Search results for: Arabic Fodio Nigeria security
5009 Socioeconomic Values and Administration in Northern Nigeria: An Examination of the Impacts of Dearth of Values
Authors: Hassan Alhaji Hassan, Inuwa Abdu Ibrahim
Abstract:
The research looks at the decaying socioeconomic values in northern Nigeria, which is directly affecting the administration of service at different levels. The aim is to establish the consequence of a valueless society on individual and public life at different levels. The result of governments’ continued neglect of education, societal values, which have negatively affected societal development and indeed development in general. Therefore, focus is on governments’ poor performance in Nigeria, using secondary sources of data. In conclusion, the research asserts the need for the application of the values of some traditional values as personal principles and good governance as the way out of the present deteriorating conditions.Keywords: socioeconomic, values, education, Northern Nigeria, good governance
Procedia PDF Downloads 3905008 Repositioning Religion as a Catalyst for Conflict Resolution in Nigeria
Authors: Samuel A. Muyiwa
Abstract:
Religious chauvinism has attained an alarming status in Contemporary Nigerian society. Arguably, Nigeria is the largest economy and most populous nation in Africa with over 182 million people, the advantages offer by vibrant economy and high population have been sacrificed on the altar of religion. Tolerance, sacrifice, humility, compassion, love, justice, trustworthiness, dedication to the well-being of others, and unity are the universal spiritual principles that lie at the heart of any religion either Christianity or Islam even traditional. Whereas traditional religious practices foreground the beliefs, norms and ritual that are related to the sacred being God because of its quick and immediate consequence of its effect, the new-found religious sentiments have deviated from the norms, thus undermining cosmic harmony in Nigeria because of its long-time consequence of its effect. Religion, which is expected to accelerate growth and motivate people to develop spiritual nuances for the betterment of their communities, has, however occasioned conflict and violence in Nigeria socio-political cosmo. Therefore, this study examines the content of religion in the promotion of peace and unity and its contextual missing link in the promotion of conflict and violence in Nigeria.Keywords: religion chauvinism, Nigeria, conflict, conflict resolution
Procedia PDF Downloads 3165007 Religious Insurgency in Nigeria: A Bane to National Unity
Authors: Ayoola Adediran Amos
Abstract:
Nigeria as a secular state that is characterized with various religions namely: Christianity, Islam and African Religion. Each of the religion adherents often claim that their religion is the only means of gaining eternity while others who do not belong to their sect may not be opportuned. Religious doctrine within those religious sects is another source of insurgency which serves as a threat to the unity of Nigeria. Similarly, Boko Haram Religious group has become a threat to the unity of the country in which its root has both political and religious undertones. Primary and secondary sources of collecting data were used. Historical method allowed enquiry into the past events and improvement to the current experience. Both published and unpublished theses were used. Interview was also conducted as part of the secondary sources. It was observed that all aspects of the system in Nigeria were affected with this scourge of religious unrest. i.e. education, political, economic and a host of others. Finally, it was recommended that religious leaders should be given adequate orientation on the needs not to preach against other religious groups. Government of Nigeria should not give priority to one religion at the expense of others.Keywords: insurgency, national unity, religious, threat
Procedia PDF Downloads 3315006 An Evaluation of Tourism Education in Nigeria’s Higher Institutions
Authors: Eldah Ephraim Buba
Abstract:
This paper evaluated the quality of tourism education in Nigeria higher education. The problem of poor quality of tourism education in Nigeria’s higher institutions prompted the study. Archival research was used with evaluation reports as secondary data, twenty evaluation reports for different polytechnics from the National board for technical education (NBTE) from 1995-2012 were assessed. The evidence from the documents shows that the quality of teaching and evaluation is fair. The programmes resources are fairly good, and most of the teachers do not have a postgraduate qualification in tourism related courses. It is therefore recommended that the institutions running tourism programmes in Nigeria need to introduce self -assessment of programmes and not rely on the NBTE accreditation which comes up in three years. Also there is need for a staff development policy that will encourage Tourism educators to further their education; The Tertiary Educational Trust Fund (TETFUND) should focus on developing staff of tourism education because it is an area of study in Nigeria that lacks qualified personnel. With the way higher institution in Nigeria are finding interest in tourism programmes, having good quality programmes will not only produce better professionals but it will help in offering better services in the industry and maximizing the impacts of the business.Keywords: education, evaluation, tourism quality, self-assessment
Procedia PDF Downloads 4495005 Perception of Greek Vowels by Arabic-Greek Bilinguals: An Experimental Study
Authors: Georgios P. Georgiou
Abstract:
Infants are able to discriminate a number of sound contrasts in most languages. However, this ability is not available in adults who might face difficulties in discriminating accurately second language sound contrasts as they filter second language speech through the phonological categories of their native language. For example, Spanish speakers often struggle to perceive the difference between the English /ε/ and /æ/ because both vowels do not exist in their native language; so they assimilate these vowels to the closest phonological category of their first language. The present study aims to uncover the perceptual patterns of Arabic adult speakers in regard to the vowels of their second language (Greek). Still, there is not any study that investigates the perception of Greek vowels by Arabic speakers and, thus, the present study would contribute to the enrichment of the literature with cross-linguistic research in new languages. To the purpose of the present study, 15 native speakers of Egyptian Arabic who permanently live in Cyprus and have adequate knowledge of Greek as a second language passed through vowel assimilation and vowel contrast discrimination tests (AXB) in their second language. The perceptual stimuli included non-sense words that contained vowels in both stressed and unstressed positions. The second language listeners’ patterns were analyzed through the Perceptual Assimilation Model which makes testable hypotheses about the assimilation of second language sounds to the speakers’ native phonological categories and the discrimination accuracy over second language sound contrasts. The results indicated that second language listeners assimilated pairs of Greek vowels in a single phonological category of their native language resulting in a Category Goodness difference assimilation type for the Greek stressed /i/-/e/ and the Greek stressed-unstressed /o/-/u/ vowel contrasts. On the contrary, the members of the Greek unstressed /i/-/e/ vowel contrast were assimilated to two different categories resulting in a Two Category assimilation type. Furthermore, they could discriminate the Greek stressed /i/-/e/ and the Greek stressed-unstressed /o/-/u/ contrasts only in a moderate degree while the Greek unstressed /i/-/e/ contrast could be discriminated in an excellent degree. Two main implications emerge from the results. First, there is a strong influence of the listeners’ native language on the perception of the second language vowels. In Egyptian Arabic, contiguous vowel categories such as [i]-[e] and [u]-[o] do not have phonemic difference but they are subject to allophonic variation; by contrast, the vowel contrasts /i/-/e/ and /o/-/u/ are phonemic in Greek. Second, the role of stress is significant for second language perception since stressed vs. unstressed vowel contrasts were perceived in a different manner by the Greek listeners.Keywords: Arabic, bilingual, Greek, vowel perception
Procedia PDF Downloads 1385004 Some Specialized Prosaic Arts of the Ancient Arabic Literature; An Introductory Analysis
Authors: Shams Ul Hussain Zaheer, Bakht Rahman, Shehla Shams, Bibi Alia
Abstract:
Arabic literature, from the very past, is divided into two basic parts: prose and poetry. It will not be wrong if it is said that this division of literature is found even in the era of ignorance (before-Islam). In this period, prose was given a kind of ignorance while poetry was given much significance since people showed deeper interest in its melodious impact while listening and singing as compared to prose writing. Because poetry was directly appealing to the emotions of the people, it was celebrated as universal genre and prose remained in a subordinate position due to its diction. Despite this attitude towards the genre of prose, some of the prosaic arts were orally transmitted from one generation to another during the era of ignorance. Later on, in the Omayyad and Abbasside periods, when literature was properly classified, this art was given its proper placement in the history. In this connection, there are three important aspects of this genre i.e. will, tales, and sacerdotal words. This paper traces the historical background of these categories and how they contributed to the modern understanding of literature in terms of its diction, themes, and kinds of prose writing. This is a descriptive and qualitative research which will add insight into the role these terms can play in understanding the thinking and inclination of people in the days of ignorance.Keywords: Arabic literature, era of ignorance, prose, special arts, analysis
Procedia PDF Downloads 925003 Evaluating Perceived Usability of ProxTalker App Using Arabic Standard Usability Scale: A Student's Perspective
Authors: S. AlBustan, B. AlGhannam
Abstract:
This oral presentation discusses a proposal for a study that evaluates the usability of an evidence based application named ProxTalker App. The significance of this study will inform administration and faculty staff at the Department of Communication Sciences Disorders (CDS), College of Life Sciences, Kuwait University whether the app is a suitable tool to use for CDS students. A case study will be used involving a sample of CDS students taking practicum and internship courses during the academic year 2018/2019. The study will follow a process used by previous study. The process of calculating SUS is well documented and will be followed. ProxTalker App is an alternative and augmentative tool that speech language pathologist (SLP) can use to customize boards for their clients. SLPs can customize different boards using this app for various activities. A board can be created by the SLP to improve and support receptive and expressive language. Using technology to support therapy can aid SLPs to integrate this ProxTalker App as part of their clients therapy. Supported tools, games and motivation are some advantages of incorporating apps during therapy sessions. A quantitative methodology will be used. It involves the utilization of a standard tool that was the was adapted to the Arabic language to accommodate native Arabic language users. The tool that will be utilized in this research is the Arabic Standard Usability Scale (A-SUS) questionnaire which is an adoption of System Usability Scale (SUS). Standard usability questionnaires are reliable, valid and their process is properly documented. This study builds upon the development of A-SUS, which is a psychometrically evaluated questionnaire that targets Arabic native speakers. Results of the usability will give preliminary indication of whether the ProxTalker App under investigation is appropriate to be integrated within the practicum and internship curriculum of CDS. The results of this study will inform the CDS department of this specific app is an appropriate tool to be used for our specific students within our environment because usability depends on the product, environment, and users.Keywords: A-SUS, communication disorders practicum, evidence based app, Standard Usability Scale
Procedia PDF Downloads 1545002 Unified Theory of the Security Dilemma: Geography, MAD and Democracy
Authors: Arash Heydarian Pashakhanlou
Abstract:
The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence
Procedia PDF Downloads 2385001 Acoustic Characteristics of Ḫijaiyaḫ Letters Pronunciation by Indonesian Native Speaker
Authors: Romi Hardiyansyah, Raden Sugeng Joko Sarwono, Agus Samsi
Abstract:
Indonesian people have a mother language but not Arabic. Meanwhile, they must be able to pronounce the Arabic because Islam is the biggest religion in Indonesia. Arabic is composed by ḫijaiyaḫ letters which has its own pronunciation. Sound production process in humans can be divided into three physiological processes, namely: the formation of airflow from the lungs, the change in airflow from the lungs into the sound, and articulation (the modulation/sound setting into a specific sound). Ḫijaiyaḫ letters has its own articulation, some of which seem strange for most people in Indonesia. Those letters come out from the middle and upper throat so that the letters has its own acoustic characteristics. Acoustic characteristics of voice can be observed by source-filter approach that has parameters: pitch, formant, and formant bandwidth. Pitch is the basic tone in every human being. Formant is the resonance frequency of the human voice. Formant bandwidth is the time-width of a formant. After recording the sound from 21 subjects, data is processed by software Praat version 5.3.39. The analysis showed that each pronunciation, syakal (vowel changer), and the place of discharge letters has the same timbre which are determined by third and fourth formant.Keywords: ḫijaiyaḫ, articulation, pitch, formant, formant bandwidth, timbre
Procedia PDF Downloads 3965000 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 1914999 Effect of Sustainability Accounting Disclosure on Financial Performance of Listed Brewery Firms in Nigeria
Authors: Patricia Chinyere Oranefo
Abstract:
This study examined the effect of sustainability accounting disclosure on financial performance of listed Brewery firms in Nigeria. The dearth of empirical evidence and literature on “governance disclosure” as one of the explanatory variables of sustainability accounting reporting were the major motivation for this study. The main objective was to ascertain the effect of sustainability accounting disclosure on financial performance of listed Brewery firms in Nigeria. An ex–post facto research design approach was adopted for the study. The population of this study comprises of five (5) Brewery firms quoted on the floor of the Nigeria exchange group (NSX) and the sample size of four (4) listed firms was drawn using purposive sampling method. Secondary data were carefully sourced from the financial statement/annual reports and sustainability reports from 2012 to 2021 of the Brewery firms quoted on the Nigeria exchange group (NSX). Panel regression analysis by aid of E-views 10.0 software was used to test for statistical significance of the effect of sustainability accounting disclosure on financial performance of listed Brewery firms in Nigeria. The results showed that economic sustainability disclosure indexes do not significantly affect return on asset of listed Brewery firms in Nigeria. The findings further revealed that environmental sustainability disclosure indexes do not significantly affect return on equity of listed Brewery firms in Nigeria. More so, results showed that Social Sustainability disclosure indexes significantly affect Net Profit Margin of listed Brewery firms in Nigeria. Finally, the result established also that governance sustainability disclosure indexes do not significantly affect Earnings per share of listed Brewery firms in Nigeria. Consequent upon the findings, this study recommended among others; that managers of Brewers in Nigeria should improve and sustain full disclosure practices on economic, environmental, social and governance disclosures following the guidelines of the Global Reporting Index (GRI) as they are capable of exerting significant effect on financial performance of firms in Nigeria.Keywords: sustainability, accounting, disclosure, financial performance
Procedia PDF Downloads 594998 Policy Implications of Cashless Banking on Nigeria’s Economy
Authors: Oluwabiyi Adeola Ayodele
Abstract:
This study analysed the Policy and general issues that have arisen over time in Nigeria’ Cashless banking environment as a result of the lack of a Legal framework on Electronic banking in Nigeria. It undertook an in-depth study of the cashless banking system. It discussed the evolution, growth and development of cashless banking in Nigeria; It revealed the expected benefits of the cashless banking system; It appraised regulatory issues and other prevalent problems on cashless banking in Nigeria; and made appropriate recommendations where necessary. The study relied on primary and secondary sources of information. The primary sources included the Constitution of the Federal Republic of Nigeria, Statutes, Conventions and Judicial decisions, while the secondary sources included Books, Journals Articles, Newspapers and Internet Materials. The study revealed that cashless banking has been adopted in Nigeria but still at the developing stage. It revealed that there is no law for the regulation of cashless banking in Nigeria, what Nigeria relies on for regulation is the Central Bank of Nigeria’s Cashless Policy, 2014. The Banks and Other Financial Institutions Act Chapter B3, LFN, 2004 of Nigeria lack provision to accommodate issues on Internet banking. However, under the general principles of legality in criminal law, and by the provisions of the Nigerian Constitution, a person can only be punished for conducts that have been defined to be criminal by written laws with the penalties specifically stated in the law. Although Nigeria has potent laws for the regulation of paper banking, these laws cannot be substituted for paperless transactions. This is because the issues involved in both transactions vary. The study also revealed that the absence of law in the cashless banking environment in Nigeria will subject consumers to endless risks. This study revealed that the creation of banking markets via the Internet relies on both available technologies and appropriate laws and regulations. It revealed however that Law of some of the countries considered on cashless banking has taken care of most of the legal issues and other problems prevalent in the cashless banking environment. The study also revealed some other problems prevalent in the Nigerian cashless banking environment. The study concluded that for Nigeria to find solutions to the legal issues raised in its cashless banking environment and other problems of cashless banking, it should have a viable legal Frame work for internet banking. The study concluded that the Central Bank of Nigeria’s Policy on Cashless banking is not potent enough to tackle the challenges posed to cashless banking in Nigeria because policies only have a persuasive effect and not a binding effect. There is, therefore, a need for appropriate Laws for the regulation of cashless Banking in Nigeria. The study also concluded that there is a need to create more awareness of the system among Nigerians and solve infrastructural problems like prevalent power outage which often have been creating internet network problem.Keywords: cashless-banking, Nigeria, policies, laws
Procedia PDF Downloads 4894997 Impact of Microfinance in Promoting Rural Economic Growth in Nigeria
Authors: Udeh Anastasia Ifeoma
Abstract:
The need to develop the rural areas in developing countries where there have been decades of neglect are on the increase. It is against this background that this paper examined the impact of micro finance contribution to Nigeria’s gross domestic product. Time series data for 12-years period 1999-2010 were collated from Central Bank of Nigeria published annual reports. The least squares (LS) regression was used to analyze the data. The result revealed that microfinance activities have negative and non-significant contribution to gross domestic product in Nigeria. The paper recommends that rural poverty is often a product of poor infrastructural facilities; therefore government should make a conscious effort towards industrializing the rural areas thereby motivating the micro finance institutions to locate their offices and extend credit facilities to rural areas thereby improving rural economic growth.Keywords: microfinance, rural economic growth, Nigeria, developing countries
Procedia PDF Downloads 4514996 An Investigation of Entrepreneurial Intentions, Drivers, and Challenges among Final Year Students in Jigawa State Polytechnic, Nigeria
Authors: Muhammad Umar Usman
Abstract:
This study investigates the entrepreneurial intentions, drivers and challenges of starting a business among final year students in Jigawa State polytechnic. Nigeria. Final year students of Jigawa State Polytechnic from the department of accounting, business administration and management and public administration were used as a case study. The study became necessary due to the alarming rate of graduate unemployment in Nigeria. The study adopted a holistic case study approach involving a multiple methods of questionnaires involving (182) Higher National Diploma (HND) and National Diploma (ND) final year students and a telephone interview with two lecturers teaching entrepreneurship in the college. The findings clearly indicate that exposer to entrepreneurship education increases students’ entrepreneurial intentions. The result found that desire for independence, confidence and strong intention are the most important factors that influence students’ entrepreneurial intention. The study identified 3 key drivers of students’ entrepreneurial intentions. These are to earn a living, to seek job security and provision of employment. The result again identified 4 factors namely lack of support, finance, insecurity and erratic power supply as the major challenges in starting a business in Nigeria. It was also revealed that the current entrepreneurship education programme prepares students on how to open up a business not becoming an entrepreneur. The study concluded entrepreneurship helps students toward building and driving their intention to venture into business. However, the challenges of entrepreneurship in Nigeria need to be addressed in order to enable individuals to become an entrepreneur and create employment opportunities that will lead to the development of Nigerian economy. Thus, the government should provide adequate support particularly the issue of infrastructures. The Federal Government of Nigeria in collaboration with the National Board for Technical Education should fashion out the curriculum thereby making it more practically-oriented so that students may become more interested. Polytechnics should develop an internship programme for students to work in firms so as to put theory learnt in the class to practice. Students should try to align the theory learnt in college with the practical application in dynamic economic environment. Hence, this will help in building their capabilities toward entrepreneurship development in Nigeria.Keywords: entrepreneurial intention, entrepreneurial drivers, challenges, entrepreneurial education
Procedia PDF Downloads 2994995 Rural Water Management Strategies and Irrigation Techniques for Sustainability. Nigeria Case Study; Kwara State
Authors: Faith Eweluegim Enahoro-Ofagbe
Abstract:
Water is essential for sustaining life. As a limited resource, effective water management is vital. Water scarcity has become more common due to the effects of climate change, land degradation, deforestation, and population growth, especially in rural communities, which are more susceptible to water-related issues such as water shortage, water-borne disease, et c., due to the unsuccessful implementation of water policies and projects in Nigeria. Since rural communities generate the majority of agricultural products, they significantly impact on water management for sustainability. The development of methods to advance this goal for residential and agricultural usage in the present and the future is a challenge for rural residents. This study evaluated rural water supply systems and irrigation management techniques to conserve water in Kwara State, North-Central Nigeria. Suggesting some measures to conserve water resources for sustainability, off-season farming, and socioeconomic security that will remedy water degradation, unemployment which is one of the causes of insecurity in the country, by considering the use of fabricated or locally made irrigation equipment, which are affordable by rural farmers, among other recommendations. Questionnaires were distributed to respondents in the study area for quantitative evaluation of irrigation methods practices. For physicochemical investigation, samples were also gathered from their available water sources. According to the study's findings, 30 percent of farmers adopted intelligent irrigation management techniques to conserve water resources, saving 45% of the water previously used for irrigation. 70 % of farmers practice seasonal farming. Irrigation water is drawn from river channels, streams, and unlined and unprotected wells. 60% of these rural residents rely on private boreholes for their water needs, while 40% rely on government-supplied rural water. Therefore, the government must develop additional water projects, raise awareness, and offer irrigation techniques that are simple to adapt for water management, increasing socio-economic productivity, security, and water sustainability.Keywords: water resource management, sustainability, irrigation, rural water management, irrigation management technique
Procedia PDF Downloads 1114994 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks
Authors: Rossouw De Bruin, Sebastiaan H. Von Solms
Abstract:
The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model
Procedia PDF Downloads 2674993 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses
Authors: Malaw Ndiaye, Karim Konate
Abstract:
Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security
Procedia PDF Downloads 1684992 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)
Authors: Serkan Tezgel
Abstract:
The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.Keywords: security, cooperation, asymmetrical, area denial
Procedia PDF Downloads 8034991 The Validation and Reliability of the Arabic Effort-Reward Imbalance Model Questionnaire: A Cross-Sectional Study among University Students in Jordan
Authors: Mahmoud M. AbuAlSamen, Tamam El-Elimat
Abstract:
Amid the economic crisis in Jordan, the Jordanian government has opted for a knowledge economy where education is promoted as a mean for economic development. University education usually comes at the expense of study-related stress that may adversely impact the health of students. Since stress is a latent variable that is difficult to measure, a valid tool should be used in doing so. The effort-reward imbalance (ERI) is a model used as a measurement tool for occupational stress. The model was built on the notion of reciprocity, which relates ‘effort’ to ‘reward’ through the mediating ‘over-commitment’. Reciprocity assumes equilibrium between both effort and reward, where ‘high’ effort is adequately compensated with ‘high’ reward. When this equilibrium is violated (i.e., high effort with low reward), this may elicit negative emotions and stress, which have been correlated to adverse health conditions. The theory of ERI was established in many different parts of the world, and associations with chronic diseases and the health of workers were explored at length. While much of the effort-reward imbalance was investigated in work conditions, there has been a growing interest in understanding the validity of the ERI model when applied to other social settings such as schools and universities. The ERI questionnaire was developed in Arabic recently to measure ERI among high school teachers. However, little information is available on the validity of the ERI questionnaire in university students. A cross-sectional study was conducted on 833 students in Jordan to measure the validity and reliability of the ERI questionnaire in Arabic among university students. Reliability, as measured by Cronbach’s alpha of the effort, reward, and overcommitment scales, was 0.73, 0.76, and 0.69, respectively, suggesting satisfactory reliability. The factorial structure was explored using principal axis factoring. The results fitted a five-solution model where both the effort and overcommitment were uni-dimensional while the reward scale was three-dimensional with its factors, namely being ‘support’, ‘esteem’, and ‘security’. The solution explained 56% of the variance in the data. The established ERI theory was replicated with excellent validity in this study. The effort-reward ratio in university students was 1.19, which suggests a slight degree of failed reciprocity. The study also investigated the association of effort, reward, overcommitment, and ERI with participants’ demographic factors and self-reported health. ERI was found to be significantly associated with absenteeism (p < 0.0001), past history of failed courses (p=0.03), and poor academic performance (p < 0.001). Moreover, ERI was found to be associated with poor self-reported health among university students (p=0.01). In conclusion, the Arabic ERI questionnaire is reliable and valid for use in measuring effort-reward imbalance in university students in Jordan. The results of this research are important in informing higher education policy in Jordan.Keywords: effort-reward imbalance, factor analysis, validity, self-reported health
Procedia PDF Downloads 1164990 Women and Terrorism in Nigeria: Policy Templates for Addressing Complex Challenges in a Changing Democratic State
Authors: Godiya Pius Atsiya
Abstract:
One of the most devastating impacts of terrorism on the Nigerian state is the danger it has posed on women, children and other vulnerable groups. The complexity of terrorism in Nigeria, especially in most parts of Northern Nigeria has entrenched unprecedented security challenges such as refugee crisis, kidnapping, food shortages, increase in death tolls, malnutrition, fear, rape and several other psychological factors. Of particular interest in this paper as it relates to terrorism is the high rate of Internally Displaced Persons(IDPs), with women, children and the aged being the most affected. Empirical evidence arising from recent development in Nigeria’s North-East geo-political zone shows that large numbers of refugees fleeing the Boko Haram attacks have doubled. The attendant consequences of this mass exodus of people in the affected areas are that the victims now suffer untold and unwarranted economic hardship. In another dimension, recent findings have it that most powerless women and young teenage girls have been forcefully conscripted into the Islamic extremist groups and used as shields. In some respect, these groups of people have been used as available tools for suicide bombing and other criminal tendencies, the result of which can be detrimental to social cohesion and integration. This work is a theoretical insight into terrorism discourses; hence, the paper relies on existing works of scholars in carrying out the research. The paper argues that the implications of terrorism on women gender have grounding effects on the moral psyche of women who are supposed to be home managers and custodians of morality in society. The burden of terrorism and all it tends to propagate has literally upturned social lives and hence, Nigeria is gradually being plunged into the Hobesian state of nature. As a panacea to resolving this social malaise, the paper submits that government and indeed, all stakeholders in the nation’s democratic project must expedite action to nip this trend in the bud. The paper sums up with conclusion and other alternative policy measures to mitigate the challenges of terrorism in Nigeria.Keywords: changing democratic state, policy measures, terrorism, women
Procedia PDF Downloads 2314989 Multi-Level Security Measures in Cloud Computing
Authors: Shobha G. Ranjan
Abstract:
Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.Keywords: cloud computing, cloud security, integrity, multi-tenancy, security
Procedia PDF Downloads 5014988 Turbulent Election History: An Appraisal of Triggering Issues in Nigeria
Authors: Olajumoke Tolulope Esan, Odunayo Stephen Faluse
Abstract:
Nigeria’s electoral politics from independence has been tumultuous. Violence has continued to damage the conduct of almost all general elections in Nigeria, Thereby making free and fair elections an event that seems to be unachievable in the history of the nation’s politics. Apparently, electoral violence has subjected the Nation into stereotyped electoral procedures that are always dictated through powerful political Godfathers. However, the shameful act of riotous and tumultuous election processes has led to a political, national instability festering irregularities that manifest at different stages of the election, thus subjecting almost all elections carried out in Nigeria below the minimum democracy standard. Hence the fact that an average Nigerian is being deprived of his or her individual electoral rights should be enough to attract Global political interventions from the western world as Nigeria is part of the commonwealth countries and every Nigerians have the right to demand for posterity to be ensured by protecting individual rightful votes. Basically for elections to be termed democratic, it must be free and fair. In view of this, A deep understanding of this paper is a reflection on the tides of electoral violence and the alarming precipitating factors that make free and fair election almost unreachable in Nigeria.Keywords: democracy, election, electoral violence, political violence
Procedia PDF Downloads 4244987 Adding Security Blocks to the DevOps Lifecycle
Authors: Andrew John Zeller, Francis Pouatcha
Abstract:
Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.Keywords: information security, data security, cybersecurity, devOps, IT management
Procedia PDF Downloads 1154986 The Effect of Region of Residence on Fertility in Nigeria
Authors: Motlatso Rampedi
Abstract:
Nigeria has the fifth highest Total Fertility Rate in Sub-Saharan Africa at 5.5 children born to a woman. Some demographic research has found that there is an association between region of residence and fertility in Nigeria, with the Northern regions pertaining to high fertility and the Southern regions pertaining to low fertility levels. Even so, little attention has been given to understanding the effect of region of residence on fertility. Instead, a significant amount of research has been conducted on exploring the proximate determinants of fertility in Nigeria. The objective of this study was to test whether there is an association between region of residence and fertility in Nigeria. Using a sample size of 38 948 women aged 15-49 derived from the 2013 NDHS and the Poisson regression model for analysis, the study has found that region of residence has a significant effect on fertility. Moreover, the ANOVA test has shown that there is a socioeconomic disparity by region of residence in Nigeria. The Northern regions of Nigeria have shown to have higher levels of fertility as compared to the Southern regions. Therefore, while proximate determinants of fertility and socio-demographic characteristics of women are important, region of residence remains one of the fundamental determinants of fertility. Given these findings, it is recommended that government should not exhaust its resources or focus its fertility reduction policies and programmes at entire populations but target specific regions where fertility is most prevalent.Keywords: high fertility, region, socioeconomic disparity, socio-demographic characteristics
Procedia PDF Downloads 3084985 The Voiceless Dental- Alveolar Common Augment in Arabic and Other Semitic Languages, a Morphophonemic Comparison
Authors: Tarek Soliman Mostafa Soliman Al-Nana'i
Abstract:
There are non-steady voiced augments in the Semitic languages, and in the morphological and structural augmentation, two sounds were augments in all Semitic languages at the level of the spoken language and two letters at the level of the written language, which are the hamza and the ta’. This research studies only the second of them; Therefore, we defined it as “The Voiceless Dental- alveolar common augment” (VDACA) to distinguish it from the glottal sound “Hamza”, first, middle, or last, in a noun or in a verb, in Arabic and its equivalent in the Semitic languages. What is meant by “VDACA” is the ta’ that is in addition to the root of the word at the morphological level: the word “voiceless” takes out the voiced sounds that we studied before, and the “dental- alveolar common augment” takes out the laryngeal sound of them, which is the “Hamza”: and the word “common” brings out the uncommon voiceless sounds, which are sīn, shīn, and hā’. The study is limited to the ta' alone among the Arabic sounds, and this title faced a problem in identifying it with the ta'. Because the designation of the ta is not the same in most Semitic languages. Hebrew, for example, has “tav” and is pronounced with the voiced fa (v), which is not in Arabic. It is called different names in other Semitic languages, such as “taw” or “tAu” in old Syriac. And so on. This goes hand in hand with the insistence on distance from the written level and the reference to the phonetic aspect in this study that is closely and closely linked to the morphological level. Therefore, the study is “morphophonemic”. What is meant by Semitic languages in this study are the following: Akkadian, Ugaritic, Hebrew, Syriac, Mandaean, Ge'ez, and Amharic. The problem of the study is the agreement or difference between these languages in the position of that augment, first, middle, or last. And in determining the distinguishing characteristics of each language from the other. As for the study methodology, it is determined by the comparative approach in Semitic languages, which is based on the descriptive approach for each language. The study is divided into an introduction, four sections, and a conclusion: Introduction: It included the subject of the study, its importance, motives, problem, methodology, and division. The first section: VDACA as a non-common phoneme. The second: VDACA as a common phoneme. The third: VDACA as a functional morpheme. The fourth section: Commentary and conclusion with the most important results. The positions of VDACA in Arabic and other Semitic languages, and in nouns and verbs, were limited to first, middle, and last. The research identified the individual addition, which is common with other augments, and the research proved that this augmentation is constant in all Semitic languages, but there are characteristics that distinguish each language from the other.Keywords: voiceless -, dental- alveolar, augment, Arabic - semitic languages
Procedia PDF Downloads 734984 Democracy and Human Rights in Nigeria's Fourth Republic: An Assessment
Authors: Kayode Julius Oni
Abstract:
Without mincing words, democracy is by far the most popular form of government in the world today. No matter how we look at it, and regardless of the variant, most leaders in the world today wish to be seen or labeled as Democrats. Perhaps, its attractions in terms of freedom of allocation, accountability, smooth successions of leadership and a lot more, account for its appeal to the ordinary people. The governance style in Nigeria since 1999 cannot be said to be different from the military. Elections are manipulated, judicial processes abused, and the ordinary people do not have access to the dividends of democracy. The paper seeks to address the existing failures experienced under democratic rule in Nigeria which have to transcend into violation of human rights in the conduct of government business. The paper employs the primary and secondary sources of data collection, and it is highly descriptive and critical.Keywords: democracy, human rights, Nigeria, politics, republic
Procedia PDF Downloads 2604983 Direct Democracy: The Best Administrative System for Nigeria
Authors: Inuwa Abdu Ibrahim
Abstract:
The research assessed representative democracy as an administrative system in Nigeria, by highlighting the failure of the state. It also looked at some components of direct democracy in Switzerland. Therefore, the paper focused on direct democracy, using secondary sources of data. In conclusion, the research offers direct democracy as a solution to the failure of the Nigerian administrative system especially as it affects participation, developmental programmes and institutionalized corruption.Keywords: corruption, direct democracy, national development, Nigeria, participation
Procedia PDF Downloads 4784982 Analyse of User Interface Design in Mobile Teaching Apps
Authors: Asma Ashoul
Abstract:
Nowadays, smartphones are playing a major role in our lives, by communicating with family, friends or using them to learn different things in life. Using smartphones to learn and teach today is something common to see in places like schools or colleges. Therefore, thinking about developing an app that teaches Arabic language may help some categories in society to learn a second language. For example, kids under the age of five or older would learn fast by using smartphones. The problem is based on the Arabic language, which is most like to be not used anymore. The developer assumed to develop an app that would help the younger generation on their learning the Arabic language. A research was completed about user interface design to help the developer choose appropriate layouts and designs. Developing the artefact contained different stages. First, analyzing the requirements with the client, which is needed to be developed. Secondly, designing the user interface design based on the literature review. Thirdly, developing and testing the application after it is completed contacting all the tools that have been used. Lastly, evaluation and future recommendation, which contained the overall view about the application followed by the client’s feedback. Gathering the requirements after having client meetings based on the interface design. The project was done following an agile development methodology. Therefore, this methodology helped the developer to manage to finish the work on time.Keywords: developer, application, interface design, layout, Agile, client
Procedia PDF Downloads 1154981 The Role of the Youth in Rebranding Nigeria
Authors: Hamzah Kamil Adeyemi, Oyesikun Abayomi Nathaniel
Abstract:
The plural nature of Nigeria state has created a leadership gap in the 21st century. The leadership problem encapsulated socio-economic system has called for a reorientation in youth to channel a programme that will redeem the image (OT) the country among the committee of nations and chart a way forward in bailing the country out of bad governance unemployment corruption and other anti-development policies. The touth need to raise up to the challenges of nation building. This study engaged theoretical analysis, both written records was used to add value to its quality and recommendation was made with conclusion.Keywords: youth, education, unempolyment, rebranding, Nigeria
Procedia PDF Downloads 4274980 Renewable Energy and Energy Security in Malaysia: A Quantitative Analysis
Authors: Endang Jati Mat Sahid, Hussain Ali Bekhet
Abstract:
Robust economic growth, increasing population, and personal consumption are the main drivers for the rapid increase of energy demand in Malaysia. Increasing demand has compounded the issue of national energy security due to over-dependence on fossil fuel, depleting indigenous domestic conventional energy resources which in turns has increased the country’s energy import dependence. In order to improve its energy security, Malaysia has seriously embarked on a renewable energy journey. Many initiatives on renewable energy have been introduced in the past decade. These strategies have resulted in the exploding growth of renewable energy deployment in Malaysia. Therefore, this study investigated the impact of renewable energy deployment on energy security. Secondary data was used to calculate the energy security indicators. The study also compared the results of applying different energy security indicators namely availability, applicability, affordability and acceptability dimension of energy resources. The evaluation shows that Malaysia will experience slight improvement in availability and acceptability dimension of energy security. This study suggests that energy security level could be further enhanced by efficient utilization of energy, reducing carbon content of energy and facilitating low-carbon industries.Keywords: energy policy, energy security, Malaysia, renewable energy
Procedia PDF Downloads 244