Search results for: security experiences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5310

Search results for: security experiences

4920 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 405
4919 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 376
4918 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 338
4917 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 121
4916 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 675
4915 Experiences and Aspirations of Hearing Impaired Learners in Inclusive Classrooms

Authors: Raymon P. Española

Abstract:

Hearing impaired students are admitted to regular high schools in the context of inclusive education. In this setting, several academic difficulties and social struggles are disregarded by many educators. The study aimed to describe the aspirations and lived experiences in mainstream classrooms of hearing impaired students. In the research process, the participants were interviewed using sign language. Thematic analysis of interview responses was done, supplemented by interviews with teachers and classroom observations. The study revealed four patterns of experiences: academic difficulties, coping mechanisms, identification with hearing peers, and impression management. This means that these learners were struggling in inclusive classrooms, where identification with and modeling the positive qualities of hearing peers were done to cope with academic difficulties and alter negative impressions about them. By implication, these learners tended to socially immerse themselves rather than resort to isolation. Along with this tendency was the aspiration for achievement as they were eager to finish post-secondary technical-vocational education. This means aspiring for continuing social immersion into the mainstream. All these findings provide insights to K-12 educators to increase the use of collaborative techniques and experiential learning strategies, as well as to adequately address the special educational needs of these students.

Keywords: descriptive, experiences and aspirations of hearing impaired learners, inclusive classrooms, Surigao City Philippines

Procedia PDF Downloads 402
4914 Experiences and Views of Foundation Phase Teachers When Teaching English First Additional Language in Rural Schools

Authors: Rendani Mercy Makhwathana

Abstract:

This paper intends to explore the experiences and views of Foundation Phase teachers when teaching English First Additional Language in rural public schools. Teachers all over the world are pillars of any education system. Consequently, any education transformation should start with teachers as critical role players in the education system. As a result, teachers’ experiences and views are worth consideration, for they impact on learners learning and the wellbeing of education in general. An exploratory qualitative approach with the use of phenomenological research design was used in this paper. The population for this paper comprised all Foundation Phase teachers in the district. Purposive sampling technique was used to select a sample of 15 Foundation Phase teachers from five rural-based schools. Data was collected through classroom observation and individual face-to-face interviews. Data were categorised, analysed and interpreted. The findings revealed that from time-to-time teachers experiences one or more challenging situations, learners’ low participation in the classroom to lack of resources. This paper recommends that teachers should be provided with relevant resources and support to effectively teach English First Additional Language.

Keywords: the education system, first additional language, foundation phase, intermediate phase, language of learning and teaching, medium of instruction, teacher professional development

Procedia PDF Downloads 84
4913 Loving is Universal, Dating is not: Dating Experiences of International Students in Vancouver

Authors: Nel Jayson Santos

Abstract:

The growing number of international students in post-secondary institutions in Canada has positively contributed to the country’s economy and educational systems while also enriching cultural diversity in the classrooms. However, international students face social and relational challenges as they try to adapt to their host nation’s culture. One specific area of cultural adaptation among international students that has yet to be studied extensively is dating experiences and romantic relationships. Although numerous studies have been done regarding the relational challenges and dating experiences of American international students, only a few studies have focused on international students based in Canada. Hence, this study examines the dating preferences, dating challenges, and dating adaptations of international students based in Vancouver, Canada. Using a social constructivist approach, a semi-structured interview was conducted among fifteen heterosexual international college students. Inductive thematic analysis was then used to analyze the gathered data and identify common themes. Findings suggest that students’ (1) preferences were influenced by racial background and parental approval of dating partners; (2) students experienced language barriers and cultural differences; (3) students adapted through constant communication and being open-minded. Finally, the analysis intends to help counselors and psychologists in various colleges to help understand the issues of international students in terms of intimate and romantic relationships.

Keywords: higher education, international students, dating experiences, cultural adaptation

Procedia PDF Downloads 198
4912 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 83
4911 A Qualitative Study to Explore the Experiences of Muslim Nurses Working in an Acute Setting During the Covid-19 Pandemic

Authors: Sujatha Shanmugasundaram

Abstract:

Background: It has been since one year that COVID-19 has emerged into the world. Since then, healthcare professionals facing a great challenge in to fight against this deadly virus. According to World Health Organization (WHO) 2021, it is estimated that more than 131 million confirmed cases and 2million deaths around the world due to this pandemic. Nurses are the frontline workers who play a major role in safeguarding the lives of the people in acute care settings. Evidence suggests that there are numbers of research have been carried out on nurses' and healthcare provider’s experiences during the pandemic. But, unfortunately, there are no or little evidence available on Muslim nurse’s perspective. Hence, this research will investigate the experiences of Muslim nurses working in an acute care setting during the pandemic. Purpose: The purpose of the study is to explore the experiences of Muslim nurses working in an acute setting during the COVID-19 pandemic. Research Methods: A qualitative research approach will be utilized for the study. Semi-structured interview schedule will be used to collect the data. Face to face interviews will be conducted. All interviews will be conducted in Arabic, and it will be audio recorded. Verbatim will be noted. Muslim nurses working in an acute setting will be included in the study. Convenient sampling technique will be used to recruit the participants. Ethical approval will be obtained from the study sites. Strauss and Corbin's thematic analysis will be used to analyze the data. Conclusion: Considering that nurses are the frontline workers, they have a significant role in dealing with this COVID-19. It is a great challenge for the nurses working in an acute care setting. Thus, this study will bring out significant findings that will impact the nursing practice.

Keywords: acute care, COVID-19, experiences, muslim nurses

Procedia PDF Downloads 184
4910 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 454
4909 Composition Writing of the Associate in Hospitality Management Freshman Students of Cebu Technological University Tuburan Campus: Proposed Writing Skill Exercises.

Authors: Antoniette Belle R. Bontuyan

Abstract:

The aim of the study was to determine the levels of performance in Composition Writing of English 122: Writing in the Discipline of the Associate in Hospitality Management Freshman Students in relation to their reading and writing experiences at the Cebu Technological University Tuburan Campus, Academic Year 2009-2010 as basis for a proposed skill exercises. Specifically, this research answers the following questions: Firstly, based on the students’ written compositions, what the students’ levels of performance in the following are: Composition Topic with subcomponents of Topic Development, Organizational or Logical Conclusions, Accurate, Relevant Evidence or Detail, Voice/Tone/Style, and the Composition Conventions with subcomponents of Structure, Grammar and Usage, Spelling, Capitalization, Punctuation. Secondly, what the students’ extents of experiences in view of Writing and Reading Experiences are.

Keywords: COMPOSITION WRITING

Procedia PDF Downloads 305
4908 Becoming a Teacher in Kazakhstan

Authors: D. Shamatov

Abstract:

Becoming a teacher is a journey with significant learning experiences. Exploring teachers’ lives and experiences can provide much-needed insights into the multiple realities of teaching. Teachers’ stories through qualitative narrative studies help understand and appreciate the complexities of the socio-political, economic and practical realities facing teachers. Events and experiences, both past and present, that take place at home, school, and in the broader social sphere help to shape these teachers’ lives and careers. Researchers and educators share the responsibility of listening to these teachers’ stories and life experiences and being sensitive to their voices in order to develop effective models for teacher development. A better understanding of how teachers learn to become teachers can help teacher educators prepare more effective teacher education programs. This paper is based on qualitative research which includes individual and focus group interviews, as well as auto-biography stories of Master of Science in School Leadership students at Graduate School of Education of Nazarbayev University. Twenty five MSc students from across Kazakhstan reflected on their professional journey and wrote their professional autobiographies as teachers. Their autobiographies capture the richness of their experiences and beliefs as a teacher, but also serve as window to understand broader socio-economic and political contexts where these teachers live and work. The study also provides an understanding of the systemic and socio-economic challenges of teachers in the context of post-Soviet Kazakhstan. It helps the reader better understand how wider societal forces interact and frame the development of teachers. The paper presents the findings from these stories of MSc students and offers some practical and policy implications for teacher preparation and teacher development.

Keywords: becoming a teacher, Kazakhstan, teacher stories, teacher development

Procedia PDF Downloads 421
4907 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 516
4906 Language Teachers as Materials Developers in China: A Multimethod Approach

Authors: Jiao Li

Abstract:

Language teachers have been expected to play diversified new roles in times of educational changes. Considering the critical role that materials play in teaching and learning, language teachers have been increasingly involved in developing materials. Using identity as an analytic lens, this study aims to explore language teachers’ experiences as materials developers in China, focusing on the challenges they face and responses to them. It will adopt a multimethod approach. At the first stage, about 12 language teachers who have developed or are developing materials will be interviewed to have a broad view of their experiences. At the second stage, three language teachers who are developing materials will be studied by collecting interview data, policy documents, and data obtained from online observation of their group meetings so as to gain a deeper understanding of their experiences in materials development. It is expected that this study would have implications for teacher development, materials development, and curriculum development as well.

Keywords: educational changes, teacher development, teacher identity, teacher learning, materials development

Procedia PDF Downloads 116
4905 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 119
4904 A Comparative Analysis of Courtship among Non-Mainstream Gays and Lesbians

Authors: Marian Ubaldo, Venise Gonzales, Aileen Lovendino

Abstract:

In response to an identified need in the psychological literature for current research on topics related to same-sex lived experiences, the study aims to give knowledge about Non-mainstream Gay and Non-mainstream Lesbian, or those homosexuals who do not conform with norms, in relation to courtship than to focus on heterosexuals’ courtship. Moreover, the aim of this study is to explore the experience of courtship as it is mediated by the personal meanings that Non-mainstream Homosexuals attribute to it. Also, a comparison of courtship between Non-mainstream Gays and Non-mainstream Lesbians covers the study. A total of ten self-identified Non-mainstream gay and lesbian participated in the study and was interviewed with an open ended question. Interpretative Phenomenological Analysis was used in the study to capture the quality and texture of individual lived experiences. The results revealed similarities and differences in the lived experiences of Non-mainstream Gays and Lesbians when compared. The research findings have found that the research participants lived experiences in relation with Courtship are somehow similar and only differ in terms of sexual attraction. Non-mainstream Gays tend to follow a more sexual dating script while Non-mainstream Lesbians builds relationship through friendship or follows a ‘friendship’ script. Findings were compared with literature on dating and relationships with a large population of Gays and Lesbians to identify points of consistency and inconsistency. The implication of the results and recommendation for future researcher were given.

Keywords: non-mainstream gays, non-mainstream lesbian, courtship, heteronormativity, dating script

Procedia PDF Downloads 167
4903 Attitude of Beef Cattle Farmers toward Biosecurity Practices

Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim

Abstract:

The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.

Keywords: attitude, beef cattle, biosecurity, farmers

Procedia PDF Downloads 288
4902 Short-Term Incarceration in South Africa and the Shaping of Legal Consciousness

Authors: Thato Masiangoako

Abstract:

While being home to one of the greatest constitutions in the world, South Africa is also notorious for brutal policing practices, endemic corruption, and an overstrained criminal justice system. This apparent gap between the normative conceptions of the law and the actual experiences of being subjected to the criminal justice system forms the crux of this study. This study explores how community activists, student activists, and migrants in Johannesburg, who rely on the law for protection and effective political expression and participation and understand the law through their experiences of arrest and short-term incarceration. This work introduces the concept of legal consciousness to the South African context, whilst also drawing very heavily from South African literature of the law and criminal justice system. This research is grounded in the experiences of arrest and pre-trial and immigration detention shared by these individuals, which are used to develop a rich account of legal consciousness in South Africa. It also sheds light on some of the ways in which the criminal justice system sustains its legitimacy within a post-apartheid framework despite the gaps between what the law ought to be and it actually is. The study argues that the ways in which these groups make sense of their experiences of the criminal justice system and the law, more broadly, are closely bound to their socio-political identities. This calls the core values of equality and dignity that undergird South Africa’s Constitution into question.

Keywords: criminal justice, immigrant detention, legal consciousness, remand detention

Procedia PDF Downloads 238
4901 VCloud: A Security Framework for VANET

Authors: Wiseborn Manfe Danquah, D. Turgay Altilar

Abstract:

Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.

Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)

Procedia PDF Downloads 344
4900 Psychosocial Development: The Study of Adaptation and Development and Post-Retirement Satisfaction in Ageing Australians

Authors: Sahar El-Achkar, Mizan Ahmad

Abstract:

Poor adaptation of developmental milestones over the lifespan can significantly impact emotional experiences and Satisfaction with Life (SWL) post-retirement. Thus, it is important to understand how adaptive behaviour over the life course can predict emotional experiences. Broadly emotional experiences are either Positive Affect (PA) or Negative Affect (NA). This study sought to explore the impact of successful adaptation of developmental milestones throughout one’s life on emotional experiences and satisfaction with life following retirement. A cross-sectional self-report survey was completed by 132 Australian retirees between the ages 55 and 70 years. Three hierarchical regression models were fitted, controlling for age and gender, to predict PA, NA, and SWL. The full model predicting PA was statistically significant overall, F (8, 121) = 17.97, p < .001, account for 57% of the variability in PA. Industry/Inferiority were significantly predictive of PA. The full model predicting NA was statistically significant overall, F (8, 121) = 12.00, p < .001, accounting for 51% of the variability in NA. Age and Trust/Mistrust were significantly predictive of NA. The full model predicting NA was statistically significant overall, F (8, 121) = 12.00, p < .001, accounting for 51% of the variability in NA. Age and Trust/Mistrust were significantly predictive of NA. The full model predicting SWL, F (8, 121) = 11.05, p < .001, accounting for 45% of the variability in SWL. Trust/Mistrust and Ego Integrity/Despair were significantly predictive of SWL. A sense of industry post-retirement is important in generating PA. These results highlight that individuals presenting with adaptation and identity issues are likely to present with adjustment challenges and unpleasant emotional experiences post-retirement. This supports the importance of identifying and understanding the benefits of successful adaptation and development throughout the lifespan and its significance for the self-concept. Most importantly, the quality of lives of many may be improved, and the future risk of continued poor emotional experiences and SWL post-retirement may be mitigated. Specifically, the clinical implications of these findings are that they support the promotion of successful adaption over the life course and healthy ageing.

Keywords: adaptation, development, negative affect, positive affect, retirement, satisfaction with life

Procedia PDF Downloads 65
4899 Police Mothers at Home: Police Work and Danger-Protection Parenting Practices

Authors: Tricia Agocs, Debra Langan, Carrie B. Sanders

Abstract:

Studies of the challenges faced by women in policing have paid little attention to the specific experiences of Policewomen who are mothers. Guided by critical theorizing on the gendered nature of the police culture and domestic labor, 16 police officer mothers in Ontario, Canada, were interviewed. Our qualitative analyses explore their experiences of the “lion’s share” of domestic labor; the organizational, cultural, and operational features of policing; and the challenges of child care, and examine how these combine to foster particular stresses. In contrast to intensive mothering approaches that rely on the advice of external experts, our participants work to protect children by carefully constructing stories and asking questions that are based on their own on-the-job experiences with dangerous and/or abhorrent situations. As such, they engage in danger-protection parenting practices to prevent their children from becoming victims or offenders. Our research extends the theorizing on intensive/extensive mothering practices, builds on the scholarship on policing, and adds to the literature on women in nonstandard occupations. This sociological analysis of police mothers’ experiences and practices underscores the importance of understanding and working to change the social contexts, at work and at home, that compromise the well-being of police mothers and other emergency-response workers.

Keywords: policewomen, mothers, parenting, danger, qualitative research

Procedia PDF Downloads 539
4898 Disability, Stigma and In-Group Identification: An Exploration across Different Disability Subgroups

Authors: Sharmila Rathee

Abstract:

Individuals with disability/ies often face negative attitudes, discrimination, exclusion, and inequality of treatment due to stigmatization and stigmatized treatment. While a significant number of studies in field of stigma suggest that group-identification has positive consequences for stigmatized individuals, ironically very miniscule empirical work in sight has attempted to investigate in-group identification as a coping measure against stigma, humiliation and related experiences among disability group. In view of death of empirical research on in-group identification among disability group, through present work, an attempt has been made to examine the experiences of stigma, humiliation, and in-group identification among disability group. Results of the study suggest that use of in-group identification as a coping strategy is not uniform across members of disability group and degree of in-group identification differs across different sub-groups of disability groups. Further, in-group identification among members of disability group depends on variables like degree and impact of disability, factors like onset of disability, nature, and visibility of disability, educational experiences and resources available to deal with disabling conditions.

Keywords: disability, stigma, in-group identification, social identity

Procedia PDF Downloads 313
4897 An Interpretative Phenomenological Analysis of the Death Practices and Rituals of the Isneg People in Apayao

Authors: Ivy Angelique Malit, Marion Nicole Dela Vega, Marjorie Mae Mendoza

Abstract:

Death practices and rituals of the Philippines is rich with facts about our history mostly on our beliefs of the afterlife before the arrival of the western culture which is still being practiced by the indigenous people of the Philippines. The death practices and rituals are acts of showing the inner thoughts, and feelings towards the person who died. The meanings behind those practices and rituals become the reason why the indigenous people still treasure these death practices and rituals as a part of their culture. This study seeks to know the experiences of the death practices and rituals of one of the Indigenous groups in Apayao, the Isnegs and the meaning of those experiences. The researchers aimed to look at it on a psychological lens. In which the researchers aim (1) to know their experiences of their death practices from the perspective of their thoughts, feelings and actions, and (2) to seek the meaning behind their death rituals. The design used in the research is a qualitative design and Interpretative Phenomenological Analysis. The participants were gathered by using purposive sampling. The researchers gathered the data from a form of a semi-structured interview with guide questions. The researchers used Thematic Analysis to analyze the verbatim transcriptions from the interview. The experiences of death practices and rituals of the Isneg people have been presented in the aspects of their thoughts, feelings and behavior. The experiences were presented with 7 superordinate themes namely, (1) Refusal of Reality (2) Feelings of mixed emotions (3) Oblivious Acts of the participants (4) Conflict with self and culture (5) Negative thinking of the participants (6) Process of Acceptance (8) Act of Love. The make meaning behind the death practices and rituals of the Isneg people have been presented with 2 superordinate themes, (1) Act of Respect and (2) Act of Loyalty. The results of the research show that the experiences and meaning behind their death practices and burials were being based more by their own beliefs. In their culture, which has been passed through by their ancestors and becomes the foundation of their beliefs and their newly found religion which was introduced by the travelling missionaries. Doing those death practices and rituals is their way to show their affections, like respect and loyalty towards the person who died.

Keywords: death practices, interpretative phenomenological analysis, isneg people, rituals, theory of grieving

Procedia PDF Downloads 249
4896 Reviewing Special Education Preservice Teachers' Reflective Practices over Two Field Experiences: Topics and Changes in Reflection

Authors: Laurie U. deBettencourt

Abstract:

During pre-service field experiences teacher candidates are often asked to reflect as part of their training and in this investigation candidates’ reflective journal entries were reviewed, coded and analyzed with results suggesting teacher candidates need more direct instruction on how to describe, analyze, and make judgements on their instructional practices so that their practices improve over time. Teacher education programs often incorporate reflective-based activities during field experiences. The purpose of this investigation was to determine if special education teacher candidate’s reflective practices changed as they completed their two supervised field experiences and to determine what topics the candidates focused on in their reflections. The six females graduate students were completing two field experiences in special education classrooms within one academic year as part of their coursework leading to a master’s degree and special education teacher state certification. Each candidate wrote 15 reflection journal entries (approximately 200 words each) per field experience. Each of the journal entries were reviewed sentence by sentence to determine a reflective practice score and to determine the topics discussed. The reflective practice score was calculated using four dimensions of reflection (describe, analyze, judge, and apply) in order to create a continuous variable representing their reflective practice across four points of time. A One-way Repeated Measures Analysis of Variance (ANOVA) suggested that special education teacher candidates did not change their reflective practices over time (i.e., at time-point one the practitioner’s mean score was 56.0 out of 100 (SD = 7.6), 53.8 (SD = 4.3) at time-point two, 51.2 (SD = 4.5) at time-point three, and 57.7 (SD = 8.2) at time-point four). Qualitative findings suggest candidates focused mostly on themselves in their reflections. Conclusions suggest the need for teacher preparation programs to provide more direct instruction on how a teacher should reflect. Specific implications are provided for teacher training and future research.

Keywords: field experiences, reflective practices, special educators, teacher preparation

Procedia PDF Downloads 340
4895 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 76
4894 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications

Authors: Chieh-Fu Chang, Wan-Hsin Hsieh

Abstract:

We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.

Keywords: security, IWE, cliff effect, space communications

Procedia PDF Downloads 413
4893 Lived Experiences of Physical Education Teachers in the New Normal: A Consensual Qualitative Research

Authors: Karl Eddie T. Malabanan

Abstract:

Due to the quick transmission and public health risk of coronavirus disease, schools and universities have shifted to distant learning. Teachers everywhere were forced to shift gears instantly in order to react to the needs of students and families using synchronous and asynchronous virtual teaching. This study aims to explore the lived experiences of physical education teachers who are currently experiencing remote learning in teaching during the time of the COVID-19 pandemic. Specifically, the challenges that the physical education teachers encounter during remote learning and teaching. The participants include 12 physical education teachers who have taught in higher education institutions for at least five years. The researcher utilized qualitative research; specifically, the researcher used Consensual Qualitative Research (CQR). The results of this study showed that there are five categories for the Lived Experiences of Physical Education Teachers with thirty-one subcategories. This study revealed that physical education teachers experienced very challenging situations during the time of the pandemic. It also found that students had challenges in the abrupt transition from traditional to virtual learning classes, but it also showed that students are tenacious and willing to face any adversity. The researcher also finds that teachers are mentally drained during this time. Furthermore, one of the main focuses for the teachers should be on improving their well-being. And lastly, to cope with the challenges, teachers employ socializing to relieve tension and anxiety.

Keywords: lived experiences, consensual qualitative research, pandemic, education

Procedia PDF Downloads 81
4892 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income

Authors: M. Koray Cetin, Mehmet Mert

Abstract:

The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.

Keywords: exchange rate, panel data analysis, security, tourism revenues

Procedia PDF Downloads 338
4891 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 419