various problems have been perceived, such as the lack of green areas, deteriorating furniture, insufficient lighting, the use of inadequate cladding materials and very sunny areas due to the lack of planning in the design of green areas. The objective of this scientific article is to redesign Huancavilca Park through public space design strategies for more attractive and comfortable areas, becoming a point of interaction in a safe and accessible way. A mixed methodology (qualitative and quantitative) was applied, obtaining information based on surveys, interviews, field observations, and systematizing the data in the traditional weighting of the structuring aspects of the park. The results were obtained from the methodological design scheme of iterative analysis of public spaces by Jan Güell. It is concluded that the use of urban strategies in the structuring elements of the park, such as vegetation, furniture, generating new activities, and security interventions, will specifically solve all the problems of the Huancavilca Park tested in a Pareto 80/20 Diagram.

Keywords: public space, green areas, vegetation, street furniture, urban analysis

Procedia PDF Downloads 141
2001 Searchable Encryption in Cloud Storage

Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu

Abstract:

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.

Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption

Procedia PDF Downloads 375
2000 Development of an Interactive Display-Control Layout Design System for Trains Based on Train Drivers’ Mental Models

Authors: Hyeonkyeong Yang, Minseok Son, Taekbeom Yoo, Woojin Park

Abstract:

Human error is the most salient contributing factor to railway accidents. To reduce the frequency of human errors, many researchers and train designers have adopted ergonomic design principles for designing display-control layout in rail cab. There exist a number of approaches for designing the display control layout based on optimization methods. However, the ergonomically optimized layout design may not be the best design for train drivers, since the drivers have their own mental models based on their experiences. Consequently, the drivers may prefer the existing display-control layout design over the optimal design, and even show better driving performance using the existing design compared to that using the optimal design. Thus, in addition to ergonomic design principles, train drivers’ mental models also need to be considered for designing display-control layout in rail cab. This paper developed an ergonomic assessment system of display-control layout design, and an interactive layout design system that can generate design alternatives and calculate ergonomic assessment score in real-time. The design alternatives generated from the interactive layout design system may not include the optimal design from the ergonomics point of view. However, the system’s strength is that it considers train drivers’ mental models, which can help generate alternatives that are more friendly and easier to use for train drivers. Also, with the developed system, non-experts in ergonomics, such as train drivers, can refine the design alternatives and improve ergonomic assessment score in real-time.

Keywords: display-control layout design, interactive layout design system, mental model, train drivers

Procedia PDF Downloads 300
1999 A Discourse Analysis of Menopause for Thai Women

Authors: Prapaipan Phingchim

Abstract:

The number of women approaching menopausal age in Thailand is increasing, making menopause an important health topic. In order to understand Thai women's different ways of interpreting menopausal experiences and the way they construct meaning relating to menopause, it is necessary to include the context in which meaning is constructed as well as the background of cultural attitudes to menopause existing in the Thai society. The aim of this study was to describe different discourses on menopause in Thailand that present themselves to menopausal women through the use of language and to analyze linguistic strategies used to represent such identity. This study adopts discourse theory and a close pragmatic analysis to examine the discursive construction of menopause for Thai women. Two hundreds and fifteen pieces of text under the heading or subject of `menopause' or `becoming a middle-aged woman', published from 2010 to 2019, were included. All material was addressed to Thai women, and consisted of booklets and informational material, articles from newspapers and magazines and popular science books. Five different discourses on menopause were identified: the biomedical discourse; the health-promotion discourse; the consumer discourse; the alternative discourse; and the feminist/ critical discourse. The biomedical discourse on menopause was found to be dominant, but was expanded or challenged by other discourses by offering different scopes of action and/or resting on different fundamental values. The discourses constructed and positioned individual women differently; thus, the women's position varied noticeably from one discourse to another. There are seven major linguistic strategies used to construct those identities. That is, lexical selection, presupposition manipulation, presupposition denial, the use of implication, the use of passive construction, using the cause and effect sentence structure, and rhetoric questions.

Keywords: discourse analysis, discursive construction, menopause, Thai women

Procedia PDF Downloads 141
1998 Social Consequences of Male Migration on Women: An Evidence from Gujrat-Pakistan

Authors: Shahid Iqbal

Abstract:

It is observed that international migration is increased over a time period in all over the world counties and Pakistan is not escaped. It played a pivotal role in household economy and affecting the gender roles both positive and negative in the developing countries. A vast majority of males from Pakistan migrate to other countries in search of employment and income generating activities and their families left behind, particularly nuclear families are subjected to different social problems. In this scenario, most of the responsibilities lie on the female partners as they have to play the role of male as well as female for their children and household chores. Wives of some males feel loneliness, isolation and a sense of insecurity. Keeping in mind, these realities, this study aims to explore the social impact of husbands’ absentee ship on the lives of families left behind. Particularly, wives’ own experiences will be analyzed. This study will be carried out in the District Gujrat of Punjab Pakistan. Since this study will focus on observing the social impact of male’s migration on families, so, all the households that had at least one member abroad will be the potential respondents of the study. Purposes sampling technique will be used as method to locate the respondents. A focus group discussion will be conducted as a tool for the collection of data. Those women will be approached who are taking care of their families in the absence of their husbands for last three years. For the sake of analysis Interpretative Phenomenological Analysis (IPA) will be applied and researcher will explore how participants make sense of their personal experience and social world.

Keywords: social consequences, male migration, left behind, absentee ship, Pakistan

Procedia PDF Downloads 555
1997 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 204
1996 Vocational Education for Sustainable Development: Teaching Methods and Practices

Authors: Seyilnan Hannah Wadak, Dangway Monica Clement

Abstract:

This theoretical study explores distinct teaching methods and practices for integrating sustainable development principles into vocational education. It examines how vocational institutions can prepare students for a sustainability-oriented workforce while addressing environmental and social challenges. The research analyzes current literature, case studies, and emerging trends to identify effective strategies for incorporating sustainability across various vocational disciplines. Key approaches discussed include experiential learning, green skills training, and interdisciplinary projects that simulate real-world sustainability challenges. The study also investigates the role of technology, such as virtual reality and online collaboration tools, in enhancing sustainability education. Additionally, it addresses the importance of industry partnerships and community engagement in creating relevant, practical learning experiences. The paper highlights potential barriers to implementation and proposes solutions for overcoming them, including professional development for educators and curriculum redesign. Findings suggest that integrating sustainability into vocational education not only enhances students’ employability but also contributes to broader societal goals of sustainable development. This research provides a comprehensive framework for educational institutions and policymakers to transform vocational programs, ensuring they meet the evolving demands of a sustainable future.

Keywords: vocational education, sustainable development, teaching methods, experiential learning, green skills, curriculum integration, industry partnerships, educational technology

Procedia PDF Downloads 15