Search results for: school security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5765

Search results for: school security

5435 Programming Systems in Implementation of Process Safety at Chemical Process Industry

Authors: Maryam Shayan

Abstract:

Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.

Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology

Procedia PDF Downloads 352
5434 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 419
5433 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 44
5432 Role of Special Training Centers (STC) in Right to Education Act Challenges And Remedies

Authors: Anshu Radha Aggarwal

Abstract:

As per the Right to Education Act (RTE), 2009, every child in the age group of 6-14 years shall be admitted in a neighborhood school. All the Out of School Children identified have to be enrolled / mainstreamed in to age appropriate class and there-after be provided special training. This paper addresses issues emerging from provisions in the RTE Act that specifically refer to the enrolment of out-of school children into age appropriate classes and the requirement to provide special trainings that will enable this to take place. In the context of RTE Act, the Out-of-School Children are first enrolled in the formal school and then they are provided with Special Training through NRSTCs (Long Term / Short term basis). These centers are functioning in formal school campus itself. This paper specifies the role of special training centers (STC). It presents a re-envisioning of assessment that recognizes two principal functions of assessment, assessment for learning and assessment of learning, instead of the more familiar categories of formative, diagnostic, summative, and evaluative assessment. The use of these two functions of assessment highlights and emphasizes the role of special training centers (STC) to assess their level for giving them appropriate special training and to evaluate their improvement in learning level. Challenge of problem faced by teachers to do diagnostic assessment, including its place in the sequence of assessment procedures appropriate in identifying and addressing individual children’s learning difficulties are solved by special training centers (STC). It is important that assessment is used to identify children with learning difficulties at the earliest possible stage so that appropriate support and intervention can be put in place. So appropriate challenges with tools are presented here for their assessment at entry level and at completion level of primary children by special training centers (STC).

Keywords: right to education, assessment, challenges, out of school children

Procedia PDF Downloads 443
5431 Modeling Water Inequality and Water Security: The Role of Water Governance

Authors: Pius Babuna, Xiaohua Yang, Roberto Xavier Supe Tulcan, Bian Dehui, Mohammed Takase, Bismarck Yelfogle Guba, Chuanliang Han, Doris Abra Awudi, Meishui Lia

Abstract:

Water inequality, water security, and water governance are fundamental parameters that affect the sustainable use of water resources. Through policy formulation and decision-making, water governance determines both water security and water inequality. Largely, where water inequality exists, water security is undermined through unsustainable water use practices that lead to pollution of water resources, conflicts, hoarding of water, and poor sanitation. Incidentally, the interconnectedness of water governance, water inequality, and water security has not been investigated previously. This study modified the Gini coefficient and used a Logistics Growth of Water Resources (LGWR) Model to access water inequality and water security mathematically, and discussed the connected role of water governance. We tested the validity of both models by calculating the actual water inequality and water security of Ghana. We also discussed the implications of water inequality on water security and the overarching role of water governance. The results show that regional water inequality is widespread in some parts. The Volta region showed the highest water inequality (Gini index of 0.58), while the central region showed the lowest (Gini index of 0.15). Water security is moderately sustainable. The use of water resources is currently stress-free. It was estimated to maintain such status until 2132 ± 18, when Ghana will consume half of the current total water resources of 53.2 billion cubic meters. Effectively, water inequality is a threat to water security, results in poverty, under-development heightens tensions in water use, and causes instability. With proper water governance, water inequality can be eliminated through formulating and implementing approaches that engender equal allocation and sustainable use of water resources.

Keywords: water inequality, water security, water governance, Gini coefficient, moran index, water resources management

Procedia PDF Downloads 108
5430 The Social Perception of National Security Risks: A Comparative Perspective

Authors: Nicula Valentin, Andrei Virginia

Abstract:

Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.

Keywords: risk perception, Q-sort method, national security hazards, individual beliefs

Procedia PDF Downloads 287
5429 Examining Professional Challenges for School Social Work in Swedish Elementary Schools: A Focus Group Study

Authors: Maria Kjellgren, Sara Lilliehorn, Urban Markström

Abstract:

Critical components that influence the role and performance of school social workers in Swedish elementary schools will be described and analysed, such as formal regulations, professional self-understanding, and the SSWs’ role in the interplay between professional domains involved in elementary school. The data collection was conducted through four semi-structured focus group interviews with a total of 22 SSWs in four different regions in Sweden. The result reveals three main challenges for the School Social Worker (SSW): (1) To navigate in a pedagogic and medical arena within a multidisciplinary team, (2) To manage ambiguity without any formal regulations and unclear settings and leadership and finally, (3) To negotiate tasks at different levels, with a health promotional and preventive focus, where the SSW ends up, mainly in remedial work with individual children. The results also disclosed that SSWs hold a vague professional self-understanding position with a little formal mandate to perform their work.

Keywords: school social worker, multidisciplinary team, counselling, professional self-understanding, formal regulations

Procedia PDF Downloads 49
5428 Factors of Successful Transition of Individuals with Intellectual Disabilities from School to Employment

Authors: Mubarak S. Aldosari

Abstract:

Transition of adolescents with mild intellectual disabilities (ID) from secondary level to post-school employment level is a critical step for them and their families. Transition of adolescents with mild ID to post secondary levels faces serious difficulties and challenges. The current research highlighted the important factors related to the success of transition of students with mild ID to post-school employment such as vocational training, Self-determination skills, Social skills, and family involvement.

Keywords: adolescents with mild intellectual disabilities, post-school employment, vocational training, self-determination skills, social skills, family involvement

Procedia PDF Downloads 278
5427 A Study on the Factors Affecting Student Behavior Intention to Attend Robotics Courses at the Primary and Secondary School Levels

Authors: Jingwen Shan

Abstract:

In order to explore the key factors affecting the robot program learning intention of school students, this study takes the technology acceptance model as the theoretical basis and invites 167 students from Jiading District of Shanghai as the research subjects. In the robot course, the model of school students on their learning behavior is constructed. By verifying the causal path relationship between variables, it is concluded that teachers can enhance students’ perceptual usefulness to robotics courses by enhancing subjective norms, entertainment perception, and reducing technical anxiety, such as focusing on the gradual progress of programming and analyzing learner characteristics. Students can improve perceived ease of use by enhancing self-efficacy. At the same time, robot hardware designers can optimize in terms of entertainment and interactivity, which will directly or indirectly increase the learning intention of the robot course. By changing these factors, the learning behavior of primary and secondary school students can be more sustainable.

Keywords: TAM, learning behavior intentions, robot courses, primary and secondary school students

Procedia PDF Downloads 129
5426 Great Art for Little Children - Games in School Education as Integration of Polish-Language, Eurhythmics, Artistic and Mathematical Subject Matter

Authors: Małgorzata Anna Karczmarzyk

Abstract:

Who is the contemporary child? What are his/her distinctive features making him/her different from earlier generations? And how to teach in the dissimilar social reality? These questions will constitute the key to my reflections on contemporary early school education. For, to my mind, games have become highly significant for the modern model of education. There arise publications and research employing games to increase competence both in business, tutoring, or coaching, as well as in academic education . Thanks to games students and subordinates can be taught such abilities as problem thinking, creativity, consistent fulfillment of goals, resourcefulness and skills of communication.

Keywords: games, art, children, school education, integration

Procedia PDF Downloads 836
5425 Influence of Security Attributes in Component-Based Software Development

Authors: Somayeh Zeinali

Abstract:

A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.

Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component

Procedia PDF Downloads 535
5424 Study on the OTP Authentication Method and Security for User Mobility in the Cloud

Authors: Jong-Won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.

Keywords: cloud, OTP, mobility, security, authentication

Procedia PDF Downloads 334
5423 Reading Literacy and Methods of Improving Reading

Authors: Iva Košek Bartošová, Andrea Jokešová, Eva Kozlová, Helena Matějová

Abstract:

The paper presents results of a research team from Faculty of Education, University of Hradec Králové in the Czech Republic. It introduces with the most reading methods used in the 1st classes of a primary school and presents results of a pilot research focused on mastering reading techniques and the quality of reading comprehension of pupils in the first half of a school year during training in teaching reading by an analytic-synthetic method and by a genetic method. These methods of practicing reading skills are the most used ones in the Czech Republic. During the school year 2015/16 there has been a measurement made of two groups of pupils of the 1st year and monitoring of quantitative and qualitative parameters of reading pupils’ outputs by several methods. Both of these methods are based on different theoretical basis and each of them has a specific educational and methodical procedure. This contribution represents results during a piloting project and draws pilot conclusions which will be verified in the subsequent broader research at the end of the school year of the first class of primary school.

Keywords: analytic-synthetic method of reading, genetic method of reading, reading comprehension, reading literacy, reading methods, reading speed

Procedia PDF Downloads 235
5422 Tobephobia: Fear of Failure in Education Caused by School Violence and Drug Abuse

Authors: Prakash Singh

Abstract:

Schools throughout the world are facing increasing challenges in dealing with school violence and drug abuse by pupils. Therefore, the question of the fear of failure to meet the aims and objectives of education inevitably surfaces as it places increasing and challenging demands on educators and all other stakeholders to address this malaise. Multiple studies on the construct tobephobia (TBP) simply define TBP as the fear of failure in education. This study is a continuation of the exploratory studies on the manifestation of fear in education. The primary purpose of this study was to establish how TBP, caused by school violence and drug abuse affects teaching and learning in our schools. The qualitative research method was used for this study. Teachers admitted that they fear for their safety at school. Working in a fearful situation places a high rate of stress and anxiety on them. Tobephobic educators spend most of their time worrying about their fear of violence and drug abuse by pupils and are too frightened to carry out their normal duties. They prefer to stay in familiar surroundings for fear of being attacked by inebriated learners. This study, therefore, contributes to our understanding of the effects of TBP in our schools caused by school violence and drug abuse. Also, this study supplements the evidence accumulated over the past fifteen years that TBP is not a figment of someone’s imagination; it is a gruesome reality affecting the very foundation of our educational system globally to provide quality and equal education to all our learners in a harmonious, collegial school environment.

Keywords: tobephobia, tobephobic educators, fear of failure in education, school violence, drug abuse

Procedia PDF Downloads 462
5421 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 437
5420 Psychological Sense of School Membership and Coping Ability as Predictors of Multidimensional Life Satisfaction among School Children

Authors: Mary Banke Iyabo Omoniyi

Abstract:

Children in the developing countries have complex social, economic, political and environmental contexts that create a wide range of challenges for school children to surmount as they journey through school from childhood to adolescent. Many of these children have little or no personal resources and social support to confront these challenges. This study employed a descriptive research design of survey type to investigate the psychological sense of school membership and coping skills as they relate to the multidimensional life satisfaction of the school children. The sample consists of 835 school children with the age range of 7-11 years who were randomly selected from twenty schools in Ondo state, Nigeria. The instrument for data collection was a questionnaire consisting of 4 sections A, B, C and D. Section A contained items on the children’s bio-data (Age, School, father’s and mother’s educational qualifications), section B is the Multidimensional Children Life Satisfaction Questionnaire (MCLSQ) with a 20 item Likert type scale. The response format range from Never= 1 to Almost always =4. The (MCLSQ) was designed to provide profile of children satisfaction with important domains of (school, family and friends). Section C is the Psychological Sense of School Membership Questionnaire (PSSMQ) with 18 items having response format ranging from Not at true=1 to completely true=5. While section D is the Self-Report Coping Questionnaire (SRCQ) which has 16 items with response ranging from Never =1 to Always=5. The instrument has a test-retest reliability coefficient of r = 0.87 while the sectional reliabilities for MCLSQ, PSSMQ and SRCQ are 0.86, 0.92 and 0.89 respectively. The results indicated that self-report coping skill was significantly correlated with multidimensional life satisfaction (r=592;p<0.05). However, the correlation between multidimensional life satisfaction and psychological sense of school membership was not significant (r=0.038;p>0.05). The regression analysis indicated that the contribution of mother’s education and father’s education to psychological sense of school member of the children were 0.923, Adjusted R2 is 0.440 and 0.730 and Adjusted R2 is 0.446. The results also indicate that contribution of gender to psychological sense of school for male and female has R= 0.782, Adjusted R2 = 0.478 and R = 0.998, Adjusted R2 i= 0.932 respectively. In conclusion, mother’s education qualification was found to contribute more to children psychological sense of membership and multidimensional life satisfaction than father’s. The girl child was also found to have more sense of belonging to the school setting than boy child. The counselling implications and recommendations among others were geared towards positive emotional gender sensitivity with regards to the male folk. Education stakeholders are also encouraged to make the school environment more conducive and gender friendly.

Keywords: multidimensional life satisfaction, psychological sense of school, coping skills, counselling implications

Procedia PDF Downloads 288
5419 Artistic and Technological Features of Bukhara Copper Embossing in the 20th Century

Authors: Zebiniso Mukhsinova

Abstract:

This article discusses the dynamics of the historical development of the Bukhara school of copper-stamped products. Copper embossing is one of the leading crafts of Uzbek decorative and applied art. A critical and analytical assessment of innovative ideas, artistic and technological features, which arose as a result of the inter-regional synthesis of a local school, is presented. The article includes a detailed analysis of exhibits in museum collections, a research of the scientific papers of leading art critics and differs from previous studies in this area.

Keywords: applied art, copper embossing, metalwork, ewer, tray, Bukhara school

Procedia PDF Downloads 125
5418 Productivity-Emotiveness Model of School Students’ Capacity Levels

Authors: Ivan Samokhin

Abstract:

A new two-factor model of school students’ capacity levels is proposed. It considers the academic productivity and emotional condition of children taking part in the study process. Each basic level reflects the correlation of these two factors. The teacher decides whether the required result is achieved or not and write down the grade (from 'A' to 'F') in the register. During the term, the teacher can estimate the students’ progress with any intervals, but it is not desirable to exceed a two-week period (with primary school being an exception). Each boy or girl should have a special notebook to record the emotions which they feel studying a subject. The children can make their notes the way they like it – for example, using a ten-point scale or a short verbal description. It is recommended to record the emotions twice a day: after the lesson and after doing the homework. Before the students start doing this, they should be instructed by a school psychologist, who has to emphasize that an attitude to the subject – not to a person in charge of it – is relevant. At the end of the term, the notebooks are given to the teacher, who is now able to make preliminary conclusions about academic results and psychological comfort of each student. If necessary, some pedagogical measures can be taken. The data about a supposed capacity level is available for the teacher and the school administration. In certain cases, this information can be also revealed to the student’s parents, while the student learns it only after receiving a school-leaving certificate (until this moment, the results are not considered ultimate). Then a person may take these data into consideration when choosing his/her future area of higher education. We single out four main capacity levels: 'nominally low', 'inclination', 'ability' and 'gift'.

Keywords: academic productivity, capacity level, emotional condition, school students

Procedia PDF Downloads 206
5417 Fostering Teacher Professional Well-being: Understanding the Impact of School Administration Leadership and Other Factors

Authors: Monika Simkute-Bukante

Abstract:

Teachers significantly influence student achievements, personal development, and academic success. Consequently, they are subject to heightened expectations and scrutiny from governments, school administrations, parents, and even students. Increasing responsibilities and pressures impact teachers’ professional well-being, contributing to a global trend of increased teacher turnover and shortages due to stress and heavy workloads. Given the critical role of teachers in educating young people, it is essential to implement strategies to retain them. School administrations are pivotal in creating an environment conducive to optimal performance. However, there remains a gap in understanding how school administration leadership impacts teachers' professional well-being and its potential for improvement. This research aims to define teacher professional well-being, identify its attributes, and explore the factors influencing it, with a particular focus on the role of school administration. Employing the concept analysis method, this study reviews scholarly publications from 2019 to 2024 to articulate the components of teacher professional well-being. The findings highlight key attributes of teacher well-being, including self-efficacy, work engagement, job satisfaction, relationships with colleagues and students, support from administration, work autonomy, school climate, time pressure, workload, resilience, stress, burnout, and turnover intentions. The analysis demonstrates that school administration leadership directly affects these aspects by providing support in challenging situations, empowering teachers, offering recognition, facilitating open communication, and ensuring autonomy at work. In conclusion, the research shows that teachers' professional well-being is heavily dependent on relationships with school administration, colleagues, and students, as well as the overall school climate. It suggests that by enhancing these elements, school leaders can significantly improve teacher professional well-being. Recommendations are made for developing strategies to support these relationships, thereby fostering an environment that enhances teacher retention and effectiveness.

Keywords: concept analysis, teacher professional well-being, school administration leadership, well-being factors

Procedia PDF Downloads 17
5416 Post-Covid 19 Pandemic Economy: Corporate Governance and Performance of Private Security Firms in Kenya

Authors: Sewe Silvanus Odhiambo

Abstract:

Globally, many governments have publicly recognized private security firms as essential services providers. The private security firms face a lot of challenges, but the COVID-19 situation also has exacerbated them to another level. This paper locates its relevance in the post-coronavirus era. The COVID-19 pandemic has redefined the world operation, which shows a higher impact on the security field. Accordingly, the purpose of the study was to examine the role of corporate governance on the performance of private security firms in a post-covid pandemic era in Kenya. The study employed a descriptive research design, which included a quantitative approach and secondary data. The study was carried in the month of July 2021 from the registered private security firms. After targeting all private security firms, only 54 firms had disclosed their annual report by the time of conducting the study. The results depicted that pandemic has affected the performance of private security firms measures unfavorably. Further, boards of directors show a positive association with security firm performance. The study recommends that there is need board of directors to enhance management’s risk assessments in the midst of COVID-19; ensure that there are business continuity plans; there is organizational resilience; there is need for the development of new digital strategies; enabling the digital workforce in the firms and have effective communication plans with both internal and external stakeholders to deal with uncertainties and develop more post-COVID practices for boards of directors to improve performance of private security firms in Kenya. The practical implications of the study are that the research outcomes might assist regulatory bodies, investors, policymakers, and the security sector in general in their formulation of public and corporate governance strategies concerning future emergency preparedness and responses. This study also provides a unique contribution to the literature of COVID-19 and security firm performance in emerging economies context.

Keywords: COVID-19, corporate governance, firm performance, private security firms

Procedia PDF Downloads 136
5415 A Grounded Theory of Educational Leadership Development Using Generative Dialogue

Authors: Elizabeth Hartney, Keith Borkowsky, Jo Axe, Doug Hamilton

Abstract:

The aim of this research is to develop a grounded theory of educational leadership development, using an approach to initiating and maintaining professional growth in school principals and vice principals termed generative dialogue. The research was conducted in a relatively affluent, urban school district in Western Canada. Generative dialogue interviews were conducted by a team of consultants, and anonymous data in the form of handwritten notes were voluntarily submitted to the research team. The data were transcribed and analyzed using grounded theory. The results indicate that a key focus of educational leadership development is focused on navigating relationships within the school setting and that the generative dialogue process is helpful for principals and vice principals to explore how they might do this. Applicability and limitations of the study are addressed.

Keywords: generative dialogue, school principals, grounded theory, leadership development

Procedia PDF Downloads 332
5414 Improving Home and School Collaboration: Analysis of Parent and Teacher Involvement Practices in Public Elementary Schools in Benguet, Philippines

Authors: Sherry Junette Tagle

Abstract:

Extensive research continues to prove the positive effects of home and school collaborations in education. Although parent involvement programs in Benguet, Philippines are in place, the impact has yet to affect the current aggregate performance of elementary pupils. This study describes the involvement of public elementary teachers and parents along Epstein’s types of involvement using the sequential explanatory design. Survey and interview results show that teachers place greater value on activities that cater to communicating, volunteering, learning at home and decision making. On the other hand, parents are actively involved in all six types and value the importance of their involvement in school to their child’s schooling. Parents of grades 1-4 pupils significantly give importance to communicating activities to offset difficulties encountered by young pupils while parents of grades 5-6 pupils, have declining interest in volunteering and learning at home activities citing older children as being more independent to do teacher-assigned tasks. Teachers, compared to the other respondent groups, significantly place higher value on the importance of parent leaders as their partners in implementing school activities. In general, involvement of parents and teachers in home-school activities is intensive in the lower grade levels and decreases as their child progresses through school. A recommended program for future collaborations of the Philippine’s Department of Education has been formulated to diversify existing activities and elicit greater participation among the school’s stakeholders to achieve holistic development of the pupils and ultimately improve pupils’ school aggregate performance.

Keywords: Epstein's types of involvement, community collaborations, home and school partnerships, parent involvement

Procedia PDF Downloads 229
5413 The Right of Pregnant Girls to Remain in School: Conflicting Human Rights

Authors: Ronelle Prinsloo

Abstract:

Teenage pregnancy in South African schools is a growing concern. In South Africa, many young female learners end their schooling permanently, not because they have completed their studies, but due to pregnancy. The admission policy of public schools is determined by the governing body of such a school, and this policy can determine that a pregnant leaner may not attend school during pregnancy and for a certain period after the birth of the child. This can be seen as an infringement of the rights of the teenage mother to be allowed to attend school. It can also be argued that this conflicts with the best interest of the child as well as the rights of the governing body to determine policy in accordance with the mandate as given to them by the parents and community served by the school. A pregnant learner can argue that the admission policy of a school is discriminatory if it does not allow the pregnant learner to continue her schooling. She may also argue that she is being unfairly discriminated against based on gender because in many instances, the baby’s father is still allowed to go to school. The Constitution (Constitution of the Republic of South Africa, Act 108 of 1996), provides in section 9, that everyone is equal before the law; it goes on to provide that equality includes the full and equal enjoyment of all rights and freedoms and provides those grounds on which one may not be discriminated against including, gender, sex, and pregnancy. Schools should be encouraged to re-enroll students if they have a support system available to assist with the necessary childcare when they attend school. To dramatically increase the number of young people enrolled in alternative pathways such as Further Education and Training or Adult Basic Education and Training must be provided. In addition, alternative systems must offer viable exit opportunities for participants by cohering with further education and economic opportunities.

Keywords: admission policy, Constitution of South Africa, human rights, teenage pregnancy

Procedia PDF Downloads 52
5412 A Conversation about Inclusive Education: Revelations from Namibian Primary School Teachers

Authors: M. D. Nghiteke, A. Mji, G. T. Molepo

Abstract:

Inclusive education stems from a philosophy and vision, which argues that all children should learn together at school. It is not only about treating all pupils in the same way. It is also about allowing all children to attend school without any restrictions. Ten primary school teachers in a circuit in Namibia volunteered to participate in face-to-face interviews about inclusive education. The teachers responded to three questions about their (i) understanding of inclusive education; (ii) whether inclusive education was implemented in primary schools; and (iii) whether they were able to work with learners with special needs. Findings indicated that teachers understood what inclusive education entailed; felt that inclusive education was not implemented in their primary schools, and they were unable to work with learners with special needs in their classrooms. Further, the teachers identified training and resources as important components of inclusive education. It is recommended that education authorities should perhaps verify the findings reported here as well as ensure that the concerns raised by the teachers are addressed.

Keywords: classrooms and schools, inclusive education, resources, training

Procedia PDF Downloads 157
5411 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 76
5410 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 34
5409 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 351
5408 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 358
5407 The Consequences of Cyberbullying and School Violence: Risk and Protective Factors

Authors: Ifigenia Stylianou

Abstract:

As more than three-quarters of students going online daily via computers, tablets, and smartphones, the phenomenon of cyberbullying is growing rapidly. Knowing that victims of online bullying are often also victims of traditional bullying and that traditional bullying is considered as an extension of cyberbullying. In this study, we aim to identify (1) whether cyberbullying lead to more intense forms of school bullying, and (2) whether some biological and environmental factors mediate between this relation, and act protectively to bullying and inappropriate behaviour in school. To answer this questions, a sample of X students, aged X, were asked to complete eight questionnaires (Personal Experiences Checklist, Inventory of Peers Attachment, Questionnaire on Teacher Interaction, School Climate Survey for Bullying, Strengths and Difficulties Questionnaire, Youth Psychopathic Traits Inventory-Short Form, Barratt Impulsiveness Scale-11) in X time periods. Results can provide us important information to improve understanding the factors that are related to bullying. In addition, the results can assist in developing intervention programs to tangle the issue of bullying at schools. All data have been collected and are currently being processed for statistical analyses.

Keywords: cyberbullying, bullying, school climate, psychopathy traits, attachment, mediation factors

Procedia PDF Downloads 211
5406 Gardening as a Contextual Scaffold for Learning: Connecting Community Wisdom for Science and Health Learning through Participatory Action Research

Authors: Kamal Prasad Acharya

Abstract:

The related literature suggests that teaching and learning science at the basic level community schools in Nepal is based on book recitation. Consequently, the achievement levels and the understanding of basic science concepts is much below the policy expectations. In this context, this study intended to gain perception in the implementation practices of school gardens ‘One Garden One School’ for science learning and to meet the target of sustainable development goals that connects community wisdom regarding school gardening activities (SGAs) for science learning. This Participatory Action Research (PAR) study was done at the action school located in Province 3, Chitwan of Federal Nepal, supported under the NORHED/Rupantaran project. The purpose of the study was to connect the community wisdom related to gardening activities as contextual scaffolds for science learning. For this, in-depth interviews and focus group discussions were applied to collect data which were analyzed using a thematic analysis. Basic level students, science teachers, and parents reported having wonderful experiences such as active and meaningful engagement in school gardening activities for science learning as well as science teachers’ motivation in activity-based science learning. Overall, teachers, students, and parents reported that the school gardening activities have been found to have had positive effects on students’ science learning as they develop basic scientific concepts by connecting community wisdom as a contextual scaffold. It is recommended that the establishment of a school garden is important for science learning in community schools throughout Nepal.

Keywords: contextual scaffold, community wisdom, science and health learning, school garden

Procedia PDF Downloads 158