Search results for: security experiences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5226

Search results for: security experiences

4866 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 148
4865 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s

Authors: Zunjarrao Kadam, Vikas Minchekar

Abstract:

The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.

Keywords: experimentally induced stress, facial recognition, cognition, security personnel

Procedia PDF Downloads 237
4864 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry

Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim

Abstract:

Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.

Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain

Procedia PDF Downloads 64
4863 What Do Board Members Learn from Their External Connectedness? The Case of Firm Diversification

Authors: Pei-Gi Shu, Yin-Hua Yeh, Chao-Ting Chen

Abstract:

Using a dataset consisting of 7,120 firm-year observations from the Taiwan stock market over the 2007-2011 sample period, we find a significantly negative relationship between board external connectedness and firm diversification. We propose a learningeffect hypothesis indicating that an externally connected board member’s experiences in other companies directly affect his recommendations regarding the underlying firm’s diversification. The partial correlation between diversification and the performance of firms with externally connected board members is used as a proxy for the learning effect. The empirical results show that the learning effect is asymmetrically embedded in firm diversification, with negative experiences having a greater effect on firm diversification than positive experiences. Externally connected board members are associated with reduced diversification in one firm after they learn that diversification is detrimental to value in other companies. Moreover, the diversification of a firm due to board external connectedness is moderated by the controlling owner’s interest alignment and entrenchment.

Keywords: board, external, connectedness, diversification

Procedia PDF Downloads 442
4862 The Role of Teacher Candidates' Beliefs in Their Development of Inclusive Teaching Practices

Authors: Charlotte Brenner, Fisayo Latilo, McKenna Causey

Abstract:

This study explores the transformation of teacher candidates' beliefs regarding inclusion and inclusive teaching practices during their instructional and practicum experiences in the Canadian context. With the increasing diversity of schools, the study investigates how teacher candidates' beliefs impact their implementation of inclusive teaching practices, which are essential for meeting diverse student needs. The research examines the influence of teacher education programs, transformative learning experiences, and inclusive practicum placements on teacher candidates' beliefs about inclusion. Using a multiple case study approach, the study assesses teacher candidates' initial beliefs, documents changes in these beliefs after coursework on inclusion, and explores the supports and constraints affecting belief development in both university and practicum settings. Preliminary findings suggest that teacher candidates generally hold positive beliefs about inclusion at the outset of their teacher education programs. However, coursework and practicum experiences significantly shape their understanding of diversity, strategies for inclusion, and awareness of broader social issues related to inclusive classrooms. The research underscores the critical role of teacher education programs in shaping teacher candidates' beliefs about inclusion and highlights the value of transformative learning experiences and inclusive practicum placements in enhancing their understanding of equity and inclusion. Continued research is necessary to identify specific elements within courses and practicum experiences that promote positive beliefs about inclusive teaching practices, ultimately contributing to the creation of more equitable classrooms and improved student outcomes.

Keywords: inclusion, beliefs, teacher candidates, inclusive teaching practices

Procedia PDF Downloads 45
4861 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 362
4860 Experiences of Marital Relationship of Middle-Aged Couples in Hong Kong: Implications for Services Interventions

Authors: Wai M. Shum

Abstract:

There was evidence that the change of marital quality satisfaction was related to the different stages of the family life cycle. Research studies have been largely based on western contexts, which found a curvilinear U-shaped trend in changes of marital satisfaction over the course of a marriage, but little is known about the marital experiences of Hong Kong couples. Through in-depth interviews, this qualitative study explored the marital relationship of middle-aged couples in a satisfying marriage and to identify how couples maintain a satisfying relationship in the local context. Findings from this study suggested twelve themes with some showing consistency with previous literature, such as communication, companionship, trust, and fidelity. The affective aspects of empathetic understanding and perceived empathy were found to have an enormous effect on couples’ bondedness. The high level of differentiation and security served as a basis for unconditional contribution, acceptance, and adjustment to unsolvable issues such that negative emotion would not be escalated. The manifestations of intimacy and commitment in the triangular theory of love were more frequently addressed than passion in striving for marital longevity in the local context. This study challenged the curvilinear trend of marital satisfaction throughout marriage, with couples showing different pathways of marital satisfaction. The study gave insights on martial enrichment, such as facilitating couples to disclose their vulnerabilities, desire for physical intimacy, and passion in the pursuit of enduring marriage instead of an emphasis on skills training on communication and conflict resolution.

Keywords: intimacy, marital relationship, marital satisfaction, middle-aged

Procedia PDF Downloads 89
4859 The Principle of Methodological Rationality and Security of Organisations

Authors: Jan Franciszek Jacko

Abstract:

This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.

Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics

Procedia PDF Downloads 118
4858 Fatherhood and Migration among Chinese Returnees in Hong Kong: A Literature Review

Authors: Lucille Lok-Sun Ngan

Abstract:

There are significant gaps in both the migration and family literatures regarding the gendered parenting of Chinese migrants. Evidence from the literature informs us that the child-focused parenting style of the West has altered, with positive consequences, parent–child relationships in migrant families. In particular, second-generation migrants have developed hybrid identities distinct from those of their overseas-born parents and the locals. On returning to their place of origin, they may undergo yet another process of change in values, and in behaviour, in order to adapt to the local culture. As migration changes values, personality and practice at personal, interpersonal and familial levels, the cross-cultural experiences of returnees inevitably affect their own fatherhood journeys in their country of origin. This paper reviews current literature on fatherhood and migration and identifies the gaps and limitations that pertain to understanding the paternal experiences of Chinese return migrants.

Keywords: Chinese returnees, cross-cultural experiences, fatherhood, hybridity, migration

Procedia PDF Downloads 349
4857 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria

Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma

Abstract:

Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.

Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures

Procedia PDF Downloads 93
4856 The Sustained Utility of Japan's Human Security Policy

Authors: Maria Thaemar Tana

Abstract:

The paper examines the policy and practice of Japan’s human security. Specifically, it asks the question: How does Japan’s shift towards a more proactive defence posture affect the place of human security in its foreign policy agenda? Corollary to this, how is Japan sustaining its human security policy? The objective of this research is to understand how Japan, chiefly through the Ministry of Foreign Affairs (MOFA) and JICA (Japan International Cooperation Agency), sustains the concept of human security as a policy framework. In addition, the paper also aims to show how and why Japan continues to include the concept in its overall foreign policy agenda. In light of the recent developments in Japan’s security policy, which essentially result from the changing security environment, human security appears to be gradually losing relevance. The paper, however, argues that despite the strategic challenges Japan faced and is facing, as well as the apparent decline of its economic diplomacy, human security remains to be an area of critical importance for Japanese foreign policy. In fact, as Japan becomes more proactive in its international affairs, the strategic value of human security also increases. Human security was initially envisioned to help Japan compensate for its weaknesses in the areas of traditional security, but as Japan moves closer to a more activist foreign policy, the soft policy of human security complements its hard security policies. Using the framework of neoclassical realism (NCR), the paper recognizes that policy-making is essentially a convergence of incentives and constraints at the international and domestic levels. The theory posits that there is no perfect 'transmission belt' linking material power on the one hand, and actual foreign policy on the other. State behavior is influenced by both international- and domestic-level variables, but while systemic pressures and incentives determine the general direction of foreign policy, they are not strong enough to affect the exact details of state conduct. Internal factors such as leaders’ perceptions, domestic institutions, and domestic norms, serve as intervening variables between the international system and foreign policy. Thus, applied to this study, Japan’s sustained utilization of human security as a foreign policy instrument (dependent variable) is essentially a result of systemic pressures (indirectly) (independent variables) and domestic processes (directly) (intervening variables). Two cases of Japan’s human security practice in two regions are examined in two time periods: Iraq in the Middle East (2001-2010) and South Sudan in Africa (2011-2017). The cases show that despite the different motives behind Japan’s decision to participate in these international peacekeepings ad peace-building operations, human security continues to be incorporated in both rhetoric and practice, thus demonstrating that it was and remains to be an important diplomatic tool. Different variables at the international and domestic levels will be examined to understand how the interaction among them results in changes and continuities in Japan’s human security policy.

Keywords: human security, foreign policy, neoclassical realism, peace-building

Procedia PDF Downloads 109
4855 In-service High School Teachers’ Experiences On Blended Teaching Approach Of Mathematics

Authors: Lukholo Raxangana

Abstract:

Fourth Industrial Revolution (4IR)-era teaching offers in-service mathematics teachers opportunities to use blended approaches to engage learners while teaching mathematics. This study explores in-service high school teachers' experiences with a blended teaching approach to mathematics. This qualitative case study involved eight pre-service teachers from four selected schools in the Sedibeng West District of the Gauteng Province. The study used the community of inquiry model as its analytical framework for data analysis. Data collection was through semi-structured interviews and focus-group discussions to explore in-service teachers' experiences with the influence of blended teaching (BT) on learning mathematics. The study results are the impact of load-shedding, benefits of BT, and perceptions of in-service and hindrances of BT. Based on these findings, the study recommends that further research should focus on developing data-free BT tools to assist during load-shedding, regardless of location.

Keywords: bended teaching, teachers, in-service, and mathematics

Procedia PDF Downloads 31
4854 Exploring Women's Embodied Experiences of 'the Gaze' in Fitness Cultures

Authors: Amy Clark

Abstract:

To date, the focus of feminist research surrounding men looking at women, with the analysis of how women make sense of looks between women remains limited and scattered. Drawing upon ethnographic data obtained from an on-going research project, this presentation delves into the embodied experiences of female exercisers within a UK ‘working-class’ gym. By exploring the women’s own accounts of their living, breathing and sensing bodies as they exercise, the researcher attempts to understand how they make sense of the gym space, their embodied selves as well as broader constructions of the gendered body. Utilising a feminist phenomenological approach, this research examines the social-structural position of women in a patriarchal system of gender relations, whilst simultaneously acknowledging and analysing the structural, cultural, and historical forces and location, upon individual lived body experiences and gendered embodiment. The discussion is provided on how the gym can be identified as a sexually objectifying environment, and how women make sense and interpret specific ‘gazes’ encountered within the gym.

Keywords: embodiment, feminism, gazes, sociology

Procedia PDF Downloads 328
4853 Experiences and Aspirations of Hearing Impaired Learners in Inclusive Classrooms

Authors: Raymon P. Española

Abstract:

Hearing impaired students are admitted to regular high schools in the context of inclusive education. In this setting, several academic difficulties and social struggles are disregarded by many educators. The study aimed to describe the aspirations and lived experiences in mainstream classrooms of hearing impaired students. In the research process, the participants were interviewed using sign language. Thematic analysis of interview responses was done, supplemented by interviews with teachers and classroom observations. The study revealed four patterns of experiences: academic difficulties, coping mechanisms, identification with hearing peers, and impression management. This means that these learners were struggling in inclusive classrooms, where identification with and modeling the positive qualities of hearing peers were done to cope with academic difficulties and alter negative impressions about them. By implication, these learners tended to socially immerse themselves rather than resort to isolation. Along with this tendency was the aspiration for achievement as they were eager to finish post-secondary technical-vocational education. This means aspiring for continuing social immersion into the mainstream. All these findings provide insights to K-12 educators to increase the use of collaborative techniques and experiential learning strategies, as well as to adequately address the special educational needs of these students.

Keywords: descriptive, experiences and aspirations of hearing impaired learners, inclusive classrooms, Surigao City Philippines

Procedia PDF Downloads 385
4852 Ethno-Religious Conflicts In Nigeria; Implications for National Security

Authors: Samuel Onyekachi Chidi

Abstract:

Nigeria today faces more internal threats stemming from ethnic and religious conflicts than external sources. This article seeks to examine the ethno-religious conflicts in Nigeria from 2015 to 2021 and their impact on national security. The research was guided by six objectives. The theoretical framework adopted for this study is Structural Conflict Theory, which provides an adequate explanation, a predictive rationale for the frequent occurrence of ethno-religious conflicts and a tendency to provide the necessary insight for their resolution. The results of the study revealed that there is a strong relationship between ethnicity, religion, conflict and national security and that the ethno-religious conflicts experienced in Nigeria have gross implications for national security. The study recommends that the secularity of the Nigerian state be restored and preserved and that the state of origin be removed and replaced by the state of residence in all our national documents, as this will reduce ethnic identity, which is in opposition to nationalism. Religious leaders, traditional rulers, the media and other stakeholders should support the government in its fight to reduce ethno-religious conflict by sensitizing its youth, preaching unity and peaceful coexistence, and discouraging the use of violence as a means of settling disputes between groups and individuals.

Keywords: ethnicity, religion, conflict, national security

Procedia PDF Downloads 44
4851 Experiences and Views of Foundation Phase Teachers When Teaching English First Additional Language in Rural Schools

Authors: Rendani Mercy Makhwathana

Abstract:

This paper intends to explore the experiences and views of Foundation Phase teachers when teaching English First Additional Language in rural public schools. Teachers all over the world are pillars of any education system. Consequently, any education transformation should start with teachers as critical role players in the education system. As a result, teachers’ experiences and views are worth consideration, for they impact on learners learning and the wellbeing of education in general. An exploratory qualitative approach with the use of phenomenological research design was used in this paper. The population for this paper comprised all Foundation Phase teachers in the district. Purposive sampling technique was used to select a sample of 15 Foundation Phase teachers from five rural-based schools. Data was collected through classroom observation and individual face-to-face interviews. Data were categorised, analysed and interpreted. The findings revealed that from time-to-time teachers experiences one or more challenging situations, learners’ low participation in the classroom to lack of resources. This paper recommends that teachers should be provided with relevant resources and support to effectively teach English First Additional Language.

Keywords: the education system, first additional language, foundation phase, intermediate phase, language of learning and teaching, medium of instruction, teacher professional development

Procedia PDF Downloads 69
4850 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 346
4849 Loving is Universal, Dating is not: Dating Experiences of International Students in Vancouver

Authors: Nel Jayson Santos

Abstract:

The growing number of international students in post-secondary institutions in Canada has positively contributed to the country’s economy and educational systems while also enriching cultural diversity in the classrooms. However, international students face social and relational challenges as they try to adapt to their host nation’s culture. One specific area of cultural adaptation among international students that has yet to be studied extensively is dating experiences and romantic relationships. Although numerous studies have been done regarding the relational challenges and dating experiences of American international students, only a few studies have focused on international students based in Canada. Hence, this study examines the dating preferences, dating challenges, and dating adaptations of international students based in Vancouver, Canada. Using a social constructivist approach, a semi-structured interview was conducted among fifteen heterosexual international college students. Inductive thematic analysis was then used to analyze the gathered data and identify common themes. Findings suggest that students’ (1) preferences were influenced by racial background and parental approval of dating partners; (2) students experienced language barriers and cultural differences; (3) students adapted through constant communication and being open-minded. Finally, the analysis intends to help counselors and psychologists in various colleges to help understand the issues of international students in terms of intimate and romantic relationships.

Keywords: higher education, international students, dating experiences, cultural adaptation

Procedia PDF Downloads 181
4848 Maras and Public Security in Central America in XXI Century

Authors: Michal Stelmach

Abstract:

The aim of this paper is a critical analysis of the security policy in the field of the fight against transnational criminal groups in Central America in XXI century. We are analyzing all taken issues from several perspectives: political, anthropological, sociological and legal which allows me to confront behavior and the attitudes of the political elites against official legislative changes and declared actions, strategies and policies against practice. In the first part of paper we would like to present the genesis and characteristic of transnational gangs, called maras and next we would like to present their activities and roles within chosen sectors of organized crimes. In the second part we will analyze the government’s policy towards transnational criminal groups. The analysis will be concentrated on public safety policy implemented in specific Central American countries as well as regional international cooperation. The main intention of the author is to present the state of the security in Central America in XXI century by emphasizing failures and successes in the fight against transnational criminal organizations. Additionally we want to present and define the challenges currently facing the region now and to show the prediction of the situation’s development within next future and to define the recommendations on the design of public security policies in Central American countries.

Keywords: maras, public security, human rights, Central America

Procedia PDF Downloads 303
4847 A Qualitative Study to Explore the Experiences of Muslim Nurses Working in an Acute Setting During the Covid-19 Pandemic

Authors: Sujatha Shanmugasundaram

Abstract:

Background: It has been since one year that COVID-19 has emerged into the world. Since then, healthcare professionals facing a great challenge in to fight against this deadly virus. According to World Health Organization (WHO) 2021, it is estimated that more than 131 million confirmed cases and 2million deaths around the world due to this pandemic. Nurses are the frontline workers who play a major role in safeguarding the lives of the people in acute care settings. Evidence suggests that there are numbers of research have been carried out on nurses' and healthcare provider’s experiences during the pandemic. But, unfortunately, there are no or little evidence available on Muslim nurse’s perspective. Hence, this research will investigate the experiences of Muslim nurses working in an acute care setting during the pandemic. Purpose: The purpose of the study is to explore the experiences of Muslim nurses working in an acute setting during the COVID-19 pandemic. Research Methods: A qualitative research approach will be utilized for the study. Semi-structured interview schedule will be used to collect the data. Face to face interviews will be conducted. All interviews will be conducted in Arabic, and it will be audio recorded. Verbatim will be noted. Muslim nurses working in an acute setting will be included in the study. Convenient sampling technique will be used to recruit the participants. Ethical approval will be obtained from the study sites. Strauss and Corbin's thematic analysis will be used to analyze the data. Conclusion: Considering that nurses are the frontline workers, they have a significant role in dealing with this COVID-19. It is a great challenge for the nurses working in an acute care setting. Thus, this study will bring out significant findings that will impact the nursing practice.

Keywords: acute care, COVID-19, experiences, muslim nurses

Procedia PDF Downloads 175
4846 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 124
4845 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 330
4844 Composition Writing of the Associate in Hospitality Management Freshman Students of Cebu Technological University Tuburan Campus: Proposed Writing Skill Exercises.

Authors: Antoniette Belle R. Bontuyan

Abstract:

The aim of the study was to determine the levels of performance in Composition Writing of English 122: Writing in the Discipline of the Associate in Hospitality Management Freshman Students in relation to their reading and writing experiences at the Cebu Technological University Tuburan Campus, Academic Year 2009-2010 as basis for a proposed skill exercises. Specifically, this research answers the following questions: Firstly, based on the students’ written compositions, what the students’ levels of performance in the following are: Composition Topic with subcomponents of Topic Development, Organizational or Logical Conclusions, Accurate, Relevant Evidence or Detail, Voice/Tone/Style, and the Composition Conventions with subcomponents of Structure, Grammar and Usage, Spelling, Capitalization, Punctuation. Secondly, what the students’ extents of experiences in view of Writing and Reading Experiences are.

Keywords: COMPOSITION WRITING

Procedia PDF Downloads 285
4843 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 477
4842 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 311
4841 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 268
4840 Becoming a Teacher in Kazakhstan

Authors: D. Shamatov

Abstract:

Becoming a teacher is a journey with significant learning experiences. Exploring teachers’ lives and experiences can provide much-needed insights into the multiple realities of teaching. Teachers’ stories through qualitative narrative studies help understand and appreciate the complexities of the socio-political, economic and practical realities facing teachers. Events and experiences, both past and present, that take place at home, school, and in the broader social sphere help to shape these teachers’ lives and careers. Researchers and educators share the responsibility of listening to these teachers’ stories and life experiences and being sensitive to their voices in order to develop effective models for teacher development. A better understanding of how teachers learn to become teachers can help teacher educators prepare more effective teacher education programs. This paper is based on qualitative research which includes individual and focus group interviews, as well as auto-biography stories of Master of Science in School Leadership students at Graduate School of Education of Nazarbayev University. Twenty five MSc students from across Kazakhstan reflected on their professional journey and wrote their professional autobiographies as teachers. Their autobiographies capture the richness of their experiences and beliefs as a teacher, but also serve as window to understand broader socio-economic and political contexts where these teachers live and work. The study also provides an understanding of the systemic and socio-economic challenges of teachers in the context of post-Soviet Kazakhstan. It helps the reader better understand how wider societal forces interact and frame the development of teachers. The paper presents the findings from these stories of MSc students and offers some practical and policy implications for teacher preparation and teacher development.

Keywords: becoming a teacher, Kazakhstan, teacher stories, teacher development

Procedia PDF Downloads 402
4839 Standards of Toxicity and Food Security in Brazil

Authors: Ana Luiza Da Gama E Souza

Abstract:

This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.

Keywords: standards, indicators, human rights, food security

Procedia PDF Downloads 311
4838 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 390
4837 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 364