Search results for: security program
6120 Enhancing Maritime Governance in Africa: Challenges of Maritime Policy Development in the East African Community
Authors: Christantus Begealawuh Nchongayi
Abstract:
As clearly stated in goal 14 of sustainable development goals, global oceans greatly contribute to making the earth habitable for mankind. This explains why ocean governance is an important global concern today. The emerging maritime security problems and the impact of climate change on African oceans, evidenced by tropical cyclones as seen recently in the Southern region of Africa, is also an indication that maritime governance and policymaking are important elements of peace and security in Africa. Within the last decade, there have been commendable efforts towards maritime governance and policymaking in Africa, although implementation of existing maritime policies is still lacking. This paper provides a snapshot of the overall state of the maritime policymaking process in Africa. It specifically explores the challenges facing policymakers in developing national and regional maritime security strategy in the East African Community. For methodology, the paper relied on primary and secondary data. Primary data was collected from informal discussions with policymakers and key policy-making bodies in Africa, and from a survey of public opinions. The study found that the Africa Integrated Maritime Strategy (2050 AIMS) is a recent template for regional and national maritime security policymaking in Africa and that although maritime security has in the past not been prioritized in the security agenda of the East African Community, developing and aligning a regional maritime security strategy to the 2050 AIMS will result to positive regional integration outcomes in East Africa.Keywords: 2050 Africa integrated maritime strategy, east African community, maritime policy-making, maritime security
Procedia PDF Downloads 2216119 The Intention to Use E-Money Transaction: The Moderating Effect of Security in Conceptual Frammework
Authors: Husnil Khatimah, Fairol Halim
Abstract:
This research examines the moderating impact of security on intention to use e-money that adapted from some variables of the TAM (Technology Acceptance Model) and TPB (Theory of Planned Behavior). This study will use security as moderating variable and finds these relationship depends on customer intention to use e-money as payment tools. The conceptual framework of e-money transactions was reviewed to understand behavioral intention of consumers from perceived usefulness, perceived ease of use, perceived behavioral control and security. Quantitative method will be utilized as sources of data collection. A total of one thousand respondents will be selected using quota sampling method in Medan, Indonesia. Descriptive analysis and Multiple Regression analysis will be conducted to analyze the data. The article ended with suggestion for future studies.Keywords: e-money transaction, TAM & TPB, moderating variable, behavioral intention, conceptual paper
Procedia PDF Downloads 4586118 Heritage Preservation and Cultural Tourism; The 'Pueblos Mágicos' Program and Its Role in Preserving Traditional Architecture in Mexico
Authors: Claudia Rodríguez Espinosa, Erika Elizabeth Pérez Múzquiz
Abstract:
The Pueblos Mágicos federal program tries to preserve the traditional environment of small towns (under 20,000 inhabitants), through economic investments, legislation, and legal aid. To access the program, it’s important to cover 8 requirements; one of them is the fourth, which considers ‘Promotion of symbolic and differentiated touristic attractions, such as architecture, emblematic buildings, festivities and traditions, artisan production, traditional cuisine, and touristic services that guarantee their commercialization along with assistantship and security services’. With this objective in mind, the Federal government of Mexico had developed local programs to protect emblematic public buildings in each of the 83 towns included in the Pueblos Mágicos program that involved federal and local administrations as well as local civil associations, like Adopte una Obra de Arte. In this paper, we present 3 different intervention cases: first the restoration project (now concluded) of the 16th century monastery of Santa María Magdalena in Cuitzeo, an enormous building which took 6 years to be completely restored. Second case, the public spaces intervention in Pátzcuaro, included the Plaza Grande or Vasco de Quiroga square, and the access to the arts and crafts house known as Casa de los once patios or eleven backyards house. The third case is the recovery project of the 16th century atrium of the Tzintzuntzan monastery that included the original olive trees brought by Franciscans monks to this town in the middle 1500’s. This paper tries to present successful preservation projects in 3 different scales: building, urban spaces and landscape; and in 3 different towns with the objective to preserve public architecture, public spaces and cultural traditions. Learn from foreign experiences, different ways to manage preservation projects focused on public architecture and public spaces.Keywords: cultural tourism, heritage preservation, traditional architecture, public policies
Procedia PDF Downloads 2956117 Media (Il) Literacy: An Evaluation of the Curriculum and Implementation of the Department of Education's Special Program in Journalism
Authors: Sarah Isabelle S. Torres
Abstract:
This study evaluated the curriculum and implementation of the Special Program in Journalism (SPJ). By conducting surveys, focus group discussions, and interviews and by analyzing the school publication of five national high schools, the researcher found out that SPJ is ineffective in instilling media literacy to the students. Media Literacy will help the students understand how media operates, thus, they will be able to produce outputs that are socially relevant, critical, and in-depth. For one, the curriculum includes lessons and activities that are mostly technical in nature. There are no theoretical topics such as ethics, history of the press, or media ownership. Second, most of the SPJ teachers have little background on Journalism and they are not trained enough to teach the program effectively. Third, most of the students are not really inclined in Journalism and do not see themselves as media practitioners in the future. Lastly, the Department of Education’s budget for the program is far from what the curriculum needs. All of these lead to the low Media Literacy levels of the students. SPJ, therefore, has to be reevaluated and amended. In conclusion, Media Literacy should be added in the curriculum so the students will not only be equipped with technical skills but with theoretical knowledge, as well.Keywords: education, journalism, media, media literacy
Procedia PDF Downloads 4106116 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector
Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid
Abstract:
For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.Keywords: electricity, energy policy, energy security, Malaysia
Procedia PDF Downloads 3086115 Evaluation of Top-down and Bottom-up Leadership Development Programs in a Finnish Company
Authors: Kati Skarp, Keijo Varis, Juha Kettunen
Abstract:
The purpose of this paper is to examine and evaluate the top-down and bottom-up leadership development programs focused on human capital that improve the performance of a company. This study reports on the external top-down leadership development program supported by a consulting company and the internal participatory action research of the bottom-up program. The sickness rate and the lost time incident failure rate decreased and the ideas produced for cost savings improved, leading to increased earnings during the top-down program. The estimated cost savings potential of the bottom-up program was 3.8 million euro based on the cost savings of meeting habits, maintenance practices and the way of working in production. The results of this study are useful for those who plan and evaluate leadership development and human capital productivity consultation programs to improve the performance of a company.Keywords: leadership, development, human resources, company, indicators, evaluation
Procedia PDF Downloads 3286114 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 3266113 A Study of Evolving Cloud Computing Data Security: A Machine Learning Perspective
Authors: Shinoy Vengaramkode Bhaskaran
Abstract:
The advancement of cloud computing led to a variety of security issues for both consumers and industries. Whereas machine learning (ML) is one approach to securing Cloud-based systems. Various methods have been employed to prevent or detect attacks and security vulnerabilities on the Cloud using ML techniques. In this paper, we present an ML perspective on the methodologies and techniques of cloud security. Initially, an investigative study on cloud computing is conducted with a primary emphasis on the gaps with two research questions that are impeding the adoption of cloud technology, as well as the challenges associated with threat solutions. Next, some ideas are generated based on machine learning methods to mitigate certain types of attacks that are frequently discussed through the application of ML techniques. Finally, we review different machine learning algorithms and their adoption in cloud computing.Keywords: artificial intelligence, machine learning, cloud computing infrastructure as a service, support vector machine, platform as a service
Procedia PDF Downloads 136112 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 386111 Assessing the Effects of Climate Change on Wheat Production, Ensuring Food Security and Loss Compensation under Crop Insurance Program in Punjab-Pakistan
Authors: Mirza Waseem Abbas, Abdul Qayyum, Muhammad Islam
Abstract:
Climate change has emerged as a significant threat to global food security, affecting crop production systems worldwide. This research paper aims to examine the specific impacts of climate change on wheat production in Pakistan, Punjab in particular, a country highly dependent on wheat as a staple food crop. Through a comprehensive review of scientific literature, field observations, and data analysis, this study assesses the key climatic factors influencing wheat cultivation and the subsequent implications for food security in the region. A comparison of two subsequent Wheat seasons in Punjab was examined through climatic conditions, area, yield, and production data. From the analysis, it is observed that despite a decrease in the area under cultivation in the Punjab during the Wheat 2023 season, the production and average yield increased due to favorable weather conditions. These uncertain climatic conditions have a direct impact on crop yields. Last year due to heat waves, Wheat crop in Punjab suffered a significant loss. Through crop insurance, Wheat growers were provided with yield loss protection keeping in view the devastating heat wave and floods last year. Under crop insurance by the Government of the Punjab, 534,587 Wheat growers were insured with a $1.6 million premium subsidy. However, due to better climatic conditions, no loss in the yield was recorded in the insured areas. Crop Insurance is one of the suitable options for policymakers to protect farmers against climatic losses in the future as well.Keywords: climate change, crop insurance, heatwave, wheat yield punjab
Procedia PDF Downloads 866110 Influence of Strength Training on the Self-Efficacy of Sports Performance: National Collegiate Athletic Association Student-Athletes Experience of a Strength Training Program
Authors: Alfred M. Caronia
Abstract:
The aim of this pilot study was to explore an NCAA Division 1 female volleyball players’ experience of a strength and conditioning program and the result this has on self-efficacy of sport skill performance. This phenomenological study comprised of 10 college aged participants that have strength training program experience. Data was collected using semi-structured interviews and a reflective journal; the transcribed interviews were analyzed using qualitative content analysis. From the analysis, four themes emerged: performance enhancement, injury prevention, motivational experience, and learning experience. From the players’ perspective, care needs to be taken to explain the purpose of an exercise and the benefit it will have for a play performance. Other factors that play an important role in a strength training program are team motivation, individual goal setting, bonding, and communication with the strength coach, as all these items appear to be fundamentals of coaching.Keywords: self-efficacy, skill performance, sports performance, strength training
Procedia PDF Downloads 976109 Food Security and Utilization in Ethiopia
Authors: Tuji Jemal Ahmed
Abstract:
Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.Keywords: food security, utilization, Ethiopia, challenges
Procedia PDF Downloads 1366108 Food Security and Utilization in Ethiopia
Authors: Tuji Jemal Ahmed
Abstract:
Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.Keywords: food security, utilization, Ethiopia, challenges
Procedia PDF Downloads 886107 A Study on Household Food Security and Dietary Diversity in Urban Centers of Thrissur
Authors: Sandra Thomas
Abstract:
This study tries to analyse the level of food security and dietary diversity among households of different socio-economic classes in the urban centers of Thrissur. The study revealed that there is no much difference in purchasing patterns of food articles among the socio-economic classes indicating a very high level of both physical and economic accessibility of food. On analysing the dietary diversity of the households none of the households scored below five and fifty-three per cent of the households scored eleven or twelve indicating higher diversity in diet. It was also found that income and education are the two important factors that influence the level of household food security.Keywords: food security, dietary diversity, household level, socio-economic classes
Procedia PDF Downloads 1306106 The Influence of Guided and Independent Training Toward Teachers’ Competence to Plan Early Childhood Education Learning Program
Authors: Sofia Hartati
Abstract:
This research is aimed at describing training in early childhood education program empirically, describing teachers ability to plan lessons empirically, and acquiring empirical data as well as analyzing the influence of guided and independent training toward teachers competence in planning early childhood learning program. The method used is an experiment. It collected data with a population of 76 early childhood educators in Tunjung Teja Sub District area through random sampling technique and grouped into two namely 38 people in an experiment class and 38 people in a controlled class. The technique used for data collections is a test. The result of the research shows that there is a significant influence between training for guided educators toward Teachers Ability toward Planning Early Childhood Learning Program. Guided training has been proven to improve the ability to comprehend planning a learning program. The ability to comprehend planning a learning program owned by teachers of early childhood program comprises of 1) determining the characteristics and competence of students prior to learning; 2) formulating the objective of the learning; 3) selecting materials and its sequences; 4) selecting teaching methods; 5) determining the means or learning media; 6) selecting evaluation strategy as a part of teachers pedagogic competence. The result of this research describes a difference in the competence level of teachers who have joined guided training which is relatively higher than the teachers who joined the independent training. Guided training is one of an effective way to improve the knowledge and competence of early childhood educators.Keywords: competence, planning, teachers, training
Procedia PDF Downloads 2676105 The Adaptation and Evaluation of a Psychoeducational Program for Patients with Depression in General Practices in Germany
Authors: Feyza Gökce, Jochen Gensichen, Antonius Schneider, Karolina de Valerio, Gabriele Pitschel-Walz
Abstract:
People with depressive symptoms often first consult a General Practitioner (GP) before making use of other treatment options. The present study shows the adaptation and evaluation of a psychoeducational program for patients with depressive symptoms that are treated by GPs in Bavaria, Germany. The adaptation of an existing psychoeducational program, that is used in inpatient psychiatric settings, was performed in exchange with experts (psychotherapists, general practitioners, and a patient representative). As a result, a program consisting of 4 psychoeducational sessions was developed, which is carried out in individual settings in GP practices by the practitioners themselves. This program will be compared to treatment as usual that patients with depression receive by GPs. Data is collected at 3 measurement points (baseline, 3-months-follow-up, 6-months-follow-up) using different questionnaires (BDI-II, D-Lit-R German, FERUS, PAM13-D, PHQ-9, GAD-7, PHQ-15, PC-PTSD-5). In addition to the change in depressive symptoms, changes in depression knowledge, self-efficacy, and patient activation will be analyzed, and the feasibility of the program and the subjective benefit for GPs and patients will be assessed. By now, 84 patients have been recruited by 20 cluster-randomized GP practices, with 73.5% of the participants being female and 26.5% being males. The average age was M= 50.1 (SD= 14.67) years. The change in depression symptoms over the 3-month period will be compared between the two study conditions by using a linear mixed model by the end of data collection (December 2023). The subjective benefit for the patients and GPs will be assessed via feedback questionnaires. Results will be presentable by the beginning of 2024 and will provide indications for further development and barriers to the implementation of such a program for GP practices.Keywords: depression, general practice, psychoeducation, primary care
Procedia PDF Downloads 886104 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles
Authors: Vikram Prabhu, Mohammad Shikh Bahaei
Abstract:
This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark
Procedia PDF Downloads 3066103 Assessment of the Effectiveness of the Anti-Debris Flow Engineering Constructed to Reduce the Risk of Expected Debris Flow in the River Mletiskhevi by Computer Program RAMMS
Authors: Sopio Gogilava, Goga Chakhaia, Levan Tsulukidze, Zurab Laoshvili, Irina Khubulava, Shalva Bosikashvili, Teimuraz Gugushvili
Abstract:
Geoinformatics systems (GIS) integrated computer program RAMMS is widely used for forecasting debris flows and accordingly for the determination of anticipating risks with 85% accuracy. In view of the above, the work introduces new capabilities of the computer program RAMMS, which evaluates the effectiveness of anti-debris flow engineering construction, namely: the possibility of decreasing the expected velocity, kinetic energy, and output cone volume in the Mletiskhevi River. As a result of research has been determined that the anti-debris flow engineering construction designed to reduce the expected debris flow risk in the Mletiskhevi River is an effective environmental protection technology, that's why its introduction is promising.Keywords: construction, debris flow, geoinformatics systems, program RAMMS
Procedia PDF Downloads 1536102 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats
Authors: Ivan Župan
Abstract:
Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology
Procedia PDF Downloads 826101 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria
Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.
Abstract:
This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.Keywords: farming household, food security, identification and aggregation, food security index
Procedia PDF Downloads 2936100 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control
Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod
Abstract:
The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.Keywords: XML database, trust-based access control, severity-aware, trust values, log file
Procedia PDF Downloads 3026099 SOTM: A New Cooperation Based Trust Management System for VANET
Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel
Abstract:
Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.Keywords: ative vehicle, cooperation, trust management, VANET
Procedia PDF Downloads 4396098 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria
Authors: Egboja Simon, Agi Sunday
Abstract:
One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.Keywords: governance, security, food, development, conflict, hunger, society, sustainability
Procedia PDF Downloads 3346097 Web-Based Learning in Nursing: The Sample of Delivery Lesson Program
Authors: Merve Kadioğlu, Nevin H. Şahin
Abstract:
Purpose: This research is organized to determine the influence of the web-based learning program. The program has been developed to gain information about normal delivery skill that is one of the topics of nursing students who take the woman health and illness. Material and Methods: The methodology of this study was applied as pre-test post-test single-group quasi-experimental. The pilot study consisted of 28 nursing student study groups who agreed to participate in the study. The findings were gathered via web-based technologies: student information form, information evaluation tests, Web Based Training Material Evaluation Scale and web-based learning environment feedback form. In the analysis of the data, the percentage, frequency and Wilcoxon Signed Ranks Test were used. The Web Based Instruction Program was developed in the light of full learning model, Mayer's research-based multimedia development principles and Gagne's Instructional Activities Model. Findings: The average scores of it was determined in accordance with the web-based educational material evaluation scale: ‘Instructional Suitability’ 4.45, ‘Suitability to Educational Program’ 4.48, ‘Visual Adequacy’ 4.53, ‘Programming Eligibility / Technical Adequacy’ 4.00. Also, the participants mentioned that the program is successful and useful. A significant difference was found between the pre-test and post-test results of the seven modules (p < 0.05). Results: According to pilot study data, the program was rated ‘very good’ by the study group. It was also found to be effective in increasing knowledge about normal labor.Keywords: normal delivery, web-based learning, nursing students, e-learning
Procedia PDF Downloads 1796096 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications
Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam
Abstract:
The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.Keywords: human security, migration, Myanmar, regional security, Rohingya
Procedia PDF Downloads 1566095 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours
Authors: Elham Rajabian
Abstract:
The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture
Procedia PDF Downloads 1016094 Safe School Program in Indonesia: Questioning Whether It Is Too Hard to Succeed
Authors: Ida Ngurah
Abstract:
Indonesia is one of the most prone disaster countries, which has earthquake, tsunami or high wave, flood and landslide as well as volcano eruption and drought. Disaster risk reduction has been developing extensively and comprehensively, particularly after tsunami hit in 2004. Yet, saving people live including children and youth from disaster risk is still far from succeed. Poor management of environment, poor development of policy and high level of corruption has become challenges for Indonesia to save its people from disaster impact. Indonesia is struggling to ensure its future best investment, children and youth to have better protection when disaster strike in school hours and have basic knowledge on disaster risk reduction. The program of safe school is being initiated and developed by Plan Indonesia since 2010, yet this effort still needs to be elaborated. This paper is reviewing sporadic safe school programs that have been implemented or currently being implemented Plan Indonesia in few areas of Indonesia, including both rural and urban setting. Methods used are in-depth interview with dedicated person for the program from Plan Indonesia and its implementing patners and analysis of project documents. The review includes program’s goal and objectives, implementation activity, result and achievement as well as its monitoring and evaluation scheme. Moreover, paper will be showing challenges, lesson learned and best practices of the program. Eventually, paper will come up with recommendation for strategy for better implementation of safe school program in Indonesia.Keywords: disaster impact, safe school, programs, children, youth
Procedia PDF Downloads 3716093 Present-Day Transformations and Trends in Rooftop Agriculture and Food Security
Authors: Kiara Lawrence, Nadine Ponnusamy, Clive Greenstone
Abstract:
One of the major challenges facing society today is food security. The risks to food security have increased significantly due to the evolving urban landscape, globalization, and a rising population. The cultivation of food is essential, particularly during times of crisis, such as a recession, and has long been a necessity for urban populations. In contemporary society, many urban residents are confronted with new challenges, including high levels of unemployment, which compel individuals to adopt alternative survival strategies, such as growing their own food. Recently, rooftop agriculture has made significant contributions to urban and national food security and has been utilized as a tool to mitigate the frequent and damaging disasters that many cities encounter. They have the potential to transform unused spaces into green, productive vegetable plots, while also providing urban residents with the opportunity to enjoy the benefits of gardening. Therefore, this study looks to investigate the evolving themes around rooftop agriculture and food security globally. A bibliometric review analysis was carried out on Scopus and Web of Science using the keywords “rooftop agriculture” OR “rooftop farming” OR “rooftop garden” AND “food security” between 2004 and 2024 to ensure a broader scope was covered around the chosen study. Vosviewer software was then utilized to analyze the extracted data to create network visualization maps based on keyword occurrences, co-author analysis, country analysis. There were only 37 relevant documents within the study parameters. Preliminary results indicate that much research focused on urban agriculture, food supply, green roof, sustainability and climate change. By analysing these aspects of rooftop agriculture and food security, the trends can identify gaps in literature and dictate future applications to assist in food security.Keywords: food security, rooftop agriculture, rooftop farming, rooftop garden
Procedia PDF Downloads 246092 Landfill Design for Reclamation of Şırnak Coal Mine Dumps: Shalefill Stability and Risk Assessment
Authors: Yıldırım I. Tosun, Halim Cevizci, Hakan Ceylan
Abstract:
By GEO5 FEM program with four rockfill slope modeling and stability analysis was performed for S1, S2, S3 and S4 slopes where landslides of the shalefills were limited. Effective angle of internal friction (φ'°) 17°-22.5°, the effective cohesion (c') from 0.5 to 1.8 kPa, saturated unit weight 1.78-2.43 g/cm3, natural unit weight 1.9-2.35 g/cm3, dry unit weight 1.97-2.40 g/cm3, the permeability coefficient of 1x10-4 - 6.5x10-4 cm/s. In cross-sections of the slope, GEO 5 FEM program possible critical surface tension was examined. Rockfill dump design was made to prevent sliding slopes. Bulk material designated geotechnical properties using also GEO5 programs FEM and stability program via a safety factor determined and calculated according to the values S3 and S4 No. slopes are stable S1 and S2 No. slopes were close to stable state that has been found to be risk. GEO5 programs with limestone rock fill dump through FEM program was found to exhibit stability.Keywords: slope stability, stability analysis, rockfills, sock stability
Procedia PDF Downloads 4906091 The Effects of the Parent Training Program for Obesity Reduction on Child Waist Circumference and Health Behaviors of Pre-School Children at the Samut-Songkhram Kindergarten School, Samut-Songkhram Province, Thailand
Authors: Muntanavadee Maytapattana
Abstract:
This research aims to study the effects of the Parent Training Program for Obesity Reduction (PTPOR) on child waist circumference and health behaviors of pre-school children at the Samut-Songkhram kindergarten school, Samut-Songkhram province, Thailand. The objective of this research is to evaluate the effectiveness of the PTPOR on child waist circumference and health behaviors of the pre-school children. The conceptual framework of this study is developed on the basis of the Ecological Systems Theory (EST), not only do the individual factors such as child characteristics and child risk factors contribute to the child’s weight status, but also other factors such as parenting style and family characteristics, as well as community and demographic factors. This research is a quasi-experimental study. Participants were pre-school overweight and obese children and their parents. Forty-one parent-child dyads were recruited into the program. Parents participated in two sessions including an educational session and a group discussion session. Research methodology uses Paired-Samples t-test to determine the difference between groups in the mean scores of the outcome variables of the children and parents. The research results show that there was significant difference between child waist circumferences mean score at the baseline and finishing the program at the 0.01 level (p = 0.001), mean score of the child waist circumference was decrease after finishing the program. And there was no significant difference between child exercise health behaviors mean score at the baseline and finishing the program at the 0.05 level; however, mean score of the child exercise behavior was increase after finishing the program. Meanwhile, there was significant difference between child dietary health behavior mean score at the baseline and finishing the program at the 0.01 level (p = 0.001), mean score of the child dietary was increase after finishing the program.Keywords: PTPOR, child waist circumference, child health behaviors, pre-school children
Procedia PDF Downloads 573