Search results for: school security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5865

Search results for: school security

5475 The Developmental Model of Self-Efficacy Emotional Intelligence and Social Maturity among High School Boys and Girls

Authors: Shrikant Chavan, Vikas Minchekar

Abstract:

The present study examined the self-efficacy, emotional intelligence and social maturity of High school boys and girls. Furthermore, study aimed at to foster the self-efficacy, emotional intelligence and social maturity of high school students. The study was conducted on 100 high school students, out of which 50 boys and 50 girls were selected through simple random sampling method from the Sangli city of Maharashtra state, India. The age range of the sample is 14 to 16 years. Self-efficacy scale developed by Jesusalem Schwarzer, Emotional intelligence scale developed by Hyde, Pethe and Dhar and social maturity scale developed by Rao were administered to the sample. Data was analyzed using mean, SD and ‘t’ test further Karl Pearson’s product moment, correlation of coefficient was used to know the correlation between emotional intelligence, self-efficacy, and social maturity. Results revealed that boys and girls did not differ significantly in their self-efficacy and social maturity. Further, the analysis revealed that girls are having high emotional intelligence compared to boys, which is significant at 0.01 level. It is also found that there is a significant and positive correlation between self-efficacy and emotional intelligence, self-efficacy and social maturity and emotional intelligence and social maturity. Some developmental strategies to strengthen the self-efficacy, emotional intelligence and social maturity of high school students are suggested in the study.

Keywords: self-efficacy, emotional intelligence, social maturity, developmental model and high school students

Procedia PDF Downloads 461
5474 The Philippine Collegian and the Catalyst's Journalistic Presentation of the UP and PUP: A Content Analysis

Authors: Diana Mariz Catangay, Irish-Ann Montano, Frances Janine Suyat

Abstract:

As an active pedestal for student’s interaction with both issues happening inside the school and out; may it be political, societal, international, or other current events, a school paper should at least meet the standard of providing a representation of the school’s morals and values and help the institution uplift its image. The researchers seek to ascertain how the two student publications from the Philippines’ two prime state universities, the University of the Philippines’ Philippine Collegian, and the Polytechnic University of the Philippines’ the Catalyst, presents iii their school through balanced journalism and objective documentation. The objectives include determining the number of school-related articles published versus those articles that are concerned outside the school’s jurisdiction, analyzing the insight it provides on the image of the university, assessing the similarities and/or differences between the two publications, and, finally, coming up with the conclusion of how the two newspapers uses their medium to present their respective schools. The research used the quantitative method of research in order to further analyze the articles that will serve as bases in coming up with the right conclusion based on the objectives of the study. Coding sheets and coding guides are utilized for the chosen research method. The gathered findings will then be interpreted as fitting to the goal of the research.

Keywords: content analysis, journalistic presentation, student publications, state universities

Procedia PDF Downloads 175
5473 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 156
5472 E-teaching Barriers: A Survey from Shanghai Primary School Teachers

Authors: Liu Dan

Abstract:

It was considered either unnecessary or impossible for primary school students to implement online teaching until last year. A large number of E-learning or E-teaching researches have been focused on adult-learners, andragogy and technology, however, primary school education, it is facing many problems that need to be solved. Therefore, this research is aimed at exploring barriers and influential factors on online teaching for K-12 students from teachers’ perspectives and discussing the E-pedagogy that is suitable for primary school students and teachers. Eight hundred and ninety-six teachers from 10 primary schools in Shanghai were invited to participate in a questionnaire survey. Data were analysed by hierarchical regression, and the results stress the significant three barriers by teachers with online teaching: the existing system is deficient in emotional interaction, teachers’ attitude towards the technology is negative and the present teacher training is lack of systematic E-pedagogy guidance. The barriers discovered by this study will help the software designers (E-lab) develop tools that allow for flexible and evolving pedagogical approaches whilst providing an easy entry point for cautious newcomers, so that help the teachers free to engage in E-teaching at pedagogical and disciplinary levels, to enhance their repertoire of teaching practices.

Keywords: online teaching barriers (OTB), e-teaching, primary school, teachers, technology

Procedia PDF Downloads 194
5471 Academic Success, Problem-Based Learning and the Middleman: The Community Voice

Authors: Isabel Medina, Mario Duran

Abstract:

Although Problem-based learning provides students with multiple opportunities for rigorous instructional experiences in which students are challenged to address problems in the community; there are still gaps in connecting community leaders to the PBL process. At a south Texas high school, community participation serves as an integral component of the PBL process. Problem-based learning (PBL) has recently gained momentum due to the increase in global communities that value collaboration and critical thinking. As an instructional approach, PBL engages high school students in meaningful learning experiences. Furthermore, PBL focuses on providing students with a connection to real-world situations that require effective peer collaboration. For PBL leaders, providing students with a meaningful process is as important as the final PBL outcome. To achieve this goal, STEM high school strategically created a space for community involvement to be woven within the PBL fabric. This study examines the impact community members had on PBL students attending a STEM high school in South Texas. At STEM High School, community members represent a support system that works through the PBL process to ensure students receive real-life mentoring from business and industry leaders situated in the community. A phenomenological study using a semi-structured approach was used to collect data about students’ perception of community involvement within the PBL process for one South Texas high school. In our proposed presentation, we will discuss how community involvement in the PBL process academically impacted the educational experience of high school students at STEM high school. We address the instructional concerns PBL critics have with the lack of direct instruction, by providing a representation of how STEM high school utilizes community members to assist in impacting the academic experience of students.

Keywords: phenomenological, STEM education, student engagement, community involvement

Procedia PDF Downloads 88
5470 Analysis of Access Pattern to School and Travel Risks among School Children in Benin City, Edo State, Nigeria

Authors: Barry Aifesehi Aiworo, Henry Oriakhi

Abstract:

This paper, examines the analysis of access pattern to school and travel risks among school children in Benin City, Edo State, Nigeria. The risk includes accident, molestation (sexually) and kidnapping. The objective of this paper are to examine the various means (modes) of transport to school; determine the type and incidences of risk experienced by school children in the study area; examine the risk incidences and ages of school children in the study area. Hypothesis which states that the types of risks encountered by school children are independent of means of transport was tested using the chi-square test (X2). A sampling ratio of twelve percent (12%) was taken from 396 schools in Benin City. By implication, 49 schools were randomly selected in Benin City for this research. A total of 42,053 students in the 49 schools constitute the sample frame for the research. Two percent (2%), 841 students were taken as the sample size. The use of stratified sampling method was applied by stratifying the study area (Benin City) into local governments- Egor, Ikpoba-Okha and Oredo. Thereafter, the lists of schools in the various local governments were obtained from the Ministry of Education before the schools for research were randomly chosen from each local government area. The analysis revealed that 6.7% of the total students interviewed have been involved in road accidents. 1.04% of the total respondents said at one time or the other that they have been kidnapped. Finally, the research found that travel is comparatively safe and believes this may be partly attributable to safer route to schools and school children being more familiar with the school journey. The research indicates that children aged between eleven and fifteen are most at risk of hit or knocked down on Benin City’s roads. These findings may help in planning and targeting road safety initiative (education, campaigns) in Benin City.

Keywords: accident, molestation (sexually), kidnapping, pedophile, pedestrian

Procedia PDF Downloads 207
5469 Effects of Irregular Migration from Different Aspects of Security

Authors: Muzaffer Topgul, Hasan Atac

Abstract:

In case of explaining the migration concept, although it is not a new phenomenon, it is easy to understand that communities have migrated for variety of reasons such as natural disasters, famine, wars, economic problems, and several theories have been put forth to define and find solution for migration within its changing nature. Examining of migration theories denotes that the circumstances under which they appear reflect political, social, and economic conditions of the age they appear. In this day and time, security is considered not only from military perspective but also from economic, political, sociological dimensions. Based on the changing security environment new impacts of migration has occurred; the migration is proceed to be conferred as a type of war, qualified as a transnational crime because of its outcomes and interpreted in a different dimension owing to its effects on the health and education areas. Social security dimension in the context of expanding concept of security; when dealing with the safety of people and social groups with the assumption that national unity and identity are threatened, it sees immigrants as a source of threat. The human security assesses the safety of individuals in terms of survival and quality of life. Changes in the standard of living under the influence of immigrants and possible terrorist acts can be seen as a threat source in this type of security. Economic security of the individuals and the regional changes at the micro level created by the immigrants are covered issues of economic security. Due to the factors such as terrorism and civil war, the increasing numbers of displaced people who have taken refugee status affect the countries, whether it is near or far to the crisis areas, in the new and different dimensions of security day by day. In this study, the term of immigration through the eyes of national and international law will be evaluated, the place of the irregular and illegal immigration in the changing security sphere will be revealed and the effects of the irregular migration to short-term, mid-term and long-term security issues will be assessed through human and social security aspects. In order to analyze the threats for the human security; the parameters such as living conditions of the immigrants, the ratio of the genders, birth rate occasions, the education circumstances of the immigrant children and the effects of the illegal passing on the public order will be evaluated. The outcomes of the problem areas for the human security and the demographic alteration resulting from the human flow of displaced people will be discussed thorough social security extent. The fizzling economic diversity, which has shown up by irregular migration, will be presented within the scope of economic dimension of security.

Keywords: irregular migration, the changing dimensions of security, human security, social security

Procedia PDF Downloads 327
5468 Security Analysis and Implementation of Achterbahn-128 for Images Encryption

Authors: Aissa Belmeguenai, Oulaya Berrak, Khaled Mansouri

Abstract:

In this work, efficiency implementation and security evaluation of the keystream generator of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written with MATLAB.7.5. First of all, two different original images are used to validate the proposed design. The developed program is used to transform the original images data into digital image file. Finally, the proposed program is implemented to encrypt and decrypt images data. Several tests are done to prove the design performance, including visual tests and security evaluation.

Keywords: Achterbahn-128, keystream generator, stream cipher, image encryption, security analysis

Procedia PDF Downloads 310
5467 The Role of Teaching Assistants for Deaf Pupils in a Mainstream Primary School in England

Authors: Hatice Yildirim

Abstract:

This study was an investigation into the role of teaching assistants (TAs) for deaf pupils in an English primary school. This study aimed to provide knowledge about how TAs support deaf pupils in mainstream schools in England. It is accepted that TAs have an important role in the inclusion of students with disabilities in mainstream schools. However, there has been a lack of attention paid to the role of TAs for deaf pupils in the literature. A qualitative case study approach was used to address the research questions. Twelve semi-structured classroom observations and six semi-structured interviews were carried out with four TAs and two teachers in one English mainstream primary school. The data analysis followed a thematic analysis framework. The results indicated that TAs are utilised based on a one-on-one support model and are deployed under the class teachers in the classroom. The classroom activities are carried out in small groups with the TAs and the class teacher’s agreement, as per the school’s policy. Findings show that TAs carried out seven different roles in the education of deaf pupils in an English mainstream primary school. Supporting the academic and social development of deaf pupils is TA`s main role. Also, they record pupils’ progress, communicate with pupils’ parents, take on a pastoral care role, tutor pupils in additional support lessons and raise awareness of deaf pupils’ issues.

Keywords: deaf, mainstream primary school, teaching assistant, teaching assistant`s roles

Procedia PDF Downloads 197
5466 Training Can Increase Knowledge and Skill of Teacher's on Measurement and Assessment Nutritional Status Children

Authors: Herawati Tri Siswati, Nurhidayat Ana Sıdık Fatimah

Abstract:

The Indonesia Basic Health Research, 2013 showed that prevalence of stunting of 6–12 children years old was 35,6%, wasting was 12,2% and obesiy was 9,2%. The Indonesian Goverment have School Health Program, held in coordination, plans, directing and responsible, developing and implement health student. However, it's implementation still under expected, while Indonesian Ministry of Health has initiated the School Health Program acceleration. This aimed is to know the influencing of training to knowledge and skill of elementary school teacher about measurement and assesment nutrirional status children. The research is quasy experimental with pre-post design, in Sleman disctrict, Yogyakarta province, Indonesia, 2015. Subject was all of elementary school teacher’s who responsible in School Health Program in Gamping sub-district, Sleman, Yogyakarta, i.e. 32 persons. The independent variable is training, while the dependent variable are teacher’s klowledge and skill on measurement and assesment nutrirional status children. The data was analized by t-test. The result showed that the knowledge score before training is 31,6±9,7 and after 56,4±12,6, with an increase 24,8±15,7, and p=0.00. The skill score before training is 46,6±11,1 and after 61,7±13, with an increase 15,2±14,2, p = 0.00. Training can increase the teacher’s klowledge and skill on measurement and assesment nutrirional status.

Keywords: training, school health program, nutritional status, children.

Procedia PDF Downloads 384
5465 Behavioral Similarities between Perpetrators of School Violence and Having a Parent Incarcerated during Adolescence

Authors: Darynne Madison Dela Gente, Panayiota Courelli

Abstract:

Similarities in behavior between perpetrators of school violence and those with a parent in prison raise concern when considering the root causes of a student’s violent behavior. Dealing with parental incarceration is highly consequential on a student’s emotional well-being and may cause aggressive behavior that can lead to them becoming a perpetrator of school violence. These students are more likely to have interpersonal issues, antisocial tendencies, and a hostile demeanor, which are factors that closely align with indicators of an offender of violence. Developmental risk factors of parental incarceration are heavily understudied and often overlooked. This literature review aims to analyze the correlation between having a parent in prison and exhibiting physical or verbal aggression in a school environment. Furthermore, it strives to bring awareness to the inconsistencies in existing research and encourage a greater depth of study of the behavioral impacts, specifically in an academic setting. Furthermore, it will elaborate on the effectiveness of current intervention programs, such as Project Avary, Hope House, Kids Mates Inc., and Girl Scouts Beyond Bars, which provide immense support, as well as proposed methods of implementation in a school environment. Creating a space for these students to cope ultimately aids in the prevention of violent behaviors and intergenerational incarceration. Access to intervention programs, especially in schools located in areas with high rates of incarceration, would greatly reduce the risk of these students becoming perpetrators of school violence.

Keywords: adolescent behavior, adolescent mental health, parental incarceration, school violence prevention

Procedia PDF Downloads 89
5464 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software

Authors: Carlos Gonzalez

Abstract:

This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.

Keywords: internet, secure software, threats, cryptography process

Procedia PDF Downloads 327
5463 Intensive Intercultural English Language Pedagogy among Parents from Culturally and Linguistically Diverse Backgrounds (CALD)

Authors: Ann Dashwood

Abstract:

Using Standard Australian English with confidence is a cultural expectation of parents of primary school aged children who want to engage effectively with their children’s teachers and school administration. That confidence in support of their children’s learning at school is seldom experienced by parents whose first language is not English. Sharing language with competence in an intercultural environment is the common denominator for meaningful communication and engagement to occur in a school community. Experience in relevant, interactive sessions is known to enhance engagement and participation. The purpose of this paper is to identify a pedagogy for parents otherwise isolated from daily use of functional Australian cultural language learned to engage effectively in their children’s learning at school. The outcomes measure parents’ intercultural engagement with classroom teachers and attention to the school’s administrative procedures using quantitative and qualitative methods. A principled communicative task-based language learning approach, combined with intercultural communication strategies provide the theoretical base for intensive English inquiry-based learning and engagement. The quantitative analysis examines data samples collected by classroom teachers and administrators and parents’ writing samples. Interviews and observations qualitatively inform the study. Currently, significant numbers of projects are active in community centers and schools to enhance English language knowledge of parents from Language Backgrounds Other Than English (LBOTE). The study is significant to explore the effects of an intensive English pedagogy with parents of varied English language backgrounds, by targeting inquiry-based language use for social interactions in the school and wider community, specific engagement and cultural interaction with teachers and school activities and procedures.

Keywords: engagement, intercultural communication, language teaching pedagogy, LBOTE, school community

Procedia PDF Downloads 116
5462 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.

Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law

Procedia PDF Downloads 378
5461 Effectiveness of Radon Remedial Action Implemented in a School on the Island of Ischia

Authors: F. Loffredo, M. Quarto, M. Pugliese, A. Mazzella, F. De Cicco, V. Roca

Abstract:

The aim of this study is to evaluate the efficacy of radon remedial action in a school on the Ischia island, South Italy, affected by indoor radon concentration higher than the value of 500 Bq/m3. This value is the limit imposed by the Italian legislation, to above which corrective actions in schools are necessary. Before the application of remedial action, indoor radon concentrations were measured in 9 rooms of the school. The measurements were performed with LR-115 passive alpha detectors (SSNTDs) and E-Perm. The remedial action was conducted in one of the office affected by high radon concentration using a Radonstop paint applied after the construction of a concrete slab under the floor. The effect of remedial action was the reduction of the concentration of radon of 41% and moreover it has demonstrated to be durable over time. The chosen method is cheap and easy to apply and it could be designed for various types of building. This method can be applied to new and existing buildings that show high dose values.

Keywords: E-Perm, LR 115 detectors, radon remediation, school

Procedia PDF Downloads 223
5460 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 415
5459 Servant Leadership and Organisational Climate in South African Private Schools: A Qualitative Study

Authors: Christo Swart, Lidia Pottas, David Maree

Abstract:

Background: It is a sine qua non that the South African educational system finds itself in a profound crisis and that traditional school leadership styles are outdated and hinder quality education. New thinking is mandatory to improve the status quo and school leadership has an immense role to play to improve the current situation. It is believed that the servant leadership paradigm, when practiced by school leadership, may have a significant influence on the school environment in totality. This study investigates the private school segment in search of constructive answers to assist with the educational crises in South Africa. It is assumed that where school leadership can augment a supportive and empowering environment for teachers to constructively engage in their teaching and learning activities - then many challenges facing by school system may be subjugated in a productive manner. Aim: The aim of this study is fourfold. To outline the constructs of servant leadership which are perceived by teachers of private schools as priorities to enhance a successful school environment. To describe the constructs of organizational climate which are observed by teachers of private schools as priorities to enhance a successful school environment. To investigate whether the participants perceived a link between the constructs of servant leadership and organizational climate. To consider the process to be followed to introduce the constructs of SL and OC the school system in general as perceived by participants. Method: This study utilized a qualitative approach to explore the mediation between school leadership and the organizational climate in private schools in the search for amicable answers. The participants were purposefully selected for the study. Focus group interviews were held with participants from primary and secondary schools and a focus group discussion was conducted with principals of both primary and secondary schools. The interview data were transcribed and analyzed and identical patterns of coded data were grouped together under emerging themes. Findings: It was found that the practice of servant leadership by school leadership indeed mediates a constructive and positive school climate. It was found that the constructs of empowerment, accountability, humility and courage – interlinking with one other - are prominent of servant leadership concepts that are perceived by teachers of private schools as priorities for school leadership to enhance a successful school environment. It was confirmed that the groupings of training and development, communication, trust and work environment are perceived by teachers of private schools as prominent features of organizational climate as practiced by school leadership to augment a successful school environment. It can be concluded that the participants perceived several links between the constructs of servant leadership and organizational climate that encourage a constructive school environment and that there is a definite positive consideration and motivation that the two concepts be introduced to the school system in general. It is recommended that school leadership mentors and guides teachers to take ownership of the constructs of servant leadership as well as organizational climate and that public schools be researched and consider to implement the two paradigms. The study suggests that aspirant teachers be exposed to leadership as well as organizational paradigms during their studies at university.

Keywords: empowering environment for teachers and learners, new thinking required, organizational climate, school leadership, servant leadership

Procedia PDF Downloads 212
5458 Challenges of Teaching Physical Education to Students With Special Needs in Regular School Settings

Authors: Christine Okello

Abstract:

Physical Education (PE) curriculum provides school age students to explore issues that are likely to impact on health, safety, and well-being. The current curriculum includes the physical activity component, intended to improve physical fitness, social skills as well as building confidence. While this viewpoint is vital, there are challenges and stigma attached when specific issues are either ignored, inadequately addressed, or not seen to be important. The department stipulates that students attend a school that is closest to their home, to access available government transportation to and from school. Equivalently, parents of students with a disability decide where their children attend school. A choice between a regular classroom, mainstream Special Unit classroom, or a School for Specific Purposes (SSP). Parents who take their children to regular schools may be oblivious of the details of the curriculum. Physical Education outcomes does not stipulate the extent to which a student must perform or expected to perform. It is therefore due to the classroom teacher to adjust their teaching goals or outcomes to suit all students in their classroom. A student who can run a hundred meters race in 20 seconds may belong in the same classroom as a student in a wheelchair. While these students are challenged because of a lack of performance, teachers are challenged to effectively teach successful PE lessons, and on the other hand students without a disability may not be able to attain their optimum. This paper will identify areas of need, address the challenges, and explore a possible solution.

Keywords: special needs, disability, challenges, physical education

Procedia PDF Downloads 56
5457 Developmental Trajectories and Predictors of Adolescent Depression: A Short Term Study

Authors: Hyang Lim, Sungwon Choi

Abstract:

Many previous studies in area of adolescents' depression have used a longitudinal design. The previous studies have found that the developmental trajectory of them is only one. But it needs to be examined whether the trajectory is applied to all adolescents. Some factors in their home and/or school have an effect on adolescents' depression and more likely to be specific groups. The present study was a longitudinal study aimed to identify the trajectories and to explore the predictors of adolescents' depression. The study used Korean Children and Youth Panel Survey (KCYPS) data. In this study, 2,351 second and third-year of middle school and first of high school students' data was analyzed by using semi-parametric group modeling (SGM). There were 5 trajectory groups for adolescents; low depressed stables, low depressed risers, moderately depressed decreases, moderately depressed stables, severe depressed decreases. The predictors of adolescents' depression were parental abuse, parental neglect, annual family income, parental academic background, friendship at school, and teacher-student relationship at school. All predictors had the significant difference across trajectory group profile for adolescents. The findings of the present study recommend to promote the socioeconomic status and to train social skill for the interpersonal relationship at the home and school. And the results suggest that the proper prevention programs for each group in the middle adolescents that target selected factors may be helpful in reducing the level of depression.

Keywords: adolescent, depression, KCYPS, school life, semi-parametric group-based modeling

Procedia PDF Downloads 444
5456 Alternative Futures for the Middle East

Authors: Dorsa Bakhshandehgeyazdi

Abstract:

This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.

Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group

Procedia PDF Downloads 291
5455 Assessing EU-China Security Interests from Contradiction to Convergence

Authors: Julia Gurol

Abstract:

Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.

Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security

Procedia PDF Downloads 278
5454 Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla

Authors: Marco Antonio Lara De la Calleja, María Catalina Ovando Chico, Eduardo Lopez Ruiz

Abstract:

Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security.

Keywords: community empowerment, food security, model, systemic approach

Procedia PDF Downloads 368
5453 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 302
5452 Teachers’ and Students’ Causal Explanations for Classroom Misbehavior: Similarities and Differences

Authors: Rachel C. F. Sun

Abstract:

This study aimed to examine the similarities and differences between teachers’ and students’ causal explanations of classroom misbehavior. In-depth semi-structured interviews were conducted with twelve teachers and eighteen Grade 7-9 students. The qualitative data were analyzed, in which the attributed causes of classroom misbehavior were categorized into student, family, school, and peer factors. Findings showed that both interviewed teachers and students shared similarity in attributing to student factors, such as ‘fun and pleasure seeking’ and ‘attention seeking’ as the leading causes of misbehavior. However, the students accounted to school factors, particularly ‘boring lessons’ as the next attributed causes, while the teachers accounted to family factors, such as ‘lack of parent demandingness’. By delineating the factors at student, family, school, and peer levels, these findings help drawing corresponding implications for preventing and mitigating misbehavior in school.

Keywords: causal explanation, misbehavior, student, teacher

Procedia PDF Downloads 351
5451 Costa and Mccrae's Neo-Pi Factor and Early Adolescents School Social Adjustment in Cross River State Nigeria

Authors: Peter Unoh Bassey

Abstract:

The study examined the influence of Costa and McCrae’s Neo-PI Factor and early adolescent’s school social adjustment in Cross River State, Nigeria. The research adopted the causal-comparative design also known as the ex-post facto with about one thousand and eighteen (1,018) students who were randomly selected from one stream of JSS 1 classes in 19 schools out of seventy-three (73) in the study area. Data were collected using two instruments one is the NEO-PI scale, and students school social adjustment questionnaire. Three research questions and three research hypotheses were postulated and tested at 0.05 level of significance. The analysis of data was carried out using both the independent t-test statistics and the one-way analysis of variance (ANOVA). The analyzed result indicated that the five dimensions had a significant influence on students school social adjustment. A post hoc was equally carried out to show the relative significant difference among the study variables. In view of the above, it was recommended that teachers, parents and educational psychologists should be involved to enhance students the confidence to overcome their social adjustment problem.

Keywords: Costa and McCrae’s NEO-PI Factor, early adolescents, school, social adjustment

Procedia PDF Downloads 141
5450 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain

Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani

Abstract:

The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.

Keywords: blockchain, hyperledger fabric, internet of things, security, traceability

Procedia PDF Downloads 144
5449 Information Society-Education Space

Authors: Monica Lia

Abstract:

This paper has set the objective of researching how education is influenced by the information society. The first step was to define more precisely the information space. Second step was to identify how information space intersects the family space and institutional space educational levels represented by pre-school / school and pre-university (kindergarten, at elementary / middle school / high school). Interrelationship between the above-mentioned areas was another objective of the research. All these elements have been investigated through the original intention to identify how the information space can become an educational tool to support for the family space, education and institutional space. In addition, the aim of this research is to offer some solutions in this regard. Often the educational efforts appear to be blocked by the existence of this space. However, this paper demonstrates that Informational space can be an enemy of the educational system or be support systems if we know the internal structure and mechanisms. We can make the Informational Space to work for accomplish the educational objectives.

Keywords: informational space, education, educational tool, social diagram, information, information structure, lessons

Procedia PDF Downloads 331
5448 Shifting of Global Energy Security: A Comparative Analysis of Indonesia and China’s Renewable Energy Policies

Authors: Widhi Hanantyo Suryadinata

Abstract:

Efforts undertaken by Indonesia and China to shift the strategies and security of renewable energy on a global stage involve approaches through policy construction related to rare minerals processing or value-adding in Indonesia and manufacturing policies through the New Energy Vehicles (NEVs) policy in China. Both policies encompass several practical regulations and policies that can be utilized for the implementation of Indonesia and China's grand efforts and ideas. Policy development in Indonesia and China can be analyzed using a comparative analysis method, as well as employing a pyramid illustration to identify policy construction phases based on the real conditions of the domestic market and implemented policies. This approach also helps to identify the potential integration of policies needed to enhance the policy development phase of a country within the pyramid. It also emphasizes the significance of integration policy to redefine renewable energy strategy and security on the global stage.

Keywords: global renewable energy security, global energy security, policy development, comparative analysis, shifting of global energy security, Indonesia, China

Procedia PDF Downloads 61
5447 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 203
5446 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services

Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar

Abstract:

This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.

Keywords: civil-id disclosure, awareness, linear regression, multiple regression

Procedia PDF Downloads 51