Search results for: security education
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9516

Search results for: security education

9156 Sex Education: The Teacher’s Discourses About the Relation Between the Children and the Media, Concerning Sex Education and the Childhood

Authors: Katerina Samartzi

Abstract:

This study focuses on the teacher’s discourses in Greece, about the relation between the children and the media, concerning sex education and widely the childhood. The teachers’ input reflect the anxieties and the dominant discourses that exist around these issues. The study begins with the critical discussion of the available literature concerning the potential impact of media and the ‘moral panics’, their role in sex education and the children’s use of sexual material. Moreover, the study analyses the social construction of childhood and sexuality. Given the lack of explicit and official protocol for the sex education in Greece and due the fact that the young people are familiar with all the material provided by the New Media and their part as an informal education, this project aims to point out the factors that reinforce these gaps. This study focuses on the way the adults and specifically teachers contextualize the children’s relation with media, their sexuality, the sex education, the use of sexual material and the childhood.

Keywords: childhood, children's sexuality, media, moral panics, pornography, sex education

Procedia PDF Downloads 141
9155 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 79
9154 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 64
9153 Competition as an Appropriate Instructional Practice in the Physical Education Environment: Reflective Experiences

Authors: David Barney, Francis Pleban, Muna Muday

Abstract:

The purpose of this study was to explore gender differences of former physical education students related to reflective experiences of competition in physical education learning environment. In the school environment, students are positioned in competitive situations, including in the physical education context. Therefore it is important to prepare future physical educators to address the role of competition in physical education. Participants for this study were 304 college-aged students and young adults (M = 1.53, SD = .500), from a private university and local community located in the western United States. When comparing gender, significant differences (p < .05) were reported for four (questions 5, 7, 12, and 14) of the nine scaling questions. Follow-up quantitative findings reported that males (41%) more than females (27%) witnessed fights in physical education environment during competitive games. Qualitative findings reported fighting were along the lines of verbal confrontation. Female participants tended to experience being excluded from games, when compared to male participants. Both male and female participants (total population; 95%, males; 98%; and females 92%) were in favor of including competition in physical education for students. Findings suggest that physical education teachers and physical education teacher education programs have a responsibility to develop gender neutral learning experiences that help students better appreciate the role competition plays, both in and out of the physical education classroom.

Keywords: competition, physical education, physical education teacher education, gender

Procedia PDF Downloads 473
9152 Inclusive Education in South African Universities: Pre-Service Teachers’ Experiences

Authors: Cina Mosito, Toyin Mary Adewumi, Charlene Nissen

Abstract:

One of the goals of inclusive education is to provide learners with suitable learning environments and prospects to best attain their potential. This study sought to determine the experiences of studying inclusive education on pre-service teachers’ teaching within the South African education context. A purposeful sample comprising 6 pre-service teachers was selected from a university of technology located in the Western Cape South Africa. Data were collected using open-ended questionnaires, which were exploratory in nature and analyzed thematically. The findings supported significant proportions of experiences as self-reported by pre-service teachers. The pre-service teachers’ experiences of studying inclusive education included inclusive education as an “eye-opener” to the fact that learners experiencing various barriers to learning can be accommodated in the regular classrooms, exposure to some aspects of inclusive education, such as diversity, learners’ rights, and curriculum differentiation. It was also revealed that studying inclusive education made pre-service teachers love and enjoy teaching more. The study shows that awareness of inclusive education has influenced pre-service teachers in South African schools.

Keywords: experience, inclusive education, pre-service teacher, South Africa

Procedia PDF Downloads 184
9151 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 71
9150 Challenges in the Use of Information and Communication Technology in Agricultural Education and Training in Colleges of Education in Adamawa State

Authors: Harrison Gideon Maghra

Abstract:

The study was conducted on the challenges in the use of ICT in Agricultural Education and Training in Colleges of Education in Adamawa State. Three objectives guided the study, and the objectives were translated into three research questions and the research questions translated into two null hypotheses. Frequency and percentage were used to answer research question one, mean and standard deviation were used to answer research questions two and three, and t-test statistic was used to test the null hypotheses at 0.05 level of significance. The study was descriptive research and a questionnaire was used to solicit responses from the respondent. The instrument for data collection was subjected to face and content validity by 1 expert in the Department of Vocational Education, Modibbo Adama University, Yola and 3 experts from the Department of Vocational and Technical Education, Adamawa State University, Mubi. Pearson Product Moment Correlation Coefficient was used to test the reliability of the instrument and a reliability coefficient of 0.76 was obtained through the test re-test test method. Results from the study revealed that ICT facilities are not available in state-owned colleges of education. Agricultural Education lecturers have a positive attitude toward the use of ICT in teaching agricultural education and training. Based on the findings of the study, recommendations were made, among which: Colleges of Education in the state should organize training on the use of ICT for all lecturers, including those in the Agricultural Education program.

Keywords: challenges, ICT, agricultural education, colleges of education

Procedia PDF Downloads 56
9149 Impact of Gaming Environment in Education

Authors: Md. Ataur Rahman Bhuiyan, Quazi Mahabubul Hasan, Md. Rifat Ullah

Abstract:

In this research, we did explore the effectiveness of the gaming environment in education and compared it with the traditional education system. We take several workshops in both learning environments. We measured student’s performance by providing a grading score (by professional academics) on their attitude in different criteria. We also collect data from survey questionnaires to understand student’s experiences towards education and study. Finally, we examine the impact of the different learning environments by applying statistical hypothesis tests, the T-test, and the ANOVA test.

Keywords: gamification, game-based learning, education, statistical analysis, human-computer interaction

Procedia PDF Downloads 200
9148 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 282
9147 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 264
9146 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 280
9145 Perception and Participation Quality Assurance in Higher Education: A Case Study of Phranakhon Rajabhat University, Thailand

Authors: O. Vanijajiva, K. Oumaree, N. Ngampak

Abstract:

This research aims to study the level of perception and participation of Phranakhon Rajabhat University staff and to study the relationship between the levels of perception and participation with the score of University evaluation of quality assurance in education. The respondents were composed of 479 staffs. The tool used in this research is perceived and participation questionnaire of quality assurance in education of Phranakhon Rajabhat University. The results found that the most staffs are female with undergraduate education. Most 2 respondents are revealing educational staffs without academic position. The fact of times to gain knowledge of quality assurance in education is 1-3 times. The perception of knowledge about quality assurance in education is moderate (3.74 ± 0.65) with most respondent are more focus on university activity than quality assurance in education activity. The participation of quality assurance in education activities involved in moderate (3.17 ± 0.88), with most respondents more involved in student affair than quality assurance in education motion. For assessment of the relationship of perception and participation of quality assurance in education are average score (4.31 ± 0.16) showed that the level of perception and participation was associated with university evaluation in very low level (r = -0.103 and -0.121, respectively), while perception and participation are correlated with the moderate level (r = 0.691).

Keywords: quality assurance education, awareness, participation, higher education, Thailand

Procedia PDF Downloads 347
9144 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 401
9143 Technology, Music Education, and Social-Emotional Learning in Latin America

Authors: Jinan Laurentia Woo

Abstract:

This paper explores the intersection of technology, music education, and social-emotional learning (SEL) with a focus on Latin America. It delves into the impact of music education on social-emotional skills development, highlighting the universal significance of music across various life stages. The integration of artificial intelligence (AI) in music education is discussed, emphasizing its potential to enhance learning experiences. The paper also examines the implementation of SEL strategies in Latin American public schools, emphasizing the importance of fostering social-emotional well-being in educational settings. Challenges such as unequal access to technology and education in the region are addressed, calling for further research and investment in tech-assisted music education.

Keywords: music education, social emotional learning, educational technology, Latin America, artificial intelligence, music

Procedia PDF Downloads 29
9142 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 135
9141 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 74
9140 The Role and Position of Chinese Modern Martial Art in the School Physical Education (1912-1945)

Authors: Hsien-Wei Kuo

Abstract:

The thoughts of the military citizens, pragmatism, naturalism and nationalism related to physical education were developed during the warring period of the Republic of China. Moreover, the development of martial art formed by nationalism and political party was to utilize to save the nation, the people and the world. The martial art was also promoted in the system of school physical education gradually at the same time. The aim of this study is to explore the role, duty and position of the martial art education with the political color and advocacy in the system of school physical education. This study focuses on the practice, course hours, selective materials and competitive rules of physical education in the school system in modern China. Therefore, the methods of the historical research and content analysis were used to collect the historical materials and documents for going into them. The results will give a detailed account of the developed model of institutionalization, unification and regularization of martial art, and its growing, golden and stagnant periods in the school physical education system under the impact of western sport and physical education. It may sum up the meaning relationships among the politics, education practice and sport for all.

Keywords: martial art education, national martial arts institution, sick man of East Asia, the may 4th movement

Procedia PDF Downloads 355
9139 A Correlation Analysis of an Effective Music Education with Students’ Mathematical Performance

Authors: Yoon Suh Song

Abstract:

Though music education can broaden one’s capacity for mathematical performance, many countries lag behind in music education. Little empirical evidence is found to identify the connection between math and music. Therefore, this research was set out to explore what music-related variables are associated with mathematical performance. The result of our analysis is as follows: A Pearson's Correlation analysis revealed that PISA math score is strongly correlated with students' Intelligence Quotient (IQ). This lays the foundation for further research as to what factors in students’ IQ lead to a better performance in math.

Keywords: music education, mathematical performance, education, IQ

Procedia PDF Downloads 191
9138 Alternative Sources of Funding Tertiary Institution in Nigeria

Authors: Mark Omu

Abstract:

Education has remained the greatest fulcrum on which the developmental aspirations of societies and the world over is Anchored. This has been the case from the antiquity. As a result of recognition of this fact, education occupies a crucial and centripetal position at different epochs of societal formation and transformation. This paper recognized the all-embracing role of education to society and it utilized the literary research and review of literature to espouse on the role of alternative sources of financing education. This position was borne out of the dwindling resources available to education. Especially to finance teaching, learning, research and retraining of staffers. This paper found among other things that alternative funding of education is possible and it can be achieved through selling of its research products like entrepreneurial skills, collaborative ventures in public private partnership, philanthropic of endowments, etc. These are capable of bridging the financial gap currently bedevilling the educational sectors.

Keywords: alternative sources, funding, tertiary, education, society, partnership, Nigeria

Procedia PDF Downloads 392
9137 Teaching Physics: History, Models, and Transformation of Physics Education Research

Authors: N. Didiş Körhasan, D. Kaltakçı Gürel

Abstract:

Many students have difficulty in learning physics from elementary to university level. In addition, students' expectancy, attitude, and motivation may be influenced negatively with their experience (failure) and prejudice about physics learning. For this reason, physics educators, who are also physics teachers, search for the best ways to make students' learning of physics easier by considering cognitive, affective, and psychomotor issues in learning. This research critically discusses the history of physics education, fundamental pedagogical approaches, and models to teach physics, and transformation of physics education with recent research.

Keywords: pedagogy, physics, physics education, science education

Procedia PDF Downloads 241
9136 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 544
9135 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 454
9134 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 51
9133 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 366
9132 Improving the Teaching and Learning of Basic Mathematics: An Imperative for Sustainable Development

Authors: Dahiru Bawa Muhammad

Abstract:

Mathematics is accorded a prime position in basic education curriculum because it is envisaged to be an important tool in preparing children for life after school as well as equipping them with skills needed for secondary and higher education. As a result of this, the subject is made compulsory from primary through secondary school and candidates are expected to offer it and pass before fulfilling the requirement for higher education. Against this backdrop, this paper overviewed the basic education programme, context of teaching and learning mathematics at basic education level in Katsina State of Nigeria, relevance of the subject to different fields of human endeavours, challenges threatening the utility of the subject as a tool for the achievement of the goals of basic education programme and concluded by recommending how teaching and learning of mathematics can be improved for even development of citizens within nation states and enhanced/mutual sustainable development of nations in the global village.

Keywords: basic education, junior secondary school education, mathematical centre

Procedia PDF Downloads 433
9131 Research on the Teaching Quality Evaluation of China’s Network Music Education APP

Authors: Guangzhuang Yu, Chun-Chu Liu

Abstract:

With the advent of the Internet era in recent years, social music education has gradually shifted from the original entity education mode to the mode of entity plus network teaching. No matter for school music education, professional music education or social music education, the teaching quality is the most important evaluation index. Regarding the research on teaching quality evaluation, scholars at home and abroad have contributed a lot of research results on the basis of multiple methods and evaluation subjects. However, to our best knowledge the complete evaluation model for the virtual teaching interaction mode of the emerging network music education Application (APP) has not been established. This research firstly found out the basic dimensions that accord with the teaching quality required by the three parties, constructing the quality evaluation index system; and then, on the basis of expounding the connotation of each index, it determined the weight of each index by using method of fuzzy analytic hierarchy process, providing ideas and methods for scientific, objective and comprehensive evaluation of the teaching quality of network education APP.

Keywords: network music education APP, teaching quality evaluation, index and connotation

Procedia PDF Downloads 100
9130 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 308
9129 Education in Technology for Sustainable Development Applied to School Gardens

Authors: Sara Blanc, José V. Benlloch-Dualde, Laura Grindei, Ana C. Torres, Angélica Monteiro

Abstract:

This paper presents a study that leads a new experience by introducing digital learning applied to a case study focused on primary and secondary school garden-based education. The approach represents an example of interaction among different education and research agents at different countries and levels, such as universities, public and private research, and schools, to get involved in the implementation of education for sustainable development that will make students become more sensible to natural environment, more responsible for their consumption, more aware about waste reduction and recycling, more conscious of the sustainable use of natural resources and, at the same time, more ‘digitally competent’. The experience was designed attending to the European digital education context and OECD directives in transversal skills education. The paper presents the methodology carried out in the study as well as outcomes obtained from experience.

Keywords: school gardens, primary education, secondary education, science technology and innovation in education, digital learning, sustainable development goals, university, knowledge transference

Procedia PDF Downloads 88
9128 A Model of Critical Consideration of Environmental Education: Concepts, Contexts, and Competencies

Authors: Mohammad Anwar, Hamid Ullah Khan, Shah Waliullah

Abstract:

Recently, environmental education is an essential element in avoiding environmental degradation around the globe that needs new articles and policymakers’ emphasis. Hence, the present article examines the impact of environmental education on environmental knowledge, environmental behavior, and environmental attitudes in Indonesia. The present research also investigated the moderating role of government support in environmental education, environmental knowledge, environmental behavior, and environmental attitude in Indonesia. A questionnaire was used as the primary data collection method. The smart PLS was utilized to test the association among variables and the hypotheses of the study. The results revealed that environmental education had a significant and positive linkage with environmental knowledge, environmental behavior, and environmental attitude in Indonesia. The findings also exposed that government support significantly moderated environmental education, environmental knowledge, and environmental behavior in Indonesia. The findings of this research would provide help to the policymakers in establishing the policies related to environmental education and reducing environmental degradation.

Keywords: environmental education, environmental knowledge, environmental behavior, environmental attitude, government support

Procedia PDF Downloads 73
9127 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 347