Search results for: security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5137

Search results for: security awareness

4747 Fostering Positive Mindset: Grounded Theory Study of Self-Awareness in Emerging Adults

Authors: Maha Ben Salem

Abstract:

The transformative aspect of emerging adulthood brings about a development of self-processes, including changes in self-esteem and personal goals. Success in this life stage entails the emotional growth necessary to navigate the demands and challenges of college life. Understanding the concept of self-awareness within this particular age group sheds light on emerging adults’ internal world and the transformative aspect of their emotional growth. Uncovering the thoughts' processes that foster or hinder self-awareness is important to the understanding of how emerging adults learn to make themselves positive or negative. However, existing research in self-awareness has explored this phenomenon mostly using quantitative research methodology or through tying an individual’s level of self-awareness to specific actions or outcomes. Little is known about the process of how college students emerging adults notice and monitor their inner thoughts and emotions. Methodology and theoretical orientation: A grounded theory study using in-depth semi-structured interview was utilized. Nine interviews have been conducted. A constructionist framework was employed to generate a theory as for how self-awareness facilitates specific patterns of thinking in emerging adults. The choice of grounded theory emanates from a lack of knowledge regarding underlying thinking procedures and internal states that emerging adult college students navigate in an attempt to make meaning out of the new academic experience and life stage. Findings: Initial data analysis generated the following categories of the theory: (a) a non-judgmental perception of negative thinking and negative emotions that allow for a better understanding of the self; (b) negative state of mind is easy to overcome when it is accepted and acknowledged; (c) knowledge of the actual and desired self-generates an intentional decision to shift to a positive mindset. Preliminary findings indicate that college academic and social environment foster a new understanding of the self that yield a change in mindset and in self-knowledge.

Keywords: college environment, emergent adults, grounded theory, positive mindset, self-awareness

Procedia PDF Downloads 110
4746 Inter-Departmental Survey to Check the Impact of Bio-Safety Training Sessions among Lab Employees

Authors: Noorulaine Maqsood, Saeed Khan

Abstract:

Background: Concern regarding incident reporting and bio-safety training in clinical laboratories in Pakistan has increased remarkably in the last few years due to rapid increase in diagnosis and research on infectious organisms. In order to ensure the safety of employees, this issue needs to be addressed immediately. Bio-safety training sessions and lectures are necessary for the protection of laboratory workers in order to ensure safe practices and minimize the count of incident reporting in the lab. Objective: To carry out an inter-departmental survey in lab regarding the awareness of bio-safety practices among lab employees before and after conducting bio-safety training sessions. Methodology: We conducted a 30 questions survey of laboratory workers in June 2013 (before training session) to gather information related to bio-safety awareness. Afterwards, we conducted another survey after training sessions and workshops related to bio-safety. Result: The survey regarding bio-safety level showed that before the training session 32% of the participants were aware of bio-safety level being used in their lab whereas after the session this percentage increased to 72%. 48% of the participants had information about the proper usage of PPE which increased to 76%. Awareness regarding proper management of hazardous waste increased from 32% to 64%. The incident reporting practice, sample handling and hand hygiene awareness was previously reported to be 40%, 65%, and 52% that increased to 80%, 85% and 88% respectively after the training session was completed. Conclusion: The first survey results showed lack of awareness that suggest nearly all senior scientists, faculty, medical technologist, lab attendant and housekeeping staff working in laboratories are required to have bio-safety training, and required inspection at least twice a year by a bio-safety officer and also required to renew their bio-safety training. After the training session, significant changes in awareness level and attitude of the participants regarding biosafety practices were observed. Therefore, such bio-safety sessions should be carried out regularly in clinical laboratories.

Keywords: biosafety practices, clinical laboratory, Pakistan, survey

Procedia PDF Downloads 405
4745 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 541
4744 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 454
4743 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 51
4742 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 362
4741 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 305
4740 The Role of Public Education in Increasing Public Awareness through Mass Media with Emphasis on Newspapers and TV: Coping with Possible Earthquake in Tehran

Authors: Naser Charkhsaz, Ashraf Sadat Mousavi, Navvab Shamspour

Abstract:

This study aimed to evaluate the role of state education in increasing public awareness through mass media (with emphasis on newspapers and TV) coping with possible earthquake in Tehran. All residents aged 15 to 65 who live in the five regions of Tehran (North, South, East, West and Center) during the plan implementation were selected and studied. The required sample size in each region was calculated based on the Cochran formula (n=380). In order to collect and analyze the data, a questionnaire with reliability (82%) and a one-sample t-test has been used, respectively. The results showed that warnings related to the Tehran earthquake affected people in the pre-contemplation stage, while public education through mass media did not promote public awareness about prevention, preparedness and rehabilitation.

Keywords: media, disaster, knowledge, Iranian Red Crescent society

Procedia PDF Downloads 297
4739 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 346
4738 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 326
4737 Digital Image Steganography with Multilayer Security

Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal

Abstract:

In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.

Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix

Procedia PDF Downloads 313
4736 Eco-Mini Bag: Mini trash Bag for Children Environment Awareness

Authors: Asep Adianto, Rinda Ulfah L., Wellya Wichi M., Lasmaria Manik

Abstract:

Garbage is the waste result of daily human activity which is in some to countries can leads to a crucial problem. It is realized that garbage can brings to disastrous consequences for the environment and humans. Piles of garbage will cause to overflow disaster and health problems for human being. Basically, garbage can be processed into recycled products or other utilization. However, in some cases, awareness of environment cleanliness by throwing the garbage to the dustbin is still lacking, in both adults and children. Children tend to do things based on their visual observations without thinking about the impact of their actions. Associated with awareness of cleanliness, children often littering due to the reluctance on throwing garbage to the dustbin because in some place, it’s not that easy to find where the dustbin is. The obstacle should be accommodated by making some kind of compatible dustbin. In addition, the influence of the social environment and lack of education to environmental concerns makes it even worse. Therefore, we need a method to educate people, especially children, to always care about the environment and neighborhood they live in. Because of the intended target is children, the required method should be fun, easy to do, and it doesn’t contain any compulsion act. Therefore, Eco-Mini Bag is one of considerable method to educate children in society to become more aware about environment cleanliness. Eco-Mini bag is a kind of compatible dustbin and it’s going to prevent the children not to throwing garbage in reckless way. In brief, Eco-Mini bag can increase the environment awareness on children and the whole society through exciting and convenience way.

Keywords: children, eco-mini bag, environment, garbage

Procedia PDF Downloads 292
4735 Raising Intercultural Awareness in Colombia Classrooms: A Descriptive Review

Authors: Angela Yicely Castro Garces

Abstract:

Aware of the relevance that intercultural education has gained in foreign language learning and teaching, and acknowledging the need to make it part of our classroom practices, this literature review explores studies that have been published in the Colombian context from the years 2012 to 2019. The inquiry was done in six national peer-reviewed journals, in order to examine the population benefited, types of studies and most recurrent topics of concern for educators. The findings present a promising panorama as teacher educators from public universities are leading the way in conducting research projects aimed at fostering intercultural awareness and building a critical intercultural discourse. Nonetheless, more studies that involve the different stakeholders and contexts need to be developed, in order to make intercultural education more visible in Colombian elementary and high school classrooms.

Keywords: Colombian scholarship, foreign language learning, foreign language teaching, intercultural awareness

Procedia PDF Downloads 118
4734 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective

Authors: Obinna Emmanuel Nkomadu

Abstract:

A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.

Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea

Procedia PDF Downloads 127
4733 An Explorative Study: Awareness and Understanding of Dyspraxia amongst Parents of Preschool Children Presenting with Dyspraxia

Authors: A. Pedro, T. Goldschmidt

Abstract:

Dyspraxia affects approximately 5-6% of school aged children. Utilising an ecological framework, this study aimed to (1) explore the awareness and understanding of dyspraxia or similar disorders among preschool parents and (2) to explore what skills are required or sought after by parents of children presenting with dyspraxia. A qualitative methodological approach with an exploratory design was employed in this study. A total of 15 parents were purposively selected from urban mainstream preschools in the Cape Town metropole region. Data were collected by means of semi-structured interviews and analysed thematically according to Braun and Clarke (2006). Participants were knowledgeable of their rights throughout the research process. The findings reveal that parents understanding of dyspraxia hinges on observable characteristics of their children’s abilities in comparison to typically developing children. Although parents are aware of ways to explore various avenues to better assist their child, they desire more social support and skills in terms of resources to inform them about their child’s difficulties as well as different techniques to better manage their child’s condition. Findings indicate that regular contact between preschool teachers and parents of children presenting with dyspraxia is an important factor in children’s academic success. The implications of the findings are related to the awareness of dyspraxia and similar learning disorders among both parents and teachers.

Keywords: awareness and understanding, dyspraxia, parents, preschool

Procedia PDF Downloads 132
4732 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 91
4731 Crowdalert: An Android Application for Increasing the Awareness and Response Initiatives of the Citizens through Crowdsourcing

Authors: John Benedict Bernardo

Abstract:

Crowdsourcing is a way of collecting information provided by the volunteers. This crowdsourced information has the capacity to increase the people’s situational awareness in times of disasters. The research reflected in this paper strives to demonstrate the benefits of crowdsourcing during natural disasters and the ways of utilizing it for disaster response. Shared information regarding natural disasters from social media is often scattered as the inputs from these media are uncategorized. For this reason, the study aims to equip the citizens a medium that is solely intended for sharing and/or obtaining natural disaster-related information. Ergo, an android application was developed to gather and publicize this volunteered information. The capability of crowdsourcing and the effectiveness of the application were evaluated and the result shows overwhelming agreement that this study is indeed efficient in increasing the awareness and response initiatives of the citizens during natural disasters.

Keywords: crowdsourcing, natural disasters, mobile application, social media

Procedia PDF Downloads 298
4730 EFL Teachers’ Metacognitive Awareness as a Predictor of Their Professional Success

Authors: Saeedeh Shafiee Nahrkhalaji

Abstract:

Metacognitive knowledge increases EFL students’ ability to be successful learners. Although this relationship has been investigated by a number of scholars, EFL teachers’ explicit awareness of their cognitive knowledge has not been sufficiently explored. The aim of this study was to examine the role of EFL teachers’ metacognitive knowledge in their pedagogical performance. Furthermore, the role played by years of their academic education and teaching experience was also studied. Fifty female EFL teachers were selected. They completed Metacognitive Awareness Inventory (MAI) that assessed six components of metacognition including procedural knowledge, declarative knowledge, conditional knowledge, planning, evaluating, and management strategies. Near the end of the academic semester, the students of each class filled in ‘the Language Teacher Characteristics Questionnaire’ to evaluate their teachers’ pedagogical performance. Four elements of MAI, declarative knowledge, planning, evaluating, and management strategies were found to be significantly correlated with EFL teachers’ pedagogical success. Significant correlation was also established between metacognitive knowledge and EFL teachers’ years of academic education and teaching experience. The findings obtained from this research have contributing implication for EFL teacher educators. The discussion concludes by setting out directions for future research.

Keywords: metacognotive knowledge, pedagogical performance, language teacher characteristics questionnaire, metacognitive awareness inventory

Procedia PDF Downloads 310
4729 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 453
4728 Knowledge, Awareness and Practices Concerning of Breast Cancer among Nursing Students in Sri Lanka

Authors: Vimarshi Sandamali Godigamuwa

Abstract:

Background: Breast cancer is the leading cause of cancer mortality in women worldwide. Its incidence is increasing and young women affected more than ever. Nursing students are the future nurses who will have the opportunity to encourage and influence women to be aware of breast cancers. Objectives: To determine the level of knowledge, awareness and practices concerning of breast cancer among Sri Lankan student nurses. Methods: A descriptive cross sectional study was conducted on 150 nursing students who are in their 2nd and 3rd year studies by distributing a standard self-administered questionnaire. The completed questionnaire were retrieved, graded and scored. Results: Mean age of the respondents was 24.27; (SD=1.66) years and ranged from 20-30 years. Most of the students were female which was 85%. 32% of nursing students scored below 55% for the questionnaire and only 7.3% had good overall knowledge and awareness of breast cancer. Out of 128 female students 89.9% were answered that they know how to perform Breast Self Examination (BSE), out of which 37% of them performed BSE regularly. Only 33% were aware of recommended age for BSE and 10% were knew the recommended age for mammography. 9.3% were aware of frequency for Clinical Breast Examination on 20-39 years of age group. Of the female participants, 11.7% reported positive family history of breast cancer. Conclusion: Nursing students should explore to health educational programs on regular basis on breast cancer and its screening methods. Further studies are needed to identify reasons for not practicing BSE.

Keywords: breast cancer, student nurses, knowledge, awareness, practice, BSE

Procedia PDF Downloads 428
4727 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 151
4726 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s

Authors: Zunjarrao Kadam, Vikas Minchekar

Abstract:

The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.

Keywords: experimentally induced stress, facial recognition, cognition, security personnel

Procedia PDF Downloads 237
4725 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry

Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim

Abstract:

Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.

Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain

Procedia PDF Downloads 67
4724 Dynamic Process Model for Designing Smart Spaces Based on Context-Awareness and Computational Methods Principles

Authors: Heba M. Jahin, Ali F. Bakr, Zeyad T. Elsayad

Abstract:

As smart spaces can be defined as any working environment which integrates embedded computers, information appliances and multi-modal sensors to remain focused on the interaction between the users, their activity, and their behavior in the space; hence, smart space must be aware of their contexts and automatically adapt to their changing context-awareness, by interacting with their physical environment through natural and multimodal interfaces. Also, by serving the information used proactively. This paper suggests a dynamic framework through the architectural design process of the space based on the principles of computational methods and context-awareness principles to help in creating a field of changes and modifications. It generates possibilities, concerns about the physical, structural and user contexts. This framework is concerned with five main processes: gathering and analyzing data to generate smart design scenarios, parameters, and attributes; which will be transformed by coding into four types of models. Furthmore, connecting those models together in the interaction model which will represent the context-awareness system. Then, transforming that model into a virtual and ambient environment which represents the physical and real environments, to act as a linkage phase between the users and their activities taking place in that smart space . Finally, the feedback phase from users of that environment to be sure that the design of that smart space fulfill their needs. Therefore, the generated design process will help in designing smarts spaces that can be adapted and controlled to answer the users’ defined goals, needs, and activity.

Keywords: computational methods, context-awareness, design process, smart spaces

Procedia PDF Downloads 296
4723 Insights and Inferences Associated with Subscription of Health Insurance in the Informal Sector of India

Authors: Harinder Singh

Abstract:

The paper sheds light on the perceptions of the uninsured workers employed in the urban informal sector of India, towards the health insurance. In addition to this, it also explores the association of the identified perceptions with household decisions to enroll for health insurance schemes in India. Firstly the data taken from the primary survey of the uninsured workers employed in the urban informal sector was analyzed using exploratory factor analysis to evaluate the perceptions. Thereafter, logistic regression was employed to determine the association of the identified perceptions regarding the enrollment. Our study identifies twelve perceptions related to the health insurance enrollment of the uninsured workers employed in the urban informal sector of India. The study demonstrates that perceptions have the strongest association with the voluntary enrollment. These specifically relate to the lack of awareness about the need to buy health insurance; comprehensive coverage; income constraint; future contingencies and social obligations; lack of information; availability of subsidized government health care; linkage with government hospitals and preference for government schemes. Conclusions: Along with the food security, health security has become a crying need of the workers employed in the informal sector and the time has come to scale up the health insurance schemes for them in the country. Policy makers or marketers of health insurance policies should recognize the household perceptions as a potential barrier and try to develop a health insurance package as per the actual needs of the informal sector (low income) in India.

Keywords: association, enrollment, health insurance, informal sector, perceptions, uninsured

Procedia PDF Downloads 243
4722 A Relationship Model That Illustrates the Effect of Humorous Packaging Designs on Brand Awareness and Brand Attitude

Authors: Shu-Yuan Lin, Tung-Chin Chou

Abstract:

As products become increasingly similar in competitive markets, achieving product segmentation and differentiation through packaging design has become the primary task when designing retail product packaging. When the main focus of brand marketing is no longer the product itself, emotional marketing, such as the use of humorous packaging designs, may be employed to successfully promote the brand. Such efforts will capture the hearts of consumers, generate discussions, and allow the brand to leave a deep impression in consumers. In this study, snack packaging was used to develop a relationship model that illustrated the effect of humorous packaging designs on brand awareness and brand attitude. The study was divided into three stages: In the first stage, in-depth interviews and focus group interviews were conducted with experts to construct 24 indicators for assessing humorous packaging designs. In the second stage, survey questionnaires were distributed to a young consumer group; the results showed that the group had a high and low product involvement with chocolate and dried shredded squid, respectively. Humorous packaging designs were subsequently created for two snack types to produce a study sample of 12 different packaging. In the third stage, packaging designs were evaluated by obtaining scores for the consumers’ brand awareness, brand attitude, and perceived effects of the packaging designs. Finally, a relationship model was developed to show the effect of humorous packaging designs on brand awareness and brand attitude, confirming that two perceived effects of humorous packaging designs (i.e., ‘pleasant and emotionally healing’ and ‘connected to people’s daily life’) exhibited a significant and positive effect on ‘perceived brand value,’ where the effect of ‘pleasant and emotionally healing’ was the most significant. In addition, ‘pleasant and emotionally healing’ exerted a significant and positive effect on ‘brand purchase intention.’ Furthermore, packaging designs with humorous elements helped foster brand awareness.

Keywords: brand awareness, brand attitude, humorous design, packaging design

Procedia PDF Downloads 201
4721 Neuropsychology of Social Awareness: A Research Study Applied to University Students in Greece

Authors: Argyris Karapetsas, Maria Bampou, Andriani Mitropoulou

Abstract:

The aim of the present work is to study the role of brain function in social awareness processing. Mind controls all the psychosomatic functions. Mind’s functioning enables individual not only to recognize one's own self and propositional attitudes, but also to assign such attitudes to other individuals, and to consider such observed mental states in the elucidation of behavior. Participants and Methods: Twenty (n=20) undergraduate students (mean age 18 years old) were involved in this study. Students participated in a clinical assessment, being conducted in Laboratory of Neuropsychology, at University of Thessaly, in Volos, Greece. Assessment included both electrophysiological (i.e.Event Related Potentials (ERPs) esp.P300 waveform) and neuropsychological tests (Raven's Progressive Matrices (RPM) and Sally-Anne test). Results: Initial assessment’s results confirmed statistically significant differences between the males and females, as well as in score performance to the tests applied. Strong correlations emerged between prefrontal lobe functioning, RPM, Sally-Anne test and P300 latencies. Also, significant dysfunction of mind has been found, regarding its three dimensions (straight, circular and helical). At the end of the assessment, students received consultation and appropriate guidelines in order to improve their intrapersonal and interpersonal skills. Conclusions: Mind and social awareness phenomena play a vital role in human development and may act as determinants of the quality of one’s own life. Meanwhile, brain function is highly correlated with social awareness and it seems that different set of brain structures are involved in social behavior.

Keywords: brain activity, emotions, ERP's, social awareness

Procedia PDF Downloads 170
4720 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 365
4719 Climate Change: Affecting Basic Human Rights in Bangladesh

Authors: Shekh Shadi Rahaman

Abstract:

In Bangladesh, basic human rights more specifically right to food and right to shelter are being adversely affected by the consequences of climate change. Over the last two decades, a considerable number of environmental studies revealed that basic human rights, more specifically, the right to food and right to a shelter are going to be seriously affected by climate change. Agriculture, forestry, and fisheries and livestock, which are most sensitive to climate change, are key sources interconnected with food security and the security of shelter. Consequences of climate change affecting these key sources, and with the change of time, climate change is turning into a gigantic challenge towards ensuring basic human rights in Bangladesh. This study was carried out by employing a general review of literature on climate change, focusing on effects of climate change on basic two major human rights in Bangladesh. Upon analysis of existing researches, it is found very few researches focused on correlating climate change and right to food and right to shelter. This study shows how the consequences of climate change affects food production and abode of people of Bangladesh. This study recommends that tree plantation, floating agricultural practice, co-operation with international organization, developing environment friendly institutions, increased use of renewable energy, proper management of wetlands and forests, shelter for climate induced migrated people, encouraging research and public awareness are key issues to be followed for combating climate change and protecting basic human right to food and shelter.

Keywords: achievements, agriculture and forestry, fisheries and livestock, renewable energy

Procedia PDF Downloads 110
4718 The Principle of Methodological Rationality and Security of Organisations

Authors: Jan Franciszek Jacko

Abstract:

This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.

Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics

Procedia PDF Downloads 119