Search results for: security program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6281

Search results for: security program

5951 The Effects of a Mathematics Remedial Program on Mathematics Success and Achievement among Beginning Mathematics Major Students: A Regression Discontinuity Analysis

Authors: Kuixi Du, Thomas J. Lipscomb

Abstract:

The proficiency in Mathematics skills is fundamental to success in the STEM disciplines. In the US, beginning college students who are placed in remedial/developmental Mathematics courses frequently struggle to achieve academic success. Therefore, Mathematics remediation in college has become an important concern, and providing Mathematics remediation is a prevalent way to help the students who may not be fully prepared for college-level courses. Programs vary, however, and the effectiveness of a particular remedial Mathematics program must be empirically demonstrated. The purpose of this study was to apply the sharp regression discontinuity (RD) technique to determine the effectiveness of the Jack Leaps Summer (JLS) Mathematic remediation program in supporting improved Mathematics learning outcomes among newly admitted Mathematics students in the South Dakota State University. The researchers studied the newly admitted Fall 2019 cohort of Mathematics majors (n=423). The results indicated that students whose pretest score was lower than the cut-off point and who were assigned to the JLS program experienced significantly higher scores on the post-test (Math 101 final score). Based on these results, there is evidence that the JLS program is effective in meeting its primary objective.

Keywords: causal inference, mathematisc remedial program evaluation, quasi-experimental research design, regression discontinuity design, cohort studies

Procedia PDF Downloads 70
5950 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork

Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting

Abstract:

This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.

Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark

Procedia PDF Downloads 246
5949 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 368
5948 Effectiveness of Breathing Training Program on Quality of Life and Depression Among Hemodialysis Patients: Quasi‐Experimental Study

Authors: Hayfa Almutary, Noof Eid Al Shammari

Abstract:

Aim: The management of depression in patients undergoing hemodialysis remains challenging. The aim of this study was to evaluate the effectiveness of a breathing training program on quality of life and depression among patients on hemodialysis. Design: A one-group pretest-posttest quasi-experimental design was used. Methods: Data were collected from hemodialysis units at three dialysis centers. Initial baseline data were collected, and a breathing training program was implemented. The breathing training program included three types of breathing exercises. The impact of the intervention on outcomes was measured using both the Kidney Disease Quality of Life Short Version and the Beck Depression Inventory-Second Edition from the same participants. The participants were asked to perform the breathing training program three times a day for 30 days. Results: The mean age of the patients was 52.1 (SD:15.0), with nearly two-thirds of them being male (63.4%). Participants who were undergoing hemodialysis for 1–4 years constituted the largest number of the sample (46.3%), and 17.1% of participants had visited a psychiatric clinic 1-3 times. The results show that the breathing training program improved overall quality of life and reduced symptoms and problems. In addition, a significant decrease in the overall depression score was observed after implementing the intervention. Conclusions: The breathing training program is a non-pharmacological intervention that has proven visible effectiveness in hemodialysis. This study demonstrated that using breathing exercises reduced depression levels and improved quality of life. The integration of this intervention in dialysis units to manage psychological issues will offer a simple, safe, easy, and inexpensive intervention. Future research should compare the effectiveness of various breathing exercises in hemodialysis patients using longitudinal studies. Impact: As a safety precaution, nurses should initially use non-pharmacological interventions, such as a breathing training program, to treat depression in those undergoing hemodialysis.

Keywords: breathing training program, depression, exercise, quality of life, hemodialysis

Procedia PDF Downloads 62
5947 Application of an Educational Program for Al Jouf University Students regarding Scientific Writing and Presentation Skills

Authors: Fatma Abdel Moneim Al Tawil

Abstract:

This study was undertaken to evaluate an educational program regarding scientific writing and presentation skills among university students. This interventional study used a one-group, pretest/posttest design and was conducted in Al Jouf University among four colleges in Saudi Arabia. Baseline students’ assessment was conducted for developing educational program. Interventional, one group, pretest/posttest study was designed to evaluate the effectiveness of the educational program. Three parts evaluation sheet with total scores of 30 was used for 113 students for the development of the program and 52 students for test pretest phase. Wilcoxon signed ranks showed statistically significant improvement in the combined overall program skills score from a median of 56.7 pre to a median of 86.7 post, (z = 6.231, p < 0.001). When compared to preprogram intervention, post interventions 51.9 % of students achieve excellent performance. While pre intervention no students (0.0 %) achieve this score. Regarding to scientific writing skills, Wilcoxon signed ranks showed statistically significant improvement in the score from a median of 60 pre to a median of 90 post, (z = 6.122, p < 0.001). None of students had excellent performance changed to 73.1%. Regarding to oral presentation skills, Wilcoxon signed ranks showed statistically significant improvement in the score from a median of 50 pre to a median of 80 post, (z = 6.153, p < 0.001). None of students had excellent performance changed to 48.1%. Such educational program needs to be incorporated into classroom delivery of the students’ curriculum. Scientific writing skills book needed to be developed to be recommended as a basic educational strategy for all university faculties.

Keywords: scientific writing, presentation skills, university students, educational program

Procedia PDF Downloads 424
5946 Positive Parenting and Subjective Well-Being: Proposed Program for Parents of Gifted Children

Authors: Suzy Pereira, Alberto Rocha, Ana Almeida, Catarina Figueiredo, Helena Fonseca, Leonor Moreira, Carla Blum Vestena, Cristina Costa-Lobo

Abstract:

The socio-educational support to parents, through parental education intervention programs, is part of European social policies, aiming to respond to the needs of education, promotion of well-being and development of children and young people. The purpose of this research is to evaluate the impact of the Positive Parenting Program on the subjective well-being of the parents of gifted children. The Positive Parenting Program is authored and is conducted by the National Association of Study and Intervention in Giftedness, Portuguese Association. The central question to be explored in this research is: Does the promotion of positive parenting in parents of gifted children have a positive impact on the subjective well-being? The sample consisted of 30 parents, non-probabilistic sampling of convenience, of which 15 parents belong to the intervention group and the rest to the control group. One dimension will be evaluated - subjective well-being, through the PANAS questionnaire - before and after the sessions of this program. The aim is to contribute to the understanding of the process and results of the positive parenting program in parents of gifted children.

Keywords: positive parenting, subjective well-being, giftedness, parental education intervention programs

Procedia PDF Downloads 289
5945 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 372
5944 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality

Authors: Mduduzi Nhlozi

Abstract:

Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.

Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude

Procedia PDF Downloads 93
5943 How to Integrate Sustainability in Technological Degrees: Robotics at UPC

Authors: Antoni Grau, Yolanda Bolea, Alberto Sanfeliu

Abstract:

Embedding Sustainability in technological curricula has become a crucial factor for educating engineers with competences in sustainability. The Technical University of Catalonia UPC, in 2008, designed the Sustainable Technology Excellence Program STEP 2015 in order to assure a successful Sustainability Embedding. This Program takes advantage of the opportunity that the redesign of all Bachelor and Master Degrees in Spain by 2010 under the European Higher Education Area framework offered. The STEP program goals are: to design compulsory courses in each degree; to develop the conceptual base and identify reference models in sustainability for all specialties at UPC; to create an internal interdisciplinary network of faculty from all the schools; to initiate new transdisciplinary research activities in technology-sustainability-education; to spread the know/how attained; to achieve international scientific excellence in technology-sustainability-education and to graduate the first engineers/architects of the new EHEA bachelors with sustainability as a generic competence. Specifically, in this paper authors explain their experience in leading the STEP program, and two examples are presented: Industrial Robotics subject and the curriculum for the School of Architecture.

Keywords: sustainability, curricula improvement, robotics, STEP program

Procedia PDF Downloads 375
5942 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 117
5941 Drinking Reduction Programs: Comparing the Effectiveness of Different Versions of the Programs

Authors: Justyna Śniadach, Barbara Bętkowska Korpała, Napoleon Waszkiewicz

Abstract:

The drinking reduction program is a relatively new form of therapy. A lot has changed in thinking about alcohol problems and effective ways to solve them. Until recently, alcohol consumers were divided into two groups: addicted and "normal" drinkers. In recent years, the existence of a large group of people who drink alcohol harmfully has been noticed: not addicted, but still drinking in a way that brings losses and harms to others. It turned out that most of the problems resulting from drinking alcohol are generated by people who drink harmfully and that showed that it is necessary to build a support system for these people aimed at reducing alcohol consumption. The Drinking Reduction Program currently has 3 versions. There is a Drinking Reduction Program in a standard form, where the patient works stationary, in the therapist's office. Another possibility is the patient's work on Online - Drinking Reduction Program with application in a remote form. Another possibility is the patient's work in Online- Drinking Reduction Program on-line but together with the therapist. In all of this program's exercises are based on the assumptions of behavioral-cognitive therapy and methods of motivational dialogue. The purpose of this research will be to compare three versions of Drinking Reduction Programs in terms of their effectiveness, psychological and sociological variables, as well as the level of motivation to change the drinking pattern.

Keywords: alcohol addiction, addiction therapy, drinking reduction programs, cognitive-behavioral therapy

Procedia PDF Downloads 67
5940 Food Security Indicators in Deltaic and Coastal Research: A Scoping Review

Authors: Sylvia Szabo, Thilini Navaratne, Indrajit Pal, Seree Park

Abstract:

Deltaic and coastal regions are often strategically important both from local and regional perspectives. While deltas are known to be bread baskets of the world, delta inhabitants often face the risk of food and nutritional insecurity. These risks are highly exacerbated by the impacts of climate and environmental change. While numerous regional studies examined the prevalence and the determinants of food security in specific delta and coastal regions, there is still a lack of a systematic analysis of the most widely used scientific food security indicators. In order to fill this gap, a systematic review was carried out using Covidence, a Cochrane-adopted systematic review processing software. Papers included in the review were selected from the SCOPUS, Thomson Reuters Web of Science, Science Direct, ProQuest, and Google Scholar databases. Both scientific papers and grey literature (e.g., reports by international organizations) were considered. The results were analyzed by food security components (access, availability, quality, and strategy) and by world regions. Suggestions for further food security, nutrition, and health research, as well as policy-related implications, are also discussed.

Keywords: delta regions, coastal, food security, indicators, systematic review

Procedia PDF Downloads 215
5939 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 640
5938 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 449
5937 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 117
5936 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 505
5935 Expectations and Perceptions of Students of English Department at the University of Halabja as Future Teachers regarding Viewing and Practicing Program

Authors: Barzan Hadi Hama Karim

Abstract:

In recent years, an increasing number of faculties and colleges of basic education are established by the universities and ministry of Higher Education and Scientific Research of Iraqi Kurdistan to graduate English teachers to teach in the basic and high schools. One central consideration of this study is to what extent graduate teachers receive adequate preparation from these faculties and college of basic education. An important program which is offered in the department of English language in these colleges and faculties is Viewing and Practicing. The purpose of this research is to explore how students of basic education colleges and faculties are using the program of Viewing and Practicing to support the educational process. This study provides a general framework about educational uses of the program as a pedagogical tool to teach English Language in the basic schools and describes the different perceptions of the students at the final stage of their education. A survey is used to collect responses from a group of students to determine their expectations and perceptions about the program. The results display that the program has several aspects of strengths, such as improving English teaching and speaking proficiency, cultivating subject knowledge related to applied linguistics and promoting research engagement. The findings of the study address the following questions: Is Viewing and Practicing Program beneficial for students to experience English language for future career at schools? To what extent do the students prefer teaching English Language in the schools?

Keywords: teaching experience, viewing and practicing, perception, expectation

Procedia PDF Downloads 278
5934 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 109
5933 Effect of Rehabilitative Nursing Program on Pain Intensity and Functional Status among Patients with Discectomy

Authors: Amal Shehata

Abstract:

Low back pain related to disc prolapse is localized in the lumbar area and it may be radiated to the lower extremities, starting from neurons near or around the spinal canal. Most of the population may be affected with disc prolapse within their lifetime and leads to lost productivity, disability and loss of function. The study purpose was to examine the effect of rehabilitative nursing program on pain intensity and functional status among patients with discectomy. Design: Aquasi experimental design was utilized. Setting: The study was carried out at neurosurgery department and out patient's clinic of Menoufia University and Teaching hospitals at Menoufia governorate, Egypt. Instrument of the study: Five Instruments were used for data collection: Structured interviewing questionnaire, Functional assessment instrument, Observational check list, Numeric rating Scale and Oswestry low back pain disability questionnaire. Results: There was an improvement in mean total knowledge score about disease process, discectomy and rehabilitation program in study group (25.32%) than control group (7.32%). There was highly statistically significant improvement in lumbar flexibility among study group (80%) than control group (30%) after rehabilitation program than before. Also there was a decrease in pain score in study group (58% no pain) than control group (28% no pain) after rehabilitation program. There was an improvement in total disability score of study group (zero %) regarding effect of pain on the activity of daily living after rehabilitation program than control group (16%). Conclusion: Application of rehabilitative nursing program for patient with discectomy had proven a positive effect in relation to knowledge score, pain reduction, activity of daily living and functional abilities. Recommendation: A continuous rehabilitative nursing program should be carried out for all patients immediately after discectomy surgery on regular basis. Also A colored illustrated booklet about rehabilitation program should be available and distributed for all patients before surgery.

Keywords: discectomy, rehabilitative nursing program, pain intensity, functional status

Procedia PDF Downloads 121
5932 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 387
5931 The Effect of Maritime Security on National Development in Nigeria

Authors: Adegboyega Adedolapo Ola

Abstract:

Globally, a country’s maritime security has a significant impact on its national development because it serves as a major source of a commercial contact and food supply. However, the country has been faced with a number of problems, such as piracy, kidnapping, illegal bunkering and oil theft. As such, the study examined the contribution and the relationship between maritime security and Nigeria’s development, as well as the prospects and challenges of maritime security in Nigeria. The study utilized a questionnaire and focused group discussion/interview as instruments for data collection. The method of analysis employed in the study is descriptive. A total of Three Hundred and Ninety (390) respondents were randomly selected. The result of the study showed that maritime security contributes to national development in Nigeria by guaranteeing food security in Nigeria, creating employment opportunities as well as increasing the Gross Domestic Product (GDP) of the economy. It was also found that maritime security is yet to provide sufficient support for national development in Nigeria. It is further established that it has prospects for development through the creation of employment opportunities, increase in foreign earnings, and fostering improved living standards for citizens. The study concluded that the high level of corruption, piracy and kidnapping, lack of political will by the government and the porosity of the Nigerian borders are serious obstacles, among others. In attempting to solve the problem of piracy and kidnapping in Nigerian maritime, to contribute to National development, it is primordial to address the cancer of corruption, poverty, and youth unemployment. In view of this, the study recommends: among other things, that the maritime industry should be well secured by removing its constraints/bottlenecks so as to enhance its contributions to national development.

Keywords: maritime security, national development, terrorism, piracy

Procedia PDF Downloads 55
5930 Evidence-Based Policy Making to Improve Human Security in Pakistan

Authors: Ayesha Akbar

Abstract:

Pakistan is moving from a security state to a welfare state despite several security challenges both internal and external. Human security signifies a varied approach in different regions depending upon the leadership and policy priorities. The link between human development and economic growth is not automatic. It has to be created consciously by forward-looking policies and strategies by national governments. There are seven components or categories of human security these include: Economic Security, Personal Security, Health Security, Environmental Security, Food Security, Community Security and Political Security. The increasing interest of the international community to clearly understand the dimensions of human security provided the grounds to Pakistani scholars as well to ponder on the issue and delineate lines of human security. A great deal of work has been either done or in process to evaluate human security indicators in Pakistan. Notwithstanding, after having been done a great deal of work the human security in Pakistan is not satisfactory. A range of deteriorating indicators of human development that lies under the domain of human security leaves certain inquiries to be answered. What are the dimensions of human security in Pakistan? And how are they being dealt from the perspective of policy and institution in terms of its operationalization in Pakistan? Is the human security discourse reflects evidence-based policy changes. The methodology is broadly based on qualitative methods that include interviews, content analysis of policy documents. Pakistan is among the most populous countries in the world and faces high vulnerability to climate change. Literacy rate has gone down with the surge of youth bulge to accommodate in the job market. Increasing population is creating food problems as the resources have not been able to compete with the raising demands of food and other social amenities of life. Majority of the people are facing acute poverty. Health outcomes are also not satisfactory with the high infant and maternal mortality rate. Pakistan is on the verge of facing water crisis as the water resources are depleting so fast with the high demand in agriculture and energy sector. Pakistan is striving hard to deal with the declining state of human security but the dilemma is lack of resources that hinders in meeting up with the emerging demands. The government requires to bring about more change with scaling-up economic growth avenues with enhancing the capacity of human resources. A modern performance drive culture with the integration of technology is required to deliver efficient and effective service delivery. On an already fast track process of reforms; e-governance and evidence based policy mechanism is being instilled in the government process for better governance and evidence based decisions.

Keywords: governance, human development index, human security, Pakistan, policy

Procedia PDF Downloads 227
5929 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia

Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan

Abstract:

This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.

Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia

Procedia PDF Downloads 363
5928 Scenarios of Societal Security and Business Continuity Cycles

Authors: Jiří F. Urbánek, Jiří Barta

Abstract:

Societal security, continuity scenarios, and methodological cycling approach understands in this article. Namely, societal security organizational challenges ask implementation of international standards BS 25999-2 and global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity, and interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization systems, resulting to a crisis scene or even to a battle theater. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management, and overmastering in real environments.

Keywords: business continuity, societal security, crisis scenarios cycles, interoperability

Procedia PDF Downloads 361
5927 The Impact of Water Reservoirs on Biodiversity and Food Security and the Creation of Adaptation Mechanisms

Authors: Inom S. Normatov, Abulqosim Muminov, Parviz I. Normatov

Abstract:

Problems of food security and the preservation of reserved zones in the region of Central Asia under the conditions of the climate change induced by the placement and construction of large reservoirs are considered. The criteria for the optimum placement and construction of reservoirs that entail the minimum impact on the environment are established. The need for the accounting of climatic parameters is shown by the calculation of the water quantity required for the irrigation of agricultural lands.

Keywords: adaptation, biodiversity, food security, water reservoir, risk

Procedia PDF Downloads 230
5926 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978

Authors: Naseer Ahmad Bhat

Abstract:

Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.

Keywords: detentions, Kashmir, public safety act, liberty, security

Procedia PDF Downloads 201
5925 A Program Evaluation of TALMA Full-Year Fellowship Teacher Preparation

Authors: Emilee M. Cruz

Abstract:

Teachers take part in short-term teaching fellowships abroad, and their preparation before, during, and after the experience is critical to affecting teachers’ feelings of success in the international classroom. A program evaluation of the teacher preparation within TALMA: The Israel Program for Excellence in English (TALMA) full-year teaching fellowship was conducted. A questionnaire was developed that examined professional development, deliberate reflection, and cultural and language immersion offered before, during, and after the short-term experience. The evaluation also surveyed teachers’ feelings of preparedness for the Israeli classroom and any recommendations they had for future teacher preparation within the fellowship program. The review suggests the TALMA program includes integrated professional learning communities between fellows and Israeli co-teachers, more opportunities for immersive Hebrew language learning, a broader professional network with Israelis, and opportunities for guided discussion with the TALMA community continued participation in TALMA events and learning following the full-year fellowship. Similar short-term international programs should consider the findings in the design of their participation preparation programs. The review also offers direction for future program evaluation of short-term participant preparation, including the need for frequent response item updates to match current offerings and evaluation of participant feelings of preparedness before, during, and after the full-year fellowship.

Keywords: educational program evaluation, international teaching, short-term teaching, teacher beliefs, teaching fellowship, teacher preparation

Procedia PDF Downloads 160
5924 Social Protection Reforms in Indonesia: Towards a Life Cycle Based Social Protection System

Authors: Dyah Larasati, Karishma Alize Huda, Sri Kusumastuti Rahayu, Martin Daniel Siyaranamual

Abstract:

Indonesia continues to reform its social protection system to provide the needed protection for its citizen. Indonesia Social Protection consisted of social assistance programs (non-contributory/tax-financed) specifically targeted for the poor and at-risk and social security/insurance program (contributory system). The social assistance programs have mostly been implemented since 1998. The national health insurance has been implemented since 2014 and the employment social insurance since 2015. One major reform implemented has been improving the targeting performance of its major social assistance portfolios including (1) Food Assistance for the poor families (Rastra and BPNT/noncash foods assistance); (2) Education Assistance for poor children; (3) Conditional Cash Transfer for poor families (PKH); and (4) Subsidized beneficiaries of National Health Insurance (JKN-PBI) for the poor and at-risk individuals. For the Social Insurance (through BPJS Employment program), several initiatives have been implemented to expand the program contributing members, although it mostly benefits the formal sector workers. However, major gaps still exist especially for the emerging middle-income groups who typically work at the informal sectors. They have yet to get the protection needed to sustain their social and economic growth. Since 2017, TNP2K (the National Team for Poverty Reduction) under the Vice President office has led the social protection discourse as the government understands the need to address vulnerabilities across the lifecycle and prioritize support to the most at-risk population particularly the elderly, young children and people with disabilities. Discussion and advocacy to recommend for more investment is continuing in order for the government to establish a comprehensive social protection system in the near future (2020-2024) that protects children through an inclusive child benefit program; build a system to benefit more working-age adults (including individuals with disabilities) and a three-tier elderly protection as they reach 65 years.

Keywords: poverty reduction, social assistance, social insurance, social protection

Procedia PDF Downloads 155
5923 The School Based Support Program: An Evaluation of a Comprehensive School Reform Initiative in the State of Qatar

Authors: Abdullah Abu-Tineh, Youmen Chaaban

Abstract:

This study examines the development of a professional development (PD) model for teacher growth and learning that is embedded into the school context. The School based Support Program (SBSP), designed for the Qatari context, targets the practices, knowledge and skills of both school leadership and teachers in an attempt to improve student learning outcomes. Key aspects of the model include the development of learning communities among teachers, strong leadership that supports school improvement activities, and the use of research-based PD to improve teacher practices and student achievement. This paper further presents findings from an evaluation of this PD program. Based on an adaptation of Guskey’s evaluation of PD models, 100 teachers at the participating schools were selected for classroom observations and 40 took part in in-depth interviews to examine changed classroom practices. The impact of the PD program on student learning was also examined. Teachers’ practices and their students’ achievement in English, Arabic, mathematics and science were measured at the beginning and at the end of the intervention.

Keywords: initiative, professional development, school based support Program (SBSP), school reform

Procedia PDF Downloads 460
5922 Industry Practitioners Involvement in Taiwan Vocational Education

Authors: Hsiao Tseng Lin, Szu Mei Hsiao, Mei Chun Yuan

Abstract:

Today's rapid development of industrial pulsation, how to reduce the gap between the academics and industry need become an important issue in vocational education. Beginning in 2015, a two-year program for teaching excellence, funded by the Ministry of Education Taiwan, is implemented by Meiho University, with a total project funding of $ 1.5 million USD. One of the innovated highlights of this program is to invite 188 industry practitioners to participate in collaborative teaching for 175 classes and 28 industry practitioners to be as mentors too. 56 industry practitioners are also invited to participate in curriculum planning and design. Students' overall satisfaction with the program was more than 4.5 (out of 5.0). This paper aims to evaluate the effectiveness and discusses the limit of the practitioners program. This study has revealed and provided some valuable perspectives how to best ensure the ongoing involvement of industry practitioners in vocational education. The findings of this study are valuable to those involved in designing collaborative teaching curriculum and delivering a course for vocational education.

Keywords: collaborative teaching, industry practitioners, mentor, vocational education

Procedia PDF Downloads 412