Search results for: public attitudes security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9195

Search results for: public attitudes security

8835 Addressing Urban Security Challenges in Nigeria through Neighborhood Renewal: A Reflection of Mokola World Bank Slum Upgrading Pilot Project

Authors: Tabiti S. Tabiti, A. M. Jinadu, Daramola Japheth

Abstract:

Urban insecurity is among the challenges militating against sustainable urban governance; in the first place it distorts the peace of urban areas making them unsafe. On the other hand it hinders the effective performance of urban functions. Urban security challenges manifest in different forms such as, street violence, theft and robbery, accidents of different types kidnapping, killings etc.. Efforts to address urban security challenges in Nigeria have been concentrated in legislative, law enforcement and the use of community vigilante groups. However in this study, the place of physical planning strategy through effective neighbourhood renewal as practiced in Mokola is presented as an effective complementary approach for addressing urban insecurity. On this backdrop, the paper recommends the need for gradual rehabilitation of urban slum neighborhoods by the state government in collaboration with World Bank and other development financiers. The local governments should be made autonomy in Nigeria so as to make them more responsible to the people. Other recommendations suggested in the paper include creating enabling environment that will promote economic empowerment and public enlightment on personal and community sanitation. It is certain that if these recommendations are adopted the challenge of urban insecurity will reduce significantly in Nigerian cities.

Keywords: neighbourhood renewal, pilot project, slum upgrading, urban security

Procedia PDF Downloads 428
8834 Code Switching and Language Attitudes of Two 10-11 Years Old Bilingual Child

Authors: Kristiina Teiss

Abstract:

Estonians and children having Estonian as a one of their languages have lately become the fastest growing minority or bilingual group in Finland which underlines the importance of studying this target group. The acquisition of bilingualism by an infant is affected by many different issues like the child’s personal traits, language differences, and different environmental factors such as people´s attitudes towards languages and bilingualism. In the early years the most important factor is the children’s interaction with their parents and siblings. This poster gives an overview to the material and some preliminary findings of ongoing PhD study concerning code-mixing, code-switching and language attitudes of two bilingual 10-11 year old children. Data was collected from two different bilingual families, one of them living in Tampere, Finland and one of them moved during the study to Tallinn, Estonia. The data includes audio recordings of the families’ interactions with their children when they were aged 2-3 years old and then when they were 10-11 years old. The data also includes recorded semi-structured queries of the parents, as well as recorded semi-structured queries of the children when they were in the age of 10-11 years. The features of code-mixing can vary depending on norms or models in the families, or even according to its use by two parents in same family. The practices studied in the ongoing longitudinal case study, based on a framework of ethnography, contain parental conversational strategies and family attitudes as well as CS (code-switching and code-mixing) cases occurring both in children and adult language. The aim of this paper is to find out whether there is a connection between children’s attitudes and their daily language use. It would be also interesting to find some evidence, as to whether living in different countries has different impacts on using two languages. The results of dissertation maid give some directional suggestions on how language maintenance of Estonian-Finnish bilinguals could be supported, although generalizations on the base of case study could not be done.

Keywords: code switching, Estonian, Finnish, language attitudes

Procedia PDF Downloads 356
8833 Knowledge, Attitudes and Practices of Female Students regarding Emergency Contraception at Midlands State University, Zimbabwe

Authors: P. Mambanga, T. G. Tshitangano, H. Akinsola

Abstract:

Background: Unintended pregnancies constitute a most serious public health challenge to women to an extent that they sometimes end in illegal abortions resulting in adverse consequences. However, the introduction of emergency contraception has served as the last chance for women to avoid unintended pregnancies, though, in countries like Zimbabwe the cause for underutilisation of emergency contraception has been hardly investigated. Purpose: The main purpose of this study was to assess the knowledge, attitude and practice of female students regarding emergency contraception among in preventing unintended pregnancy. Methodology: A quantitative approach using descriptive cross-sectional survey design was conducted among 319 stratified random sampled female university students of Midland State University, Zimbabwe. Self-administered close-ended questionnaire was used to collect the data. To ensure validity, the development of the instrument was guided by a wide range of literature and the inputs of experts. The instrument was retested for reliability and the responses will be comparing using Cronbach’s alpha which yielded high reliability alpha (α) value of 0.84. Data was coded and entered into a computer using Microsoft Excel 2010 and analysed using Statistical Package for Social Scientists (SPSS) version 22.0. Descriptive statistics were used to analyse data in the form of cross tabulation and the results were presented in table, graphs and pie charts. Results: The results indicated that apart from all sources of information about EC, mass media has shown to be the most famous. Although female students knows about EC, the knowledge about effective level and correct use of EC poor. The attitudes of female students at MSU are unfavourable for EC as they gave reasons like EC promotes promiscuity and it can pose risk. The practice of EC at MSU is low with only 47% of respondents said they have once use EC. Conclusion and recommendation: The study concluded the lack of actual knowledge about EC which has directly influenced attitudes and practices. The study concluded that there MSU female students has fair knowledge about EC which has resulted in negative and attitudes towards EC with few EC practices. The study, therefore, recommends the adoption and use of Health Belief Model approach in promoting the young to use EC to prevent unwanted pregnancies.

Keywords: emergency contraception, knowledge, attitude, practice, female students

Procedia PDF Downloads 224
8832 Inclusive Business and Its Contribution to Farmers Wellbeing in Arsi Ethiopia: Empirical Evidence

Authors: Senait G. Worku, Ellen Mangnus

Abstract:

Inclusive business models which integrates low-income people with companies value chain in a commercially viable way has gained momentum for the perceived potential to contribute to poverty alleviation and food security in developing countries. This article investigates the impact of Community Revenue Enhancement through Technology Extension (CREATE) project of Heineken brewery on smallholder farmers’ wellbeing in Arsi zone Oromia regional state of Ethiopia. CREATE is a Public-Private Partnership (PPP) between Ministry of Foreign Affairs of the Netherlands and Heineken N.V. which source malt barely from smallholder farmers in three zones of Oromia. The study assessed the impact of CREATE on malt barley productivity, food security and new asset purchase in Arsi zone by comparing households that participate in the project with non-participating households using propensity score matching method. The finding indicated that households that participated in the CREATE project had higher malt barley productivity and purchased more new assets than non-participating households. However, there is no significant difference on food security status of participating and non-participating households indicating that the project has a profound impact on asset accumulation than on food security improvement.

Keywords: inclusive business, malt barley, propensity score matching, wellbeing

Procedia PDF Downloads 140
8831 Analyzing Social Media Discourses of Domestic Violence in Promoting Awareness and Support Seeking: An Exploratory Study

Authors: Sudha Subramani, Hua Wang

Abstract:

Domestic Violence (DV) against women is now recognized to be a serious and widespread problem worldwide. There is a growing concern that violence against women has a global public health impact, as well as a violation of human rights. From the existing statistical surveys, it is revealed that there exists a strong relationship between DV and health issues of women like bruising, lacerations, depression, anxiety, flashbacks, sleep disturbances, hyper-arousal, emotional distress, sexually transmitted diseases and so on. This social problem is still considered as behind the closed doors issue and stigmatized topic. Women conceal their sufferings from family and friends, as they experience a lack of trust in others, feelings of shame and embarrassment among the society. Hence, women survivors of DV experience some barriers in seeking the support of specialized services such as health care access, crisis support, and legal guidance. Fortunately, with the popularity of social media like Facebook and Twitter, people share their opinions and emotional feelings to seek the social and emotional support, for sympathetic encouragement, to show compassion and empathy among the public. Considering the DV, social media plays a predominant role in creating the awareness and promoting the support services to the public, as we live in the golden era of social media. The various professional people like the public health researchers, clinicians, psychologists, social workers, national family health organizations, lawyers, and victims or their family and friends share the unprecedentedly valuable information (personal opinions and experiences) in a single platform to improve the social welfare of the community. Though each tweet or post contains a less informational value, the consolidation of millions of messages can generate actionable knowledge and provide valuable insights about the public opinion in general. Hence, this paper reports on an exploratory analysis of the effectiveness of social media for unobtrusive assessment of attitudes and awareness towards DV. In this paper, mixed methods such as qualitative analysis and text mining approaches are used to understand the social media disclosures of DV through the lenses of opinion sharing, anonymity, and support seeking. The results of this study could be helpful to avoid the cost of wide scale surveys, while still maintaining appropriate research conditions is to leverage the abundance of data publicly available on the web. Also, this analysis with data enrichment and consolidation would be useful in assisting advocacy and national family health organizations to provide information about resources and support, raise awareness and counter common stigmatizing attitudes about DV.

Keywords: domestic violence, social media, social stigma and support, women health

Procedia PDF Downloads 271
8830 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 85
8829 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 316
8828 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 390
8827 Implementing Community Policing in Nigeria: Problems and Prospects

Authors: Mohammed Jamilu Haruna, Kawu Adamu Sule

Abstract:

This paper examines the evolution of modern policing in Nigeria to the present day, with a focus on the newly introduced community policing, which seeks to cement the operational vacuum created by the repressive and oppressive approach of the Nigeria Police Force (NPF), which renders the police incapable of addressing the twin problems of crime and disorder. Thus, the primary purpose for the implementation of community policing was to use it as a mechanism for building the lost trust between the police and the public, perhaps due to the long history of antagonistic and repressive relationships between them. If properly implemented, community policing has the prospect of empowering Nigerian citizens with the skills to protect themselves against invaders of their private security so that crimes can be prevented before anyone is victimized. Other prospects include, but are not limited to, (i) a favorable public view of the police, (ii) building of mutual trust, (iii) increased information flow through effective communication between the police and the public, and above all, (iv) increased police accountability. Unfortunately, problems such as aged suspicious and distrustful relationships, inadequate funding, poor training of officers, poor monitoring and evaluation of the community policing project, lack of public awareness of the benefits of the program, and sabotage by some of the personnel of the police who benefits from the status quo, were some of the reasons that troubled the implementation of community policing.

Keywords: community, policing, problems, prospects, problem solving

Procedia PDF Downloads 55
8826 Environmental Refugees in Africa: A Case Study of Sahel Region

Authors: Ahlem Setrallah

Abstract:

Environment has become a phenomenon directly linked to security in recent decades. This security aspect of environment is justified by the challenges that environment problems can have on human life and thus security especially within the scope of human security that is based mainly on the individual rather than on the state. Because Africa is not safe from the global warming and all its consequences on environment, this continent has witnessed many crises related to environment and that have had direct impact on security in Africa. One of those crises is environmental displacement or immigration which was caused by natural disasters like draught, desertification and food shortage to name but a few. This paper aims at shedding light at some important cases in the Africa focusing mainly on the Sahel region. The main research questions that we are trying to answer are the following: 1-What is the relationship between environment and forced immigration in the Sahel region? 2-What is the impact of environmental immigration on Security in the region? 3-How have the states in this region reacted to this crisis? 4-Is the measures taken by those states adequate or not? 5- How to remedy for the limitations of those measures? The paper is based on case study methodology as a way to better understand the relationship between security and environment using library research for data collection and analysis. This paper aims also at presenting some suggesting regarding possible ways of reducing the negative impact of environmental immigration.

Keywords: environment, refugees, Sahel region, security

Procedia PDF Downloads 453
8825 Feeling, Thinking, Acting: The Role of Subjective Social Class and Social Class Identity on Emotions, Attitudes and Prosocial Behavior Towards Muslim Immigrants in Belgium

Authors: Theresa Zagers, Rita Guerra

Abstract:

Most research investigating how receiving communities perceive, and experience migration has overlooked the potential role of subjective social class and social class identity in positive intergroup relations and social cohesion of migrants and host societies. The present study aimed to provide insights to understand this relationship and focused on three important features: prosocial behaviour, attitudes and emotions towards Muslim immigrants in Flanders, Belgium. Building on relative deprivation-gratification theory we examined the indirect relationships of subjective social class on prosocial behaviour/intentions, attitudes and emotions via relative deprivation (RD), as well as the moderator role of the importance of social class identity. 431 Belgian participants participated in an online survey study. Overall, our results supported the predicted indirect effect of subjective social class: the lower the subjective social class, the higher the perceptions of relative deprivation, which in turn is related to less prosocial behaviour intentions, and more negative attitudes and emotions towards immigrants. This indirect effect was, however, not moderated by the importance of social class identity. Interestingly, the direct effects of subjective social class showed a different pattern: when bypassing deprivation our results showed higher subjective social class was detrimental for intergroup relations (more negative attitudes and emotions), and that lower subjective social class was positively related to prosocial intentions for those identifying highly with their class identity. Overall, we gained valuable insights in the relationship of subjective social class and the three features of intergroup relations.

Keywords: social class, relative deprivation-gratification, prosocial behavior, attitudes, emotions, Muslim immigrants

Procedia PDF Downloads 48
8824 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 538
8823 Effectiveness of a Traits Cooperative Learning on Developing Writing Achievement and Composition among Teacher Candidates

Authors: Abdelaziz Hussien

Abstract:

This article reports investigations of a study into the effectiveness of a traits cooperative learning (TCL) on teacher candidates’ writing achievement, composition, and attitudes towards traits of writing approach and small group learning. Mixed methodologies were used with the participants in a repeated measures quasi-experimental design. Forty-two class teacher candidates, enrolled in the Bahrain Teachers College, completed the pre and post author-developed measures. The results suggest that TCL has a positive effect on the participants’ writing achievement, composition, and attitudes towards traits of writing approach, but not on the attitudes towards small group learning. Further implications to teacher education are presented.

Keywords: trait-based language education, cooperative learning, writing achievement, writing composition, traits of writing, teacher education

Procedia PDF Downloads 151
8822 Association between Job Satisfaction, Motivation and Five Factors of Organizational Citizenship Behavior

Authors: Khadija Mushtaq, Muhammad Umar

Abstract:

The research aims to study the association between job satisfaction, motivation and the five factors of organizational citizenship behavior (i.e. Altruism, Conscientiousness, Sportsmanship, Courtesy and Civic virtue) among Public Sector Employees in Pakistan.In this research Structure Equation Modeling with confirmatory factor analysis was used to test the relationship between two independent and five dependent variables. Data was collected through questionnaire survey from 152 Public Servants Working in Gujrat District-Pakistan in different capacities. Stratified Random Sampling Technique was used to conduct this survey. The results of the study indicate that five factors of OCB have positive significant relation with both motivation and job satisfaction except the relationship of Civic Virtue with Motivation.The research findings implicate that factors other than motivation and job satisfaction may also affect OCB. Likewise, all the five factors of OCB may not be present in all populations. Thus, Managers must concentrate on increasing motivation and job satisfaction to increase OCB. Furthermore, the present research gives a direction to future researchers to use more independent variables (e.g. Culture, leadership, workplace environment, various job attitudes, types of motivation, etc.) on different types of populations with larger sample size in order to find the reasons behind insignificant relationship of civic virtue with Motivation in the research in hand and to generalize the tested model.

Keywords: five factors of organizational citizenship behavior (OCB), motivation, job satisfaction, public sector employees in Pakistan

Procedia PDF Downloads 326
8821 The Impact of Artificial Intelligence on Autism Attitude and Skills

Authors: Sara Fayez Fawzy Mikhael

Abstract:

Inclusive education services for students with autism are still developing in Thailand. Although many more children with intellectual disabilities have been attending school since the Thai government enacted the Education for Persons with Disabilities Act in 2008, facilities for students with disabilities and their families are generally inadequate. This comprehensive study used the Attitudes and Preparedness for Teaching Students with Autism Scale (APTSAS) to examine the attitudes and preparedness of 110, elementary teachers in teaching students with autism in the general education setting. Descriptive statistical analyzes showed that the most important factor in the formation of a negative image of teachers with autism is student attitudes. Most teachers also stated that their pre-service training did not prepare them to meet the needs of children with special needs who cannot speak. The study is important and provides directions for improving non-formal teacher education in Thailand.

Keywords: attitude, autism, teachers, thailandsports activates, movement skills, motor skills

Procedia PDF Downloads 33
8820 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 448
8819 Academic Major, Gender, and Perceived Helpfulness Predict Help-Seeking Stigma

Authors: Tran Tran

Abstract:

Mental health issues are prevalent among Vietnamese undergraduate students, and they are greatly exacerbated during the COVID-19 pandemic for this population. While there is empirical evidence supporting the effectiveness and efficiency of therapy on mental health issues among college students, the rates of Vietnamese college students seeking professional mental health services were alarmingly low. Multiple factors can prevent those in need from finding support. The Internalized Stigma Model posits that public stigma directly affects intentions to seek psychological help via self-stigma and attitudes toward seeking help. However, little research has focused on what factors can predict public stigma toward seeking professional psychological support, especially among this population. A potential predictor is academic majors since academic majors can influence undergraduate students' perceptions, attitudes, and intentions. A study suggested that students who have completed two or more psychology courses have a more positive attitude toward seeking care for mental health issues and reduced stigma, which might be attributed to increased mental health literacy. In addition, research has shown that women are more likely to utilize mental health services and have lower stigma than men. Finally, studies have also suggested that experience of mental health services can increase endorsement of perceived need and lower stigma. Thus, it is expected that perceived helpfulness from past service uses can reduce stigma. This study aims to address this gap in the literature and investigate which factors can predict public stigma, specifically academic major, gender, and perceived helpfulness, potentially suggesting an avenue of prevention and ultimately improving the well-being of Vietnamese college students. The sample includes 408 undergraduate students (Mage = 20.44; 80.88% female) Hanoi city, Vietnam. Participants completed a pen-and-paper questionnaire. Students completed the Stigma Scale for Receiving Psychological Help, which yielded a mean public stigma score. Participants also completed a measurement assessing their perceived helpfulness of their university’s counseling center, which included eight subscales: future self-development, learning issues, career counseling, medical and health issues, mental health issues, conflicts between teachers and students, conflicts between parents and students, and interpersonal relationships. Items were summed to create a composite perceived helpfulness score. Finally, participants provided demographic information. This included gender, which was dichotomized between female and other. Additionally, it included academic major, which was also similarly dichotomized between psychology and other (e.g., natural science, social science, and pedagogy & social work). Linear relationships between public stigma and gender, academic major, and perceived helpfulness were analyzed individually with a regression model. Findings suggested that academic major, gender, and perceived counseling center's helpfulness predicted stigma against seeking professional psychological help. Specifically, being a psychology major predicted lower levels of public stigma (β = -.25, p < .001). Additionally, gender female predicted lower levels of public stigma (β = -.11, p < .05). Lastly, higher levels of perceived helpfulness of the counseling center also predicted lower levels of public stigma (β = -.16, p < .01). The study’s results offer potential intervention avenues to help reduce stigma and increase well-being for Vietnamese college students.

Keywords: stigma, vietnamese college students, counseling services, help-seeking

Procedia PDF Downloads 75
8818 Engaging with Security and State from a Gendered Lens in the South Asian Context: Indian State’s Construction of Internal Security and State Responses

Authors: Pooja Bakshi

Abstract:

In the following paper, an attempt would be made to engage with the relationship between the state and the imperatives of security from a gendered lens. This will be juxtaposed with the feminist engagement with International Law. Theorizations from the literature on South Asian politics and Global politics would be applied to the manner in which the Indian state has defined and proposed to deal with concerns of internal security pertaining to the ‘Left Wing Extremism’ in 2010-2011. It would be argued that the state needs to be disaggregated into the legislature, executive and the judiciary; since there are times when some institutional parts of the state provide space for progressive democratic engagement whilst other institutions don’t. The specific contours of violence faced by women and children at the hands of the state, in the above-mentioned discourse would also be examined. In the end, implications of the security state discourse on debates in International Law would be elaborated.

Keywords: feminist engagement, human rights, state response to left extremism, security studies in South Asia

Procedia PDF Downloads 484
8817 An Exploration of Anti-Terrorism Laws in Nigeria

Authors: Sani Mohammed Adam

Abstract:

This work seeks to review the security challenges facing Nigeria and explore the relevance of laws and policies in tackling the menace. The work looks at the adequacy of available legislations and the functionality of relevant institutions such as the Armed Forces, the Nigeria Police Force, the State Security Service, the Defence Intelligence Agency and the Nigerian Intelligence Agency etc. Comparisons would be made with other jurisdictions, such as inter alia, the Homeland Security in the USA and Counter Terrorism Laws of the United Kingdom. Recommendations would be made on how to strengthen both institutions and laws to curtail the growth of Terrorism in Nigeria.

Keywords: legislations, Nigeria, security, terrorism

Procedia PDF Downloads 665
8816 An Analysis of Public Environmental Investment on the Sustainable Development in China

Authors: K. Y. Chen, Y. N. Jia, H. Chua, C. W. Kan

Abstract:

As the largest developing country in the world, China is now facing the problem arising from the environment. Thus, China government increases the environmental investment yearly. In this study, we will analyse the effect of the public environmental investment on the sustainable development in China. Firstly, we will review the current situation of China's environmental issue. Secondly, we will collect the yearly environmental data as well as the information of public environmental investment. Finally, we will use the collected data to analyse and project the SWOT of public environmental investment in China. Therefore, the aim of this paper is to provide the relationship between public environmental investment and sustainable development in China. Based on the data collected, it was revealed that the public environmental investment had a positive impact on the sustainable development in China as well as the GDP growth. Acknowledgment: Authors would like to thank the financial support from the Hong Kong Polytechnic University for this work.

Keywords: China, public environmental investment, sustainable development, analysis

Procedia PDF Downloads 352
8815 Biochar and Food Security in Central Uganda

Authors: Nataliya Apanovich, Mark Wright

Abstract:

Uganda is among the poorest but fastest growing populations in the world. Its annual population growth of 3% puts additional stress through land fragmentation, agricultural intensification, and deforestation on already highly weathered tropical (Ferralsol) soils. All of these factors lead to decreased agricultural yields and consequently diminished food security. The central region of Uganda, Buganda Kingdom, is especially vulnerable in terms of food security as its high population density coupled with mismanagement of natural resources led to gradual loss of its soil and even changes in microclimate. These changes are negatively affecting livelihoods of smallholder farmers who comprise 80% of all population in Uganda. This research focuses on biochar for soil remediation in Masaka District, Uganda. If produced on a small scale from locally sourced materials, biochar can increase the quality of soil in a cost and time effective manner. To assess biochar potential, 151 smallholder farmers were interviewed on the types of crops grown, agricultural residues produced and their use, as well as on attitudes towards biochar use and its production on a small scale. The interviews were conducted in 7 sub-counties, 32 parishes, and 92 villages. The total farmland covered by the study was 606.2 kilometers. Additional information on the state of agricultural development and environmental degradation in the district was solicited from four local government officials via informal interviews. This project has been conducted in collaboration with the international agricultural research institution, Makerere University in Kampala, Uganda. The results of this research can have implications on the way farmers perceive the value of their agricultural residues and what they decide to do with them. The underlying objective is to help smallholders in degraded soils increase their agricultural yields through the use of biochar without diverting the already established uses of agricultural residues to a new soil management practice.

Keywords: agricultural residues, biochar, central Uganda, food security, soil erosion, soil remediation

Procedia PDF Downloads 271
8814 Factors Associated with Women’s Participation in Osteoporosis Health-Related Behaviors: An Analysis of Two Ethno-Cultural Groups

Authors: Offer E. Edelstein, Iris Vered, Orly Sarid

Abstract:

Background: Physical activity (PA) is considered as a major factor in bone density preservation and fracture prevention. Yet, gaps in understanding exist regarding how ethnocultural backgrounds might shape attitudes, intentions, and actual PA participation. Based on the theory of planned behavior (TPB) for predicting PA, the aims of the current study were: i) to compare attitudes, subjective norms, perceived control, intentions and knowledge, across two ethnocultural groups; ii) to evaluate the fit of the model across two ethnocultural groups of women: Israeli-born Jews and Ethiopian immigrants. Methods: Two hundred women (one hundred from each group), aged > 65, completed valid and reliable questionnaires assessing knowledge, TPB components, and actual PA. Results: The level of knowledge on osteoporosis was relatively low in both groups. Intention to participate in PA was the only variable that directly predicted actual PA. Intention to participate in PA served as a mediator among attitudes, subjective norms, perceived control, and actual PA. The TPB components mediated the link between knowledge and intention to participate in PA. Conclusion: It is important to understand and augment interventions that enhance PA, in the community, and with sensitivity concerning each ethnocultural group.

Keywords: attitudes, ethnocultural groups, knowledge, physical activity

Procedia PDF Downloads 122
8813 Instructors Willingness, Self-Efficacy Beliefs, Attitudes and Knowledge about Provisions of Instructional Accommodations for Students with Disabilities: The Case Selected Universities in Ethiopia

Authors: Abdreheman Seid Abdella

Abstract:

This study examined instructors willingness, self-efficacy beliefs, attitudes and knowledge about provisions of instructional accommodations for students with disabilities in universities. Major concepts used in this study operationally defined and some models of disability were reviewed. Questionnaires were distributed to a total of 181 instructors from four universities and quantitative data was generated. Then to analyze the data, appropriate methods of data analysis were employed. The result indicated that on average instructors had positive willingness, strong self-efficacy beliefs and positive attitudes towards providing instructional accommodations. In addition, the result showed that the majority of participants had moderate level of knowledge about provision of instructional accommodations. Concerning the relationship between instructors background variables and dependent variables, the result revealed that location of university and awareness raising training about Inclusive Education showed statistically significant relationship with all dependent variables (willingness, self-efficacy beliefs, attitudes and knowledge). On the other hand, gender and college/faculty did not show a statistically significant relationship. In addition, it was found that among the inter-correlation of dependent variables, the correlation between attitudes and willingness to provide accommodations was the strongest. Furthermore, using multiple linear regression analysis, this study also indicated that predictor variables like self-efficacy beliefs, attitudes, knowledge and teaching methodology training made statistically significant contribution to predicting the criterion willingness. Predictor variables like willingness and attitudes made statistically significant contribution to predicting self-efficacy beliefs. Predictor variables like willingness, Special Needs Education course and self-efficacy beliefs made statistically significant contribution to predict attitudes. Predictor variables like Special Needs Education courses, the location of university and willingness made statistically significant contribution to predicting knowledge. Finally, using exploratory factor analysis, this study showed that there were four components or factors each that represent the underlying constructs of willingness and self-efficacy beliefs to provide instructional accommodations items, five components for attitudes towards providing accommodations items and three components represent the underlying constructs for knowledge about provisions of instructional accommodations items. Based on the findings, recommendations were made for improving the situation of instructional accommodations in Ethiopian universities.

Keywords: willingness, self-efficacy belief, attitude, knowledge

Procedia PDF Downloads 260
8812 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 441
8811 The Operation Strategy and Public Relations Trend for Public Relations Strategies Development in Thailand

Authors: Kanyapat U. Tapao

Abstract:

The purpose of this study is to analyze the operation strategy strategies and public relations trend for public relations strategies development in public television station in Thailand. This study is a qualitative approach by indent interview from the 6 key informants that are managers of Voice TV and Thairath TV Channel. The results showed that both TV stations have to do research before making a release on the operation strategy policy such as a slogan, segmentation, integrated marketing communication and PR activity and also in term of Public Relations trend are including online media, online content and online training before opening the station and start promoting. By the way, we found the PR strategy for both TV station should be including application on mobile, online content, CRM activity, online banner, special event, and brand ambassador in order to bring a very reliable way.

Keywords: online banner, operation strategy, public relations trend, public relations strategies development

Procedia PDF Downloads 302
8810 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: interoperability, threats, attacks, medical devices

Procedia PDF Downloads 318
8809 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 47
8808 The Legal Procedure of Attestation of Public Servants

Authors: Armen Yezekyan

Abstract:

The main purpose of this research is to comprehensively explore and identify the problems of attestation of the public servants and to propose solutions for these issues through deeply analyzing laws and the legal theoretical literature. For the detailed analysis of the above-mentioned problems we will use some research methods, the implementation of which has a goal to ensure the objectivity and clarity of scientific research and its results.

Keywords: attestation, attestation commission, competition commission, public servant, public service, testing

Procedia PDF Downloads 403
8807 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 136
8806 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 184