Search results for: public attitudes security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9196

Search results for: public attitudes security

8776 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 383
8775 An Assessment on Awareness of Public Transport Policies for Persons with Disabilities in Three South-West Nigerian States

Authors: Julius A. Ademokoya, Grace C. Ilori

Abstract:

Extreme public transport difficulty for persons with disabilities (PWDs) has always been one of the challenges which these individuals experience on a daily basis in Nigeria. Private and public transport vehicles are not disability- friendly. Operators of public transport are often very intolerant of PWDs' conditions. Indeed, many Nigerians believe it is luxury for PWDs to engage in public transport. They are rarely expected to be seen in public much less going to places via public transport means. Initiatives by a few Nigerian states to develop and implement public transport policies for PWDs, therefore, were a huge relief for them and some concerned Nigerians. A few years ago, three southwest Nigerian states (Lagos, Ondo, and Ekiti) came up with some legislative welfare provisions (including transport programmes) for PWDs. This study, therefore, sought to ascertain levels of awareness and implementation of public policies among the PWDs and those expected to implement the policies. The study adopted a mixed method research. Findings across the three states showed that: (1) awareness of public policies among PWDs is low and (2) a considerable scope of the policies is not yet implemented. Recommendations are, therefore, made on how to improve on awareness and implementation of transport policies for PWDs in three south-west Nigerian states.

Keywords: awareness, disability rights, implementation persons with disability, transport policies

Procedia PDF Downloads 164
8774 Understanding Europe’s Role in the Area of Liberty, Security, and Justice as an International Actor

Authors: Barrere Sarah

Abstract:

The area of liberty, security, and justice within the European Union is still a work in progress. No one can deny that the EU struggles between a monistic and a dualist approach. The aim of our essay is to first review how the European law is perceived by the rest of the international scene. It will then discuss two main mechanisms at play: the interpretation of larger international treaties and the penal mechanisms of European law. Finally, it will help us understand the role of a penal Europe on the international scene with concrete examples. Special attention will be paid to cases that deal with fundamental rights as they represent an interesting case study in Europe and in the rest of the World. It could illustrate the aforementioned duality currently present in the Union’s interpretation of international public law. On the other hand, it will explore some specific European penal mechanism through mutual recognition and the European arrest warrant in the transnational criminality frame. Concerning the interpretation of the treaties, it will first, underline the ambiguity and the general nature of some treaties that leave the EU exposed to tension and misunderstanding then it will review the validity of an EU act (whether or not it is compatible with the rules of International law). Finally, it will focus on the most complete manifestation of liberty, security and justice through the principle of mutual recognition. Used initially in commercial matters, it has become “the cornerstone” of European construction. It will see how it is applied in judicial decisions (its main event and achieving success is via the European arrest warrant) and how European member states have managed to develop this cooperation.

Keywords: European penal law, international scene, liberty security and justice area, mutual recognition

Procedia PDF Downloads 397
8773 Linking Sustainable Public Procurement and the Sustainable Development Goals Targets in Zambia: A Preliminary Investigation

Authors: Charles P. Mukumba, Kahilu K. Shakantu

Abstract:

Achieving the Sustainable Development Goals [SDGs] is a key to achieving transformational results that support Zambia’s development. Public procurement is an integral to the government’s mission to deliver goods and services, in a timely and economic manner beyond the value of money spent. This study explores the link between sustainable public procurement and the SDG targets in Zambia. And to validate the established links with the public sector procurement in Zambia. The study employed qualitative research using semi-structured interviews with 18 public procurement officials. The collected data was analysed using thematic analysis. The findings indicate that public procurement plays a fundamental role in achieving the sustainable development goals [SDGs] by helping to deliver core public services that support SDGs and also by systematising and co-delivering added value along the way. The study further established the importance of sustainable public procurement within the context of development. The interviews were limited to mainstream public sector procurement entities in Lusaka, Zambia. Sustainable public procurement actions have the potential to impact SDG goals. Promoting sustainable public procurement will enhance sustainable development and significantly improve supply chain that would benefit the economy, society and environment. Findings will inform policy-makers how to strategically design sustainable public procurement policy by attuning it to procuring entities objectives and priorities in order to contribute to the attainment of SDGs.

Keywords: sustainable public procurement, sustainable development goals, target, Zambia

Procedia PDF Downloads 116
8772 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 113
8771 Public and Private Spaces Producing Social Connectedness in Traditional Environment: A Study on Old Medina District of Casablanca

Authors: Asmaa Sokrat, Aykut Karaman

Abstract:

Public and private spaces are major components of the morphology of the city. This research aims to study the interactions between public and private domains in terms of urban space in Casablanca. The research focuses on a general vision of a socio-spatial issue. It plans to identify the public, private, and transition (semi-public, semi-private) spaces as the constituent of the urban space. Moreover, the study investigates the link between public and private spaces with the social dimensions. Additionally, the research argues that the public space is a place of social interaction; as a reflection, this interaction is the intersection between urban space and social connectedness. Besides, social interaction can be the key to distinguishing between the public and private spheres. The methodological approach of the research is based on the literature review and field study. The article is targeting a case study on the old Medina of Casablanca, from daily use of the public and private spaces, the urban tissue, and the urban space types. In conclusion, the research exhibits that a public space could influence the privacy of the residents of a local urban area; thus, this privacy is inverted on the social interaction. This social interaction is the link between the urban space and social connectedness. Hence, this equation affects the typology of the private space.

Keywords: public sphere, private sphere, social connectedness, old Medina of Casablanca

Procedia PDF Downloads 124
8770 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 367
8769 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms

Authors: Saint C. Nguedjip

Abstract:

This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.

Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women

Procedia PDF Downloads 94
8768 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 219
8767 The Role of Group Size, Public Employees’ Wages and Control Corruption Institutions in a Game-Theoretical Model of Public Corruption

Authors: Pablo J. Valverde, Jaime E. Fernandez

Abstract:

This paper shows under which conditions public corruption can emerge. The theoretical model includes variables such as the public employee wage (w), a control corruption parameter (c), and the group size of interactions (GS) between clusters of public officers and contractors. The system behavior is analyzed using phase diagrams based on combinations of such parameters (c, w, GS). Numerical simulations are implemented in order to contrast analytic results based on Nash equilibria of the theoretical model. Major findings include the functional relationship between wages and network topology, which attempts to reduce the emergence of corrupt behavior.

Keywords: public corruption, game theory, complex systems, Nash equilibrium.

Procedia PDF Downloads 227
8766 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria

Authors: Emmanuela Ngozi Maduka

Abstract:

In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.

Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force

Procedia PDF Downloads 130
8765 Time Management in the Public Sector in Nigeria

Authors: Sunny Ewankhiwimen Aigbomian

Abstract:

Time, is a scarce resource and in everything we do, time is required to accomplish any given task. The need for this presentation is predicated on the way majority of Nigerian especially in the public sector operators see “Time Management”. Time as resources cannot be regained if lost or managed badly. As a significant aspect of human life it should be handled with diligence and utmost seriousness if the public sector is to function as a coordinated entity. In our homes, private life and offices, we schedule different things to ensure that some things do not go the unexpected. When it comes to service delivery on the part of government, it ought to be more serious because government is all about effect and efficient service delivery and “Time” is a significant variable necessary to successful accomplishment. The need for Nigerian government to re-examine time management in her public sector with a view of repositioning the sector to be able to compete well with other public sectors in the world. The peculiarity of Time management in Public Sector in Nigerian context as examined and some useful recommendations of immerse assistance proffered.

Keywords: Nigeria, public sector, time management, task

Procedia PDF Downloads 83
8764 Online Assessment in the Ligh of Resiliance

Authors: Renáta Nagy, Alexandra Csongor, Vilmos Warta

Abstract:

The presentation aims at eliciting insight into the results of ongoing research regarding evolving trends and attitudes towards online assessment of English and other languages. The focus pinpoints online as one of the most trending forms available during the global pandemic. The study was first initiated in 2019 in which its main target was to reveal the intriguing question of students’ and assessors’ attitudes towards online assessment. The research questions the attitudes towards the latest trends, possible online task types, and their advantages and disadvantages through an in-depth experimental process currently undergoing implementation. Material and methods include surveys, needs and wants analysis, and thorough investigations regarding candidates’ and assessors’ attitudes towards online tests in the field of languages. Over 400 respondents from more than 28 countries participated in the survey, which gives us an international and intercultural insight into how students with different cultural and educational background deal with the evolving online world. The results show the pandemic’s impact, which brought the slumbering online world of assessing roaring alive, fully operational, and now bears phenomenal relevance in today’s global education. Undeniably, the results can be used as a perspective in a vast array of contents. The survey hypothesized the generation of the 21st century expect everything readily available online, however, questions whether they are ready for this challenge are lurking in the background.

Keywords: assessment, english, intercultural, international, online, testing

Procedia PDF Downloads 69
8763 Exploring the Relationships between Cyberbullying Perceptions and Facebook Attitudes of Turkish Students

Authors: Yavuz Erdoğan, Hidayet Çiftçi

Abstract:

Cyberbullying, a phenomenon among adolescents, is defined as actions that use information and communication technologies such as social media to support deliberate, repeated, and hostile behaviour by an individual or group. With the advancement in communication and information technology, cyberbullying has expanded its boundaries among students in schools. Thus, parents, psychologists, educators, and lawmakers must become aware of the potential risks of this phenomenon. In the light of these perspectives, this study aims to investigate the relationships between cyberbullying perception and Facebook attitudes of Turkish students. A survey method was used for the study and the data were collected by “Cyberbullying Perception Scale”, “Facebook Attitude Scale” and “Personal Information Form”. For this purpose, study has been conducted during 2014-2015 academic year, with a total of 748 students with 493 male (%65.9) and 255 female (%34.1) from randomly selected high schools. In the analysis of data Pearson correlation and multiple regression analysis, multivariate analysis of variance (MANOVA) and Scheffe post hoc test has been used. At the end of the study, the results displayed a negative correlation between Turkish students’ Facebook attitudes and cyberbullying perception (r=-.210; p<0.05). In order to identify the predictors of students’ cyberbullying perception, multiple regression analysis was used. As a result, significant relations were detected between cyberbullying perception and independent variables (F=5.102; p<0.05). Independent variables together explain 11.0% of the total variance in cyberbullying scores. The variables that significantly predict the students’ cyberbullying perception are Facebook attitudes (t=-5.875; p<0.05), and gender (t=3.035; p<0.05). In order to calculate the effects of independent variables on students’ Facebook attitudes and cyberbullying perception MANOVA was conducted. The results of the MANOVA indicate that the Facebook attitudes and cyberbullying perception were significantly differed according to students’ gender, age, educational attainment of the mother, educational attainment of the father, income of the family and daily usage of internet.

Keywords: facebook, cyberbullying, attitude, internet usage

Procedia PDF Downloads 394
8762 Attitudes of the Staff in the Faculty of Science and Technology towards the E-Office Documentary System of the Faculty of Science and Technology, Suan Sunandha Rajabhat University

Authors: Narinee Sophatsathit, Yuwadee Nitutorn

Abstract:

The purpose of this study was to investigate the attitudes of the staff in the Faculty of Science and Technology towards the e-office documentary system of the Faculty of Science and Technology, Suan Sunandha Rajabhat University. The subjects of this study included 98 staffs of the Faculty of Science and Technology, Suan Sunandha Rajabhat University. Questionnaires were used to ask the attitude of the staffs towards the implementation of e-office system. The results showed that most of the users of e-office are female with the age between 31-40 years old, master degree of education and in the academic positions. They have working experiences between 1-5 years and reported the time of using e-office between 8:30-12:30 during the weekday with the frequency of 3-5 times/day. Most of them reported their opinions on the e-office at high level (x=3.84) and problems and obstacles in using e-office at high level, as well (x=3.63).

Keywords: attitudes, e-office, staff, documentary system

Procedia PDF Downloads 253
8761 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 124
8760 Voice Signal Processing and Coding in MATLAB Generating a Plasma Signal in a Tesla Coil for a Security System

Authors: Juan Jimenez, Erika Yambay, Dayana Pilco, Brayan Parra

Abstract:

This paper presents an investigation of voice signal processing and coding using MATLAB, with the objective of generating a plasma signal on a Tesla coil within a security system. The approach focuses on using advanced voice signal processing techniques to encode and modulate the audio signal, which is then amplified and applied to a Tesla coil. The result is the creation of a striking visual effect of voice-controlled plasma with specific applications in security systems. The article explores the technical aspects of voice signal processing, the generation of the plasma signal, and its relationship to security. The implications and creative potential of this technology are discussed, highlighting its relevance at the forefront of research in signal processing and visual effect generation in the field of security systems.

Keywords: voice signal processing, voice signal coding, MATLAB, plasma signal, Tesla coil, security system, visual effects, audiovisual interaction

Procedia PDF Downloads 78
8759 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 57
8758 Health Care Students' Attitudes, Knowledge and Use of Complementary and Alternative Medicine: A Cross Sectional Study

Authors: Caterina Grandi, Lukas Lochner, Marco Padovan, Mirco Rizzi, Paola Sperinde, Fabio Vittadello, Luisa Cavada

Abstract:

Background: In recent years, the use of Complementary Alternative Medicine (CAM) has achieved worldwide popularity. With the increased public interest in CAMs, attention to it within Health Care Schools and Colleges has also improved. Studies generally assess the knowledge and attitudes regarding CAMs in medical and nursing students. The current study focused on the knowledge, attitudes and practice of CAM in healthcare students. Aim: To assess the knowledge and attitudes regarding complementary and alternative medicine (CAM) in healthcare students in South Tyrol, a region in Northern Italy. Methodology: This cross-sectional study was carried out among 361 students. Self-administered questionnaire was adapted and modified by the researchers from several questionnaires. The instrument consisted of three sections: 1) demographical characteristics (gender, place of residence and year of study); 2) general attitudes towards CAM, evaluated through 11 items using a Likert scale (agree, partly agree, partly disagree, disagree); 3) knowledge and use about any particular CAM practices (acupuncture, aromatherapy, creative therapies, diet/nutritional therapies, phytotherapy/herbal therapies, compresses, massage therapy, Ayurvedic therapy, Tibetan medicine, naturopathy, homeopathy, pet therapy, reflexology, therapeutic touch, chiropractic/osteopathy). Results: The sample consisted of 63 males and 297 females, 58% living in villages. 151 students (42%) were in the first year, 99 (27%) in the second and 106 (30%) in the third. Both men and women agreed with statements about the utility and benefits of CAMs. Women were significantly more likely than men to agree that the CAM practices should be included in the curriculum (p < 0.004), that the health professionals should be able to advice their patients about commonly used CAM methods (p < 0.002) and that the clinical care should integrate CAM practices (p < 0.04). Students in the second year showed the highest mean score for the statement 'CAM includes ideas and methods from which conventional medicine could benefit' (p = 0.049), highlighting a positive attitude, while students in the third year achieved the lowest mean score for the negative statement 'The results of CAM are in most cases due to a placebo effect'. Regarding this statement, participants living in villages disagreed significantly than students living in the city (p < 0.001). Females appeared to be significantly more familiar with homeopathy (p < 0.002), aromatherapy (p < 0.033), creative therapies (p < 0.001) and herbal therapies (p<0.002) than males. Moreover, women were likely to use CAM more frequently than men, particularly to solve psychological problems (p < 0.004). In addition, women perceived the benefit significantly more positive than men (p < 0.001). Students in the second year revealed to use the CAM mostly to improve the quality of life (p < 0.023), while students in the third year used CAMs particularly for chronic diseases (p < 0.001). Conclusions: Results from this study suggested that female students show more positive attitudes on CAM than male students. Moreover, the prevalence of CAM use and its perceived benefits differ between males and females, so that women are more willing to use CAM practices.

Keywords: attitude, CAM, complementary and alternative medicine, healthcare students, knowledge

Procedia PDF Downloads 193
8757 Linguistic Attitudes and Language Learning Needs of Heritage Language Learners of Spanish in the United States

Authors: Sheryl Bernardo-Hinesley

Abstract:

Heritage language learners are students who have been raised in a home where a minority language is spoken, who speaks or merely understand the minority heritage language, but to some degree are bilingual in the majority and the heritage language. In view of the rising university enrollment by Hispanics in the United States who have chosen to study Spanish, university language programs are currently faced with challenges of accommodating the language needs of heritage language learners of Spanish. The present study investigates the heritage language perception and language attitudes by heritage language learners of Spanish, as well as their classroom language learning experiences and needs. In order to carry out the study, a qualitative survey was used to gather data from university students. Analysis of students' responses indicates that heritage learners are motivated to learn the heritage language. In relation to the aspects of focus of a language course for heritage learners, results show that the aspects of interest are accent marks and spelling, grammatical accuracy, vocabulary, writing, reading, and culture.

Keywords: heritage language learners, language acquisition, linguistic attitudes, Spanish in the US

Procedia PDF Downloads 196
8756 Mental Health Literacy in the Arabic Community

Authors: Yamam Abuzinadah

Abstract:

Mental health literacy has become a very influential topic around the world due to the increase of mental health issues that have been reported through national research and surveys. Mental health literacy refers to the awareness, attitudes, beliefs, knowledge and skills when dealing with mental illness. This research explores mental health literacy in the Arabic and the ways culture informs perceptions of mental health in general. Also, the impact of mental health literacy on: help-seeking attitudes, relationships and community interactions. The outcomes of this research will contribute to raising mental health awareness among the Arabic community, develop and enhance mental health service provision and explore new ideas in regards to elevating mental health literacy in the Arabic community. This research aims to explore attitudes, beliefs, perspective, values and perceptions toward mental health in general among the Arabic community. It will also aim to highlight the factors contributing to theses beliefs, perspective, value and perception and accordingly the role these factors play in regards to awareness, services access, recovery and care provided from the family and the community. This thesis will aim to reflect a detailed theorisation and exploration of: (1) The impact of cultural factors on mental health literacy ie. attitudes, beliefs, knowledge and skills. (2) The ways culture informs perceptions of mental health literacy. (3) The impact of mental health literacy on: help-seeking behaviors, and relationships and community interactions.

Keywords: Arab, mental health, literacy, awareness

Procedia PDF Downloads 419
8755 The Effort of Good Governance in Enhancing Foods Security for Sustainable National Development

Authors: Egboja Simon Oga

Abstract:

One of the most important keys to the success of a nation is to ensure steady development and national economic self-sufficiency and independence. It is therefore in this regard that this paper is designed to identify food security to be crucial to all nations’ effort toward sustainable national development. Nigeria as a case study employed various effort by the successive government towards food security. Emphasis were placed on the extent to which government has boosted food security situation on the basis of the identified limitations, conclusion was drawn, recommendation/suggestions proffered, that subsidization of the process of farm inputs like fertilizer, improved seeds and agrochemical, education of farmers on modern methods of farming through extension services, improvisation of village-based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produces are necessary.

Keywords: food, governance, development, security

Procedia PDF Downloads 320
8754 Factors Affecting Attitude of Community Pharmacists Towards Locally Manufactured Pharmaceutical Products in Addisababa: A Cross-sectional Study

Authors: Gelila Tamyalew, Asres Abitie

Abstract:

Community Pharmacists (CPs) have a significant part in consumer choice in the rational use of LMPPs. The opinion of pharmacists regarding branded and generic medications can offer a perception of the potential obstacles that might have to be overcome to advance generic medicine utilization. Many factors affect CPs' attitudes negatively toward LMPPs. Therefore, the current study assessed factors that can affect CPs' attitudes toward LMPPs. In the regression analysis of variables, three variables were associated with CPs' attitudes toward LMPPs. These are; maximum educational status, professional status, and year of experience in community pharmacy practice. Moreover, lack of belief in LMPPs, substitution agreement with the prescriber, cost-effectiveness of LMPPs, and consumer preference/demand were the most influencing reasons for the selection of LMPPs. In conclusion, the attitude of CPs seems suboptimal that requires an intervention to optimize LMPP utilization.

Keywords: locally manufactured pharmaceutical products, attitude, community pharmacist, Ethiopia

Procedia PDF Downloads 71
8753 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 531
8752 Chinese Speakers’ Language Attitudes Towards English Accents: Comparing Mainland and Hong Kong English Major Students’ Accent Preferences in ELF Communication

Authors: Jiaqi XU, Qingru Sun

Abstract:

Accent plays a crucial role in second language (L2) learners’ performance in the schooling context in the era of globalization, where English is adopted as a lingua franca (ELF). Previous studies found that Chinese mainland students prefer American English accents, whereas the young generations in Hong Kong prefer British accents. However, these studies neglect the non-native accents of English and fail to elaborate much about why the L2 learners differ in accent preferences between the two regions. Therefore, this research aims to bridge the research gap by 1) including both native and non-native varieties of English accents: American accent, British accent, Chinese Mandarin English accent, and Hong Kong English accent; and 2) uncovering and comparing the deeper reasons for the similar or/and different accent preferences between the Chinese mainland and Hong Kong speakers. This research designed a questionnaire including objective and subjective questions to investigate the students’ accent inclinations and the attitudes and reasons behind their linguistic choices. The questionnaire was distributed to eight participants (4 Chinese mainland students and 4 Hong Kong students) who were postgraduate students at a Hong Kong university. Based on the data collection, this research finds out one similarity and two differences between the Chinese mainland and Hong Kong students’ attitudes. The theories of identity construction and standard language ideology are further applied to analyze the reasons behind the similarities and differences and to evaluate how language attitudes intertwine with their identity construction and language ideology.

Keywords: accent, language attitudes, identity construction, language ideology, ELF communication

Procedia PDF Downloads 147
8751 Tribal Food Security Assessment and Its Measurement Index: A Study of Tribes and Particularly Vulnerable Tribal Groups in Jharkhand, India

Authors: Ambika Prasad Gupta, Harshit Sosan Lakra

Abstract:

Food security is an important issue that has been widely discussed in literature. However, there is a lack of research on the specific food security challenges faced by tribal communities. Tribal food security refers to the ability of indigenous or tribal communities to consistently access and afford an adequate and nutritious supply of food. These communities often have unique cultural, social, and economic contexts that can impact their food security. The study aims to assess the food security status of all thirty-two major tribes, including Particularly Vulnerable Tribal Groups (PVTG) people living in various blocks of Jharkhand State. The methodology of this study focuses on measuring the food security index of indigenous people by developing and redefining a new Tribal Food Security Index (TFSI) as per the indigenous community-level indicators identified by the Global Food Security Index and other indicators relevant to food security. Affordability, availability, quality and safety, and natural resources were the dimensions used to calculate the overall Tribal Food Security Index. A survey was conducted for primary data collection of tribes and PVTGs at the household level in various districts of Jharkhand with a considerable tribal population. The result shows that due to the transition from rural to urban areas, there is a considerable change in TFSI and a decrease in forest dependency of tribal communities. Socioeconomic factors like occupation and household size had a significant correlation with TFSI. Tribal households living in forests have a higher food security index than tribal households residing in urban transition areas. The study also shows that alternative methodology adopted to measure specific community-level food security creates high significant impact than using commonly used indices.

Keywords: indigenous people, tribal food security, particularly vulnerable tribal groups, Jharkhand

Procedia PDF Downloads 67
8750 Security Model for RFID Systems

Authors: John Ayoade

Abstract:

Radio Frequency Identification (RFID) has gained a lot of popularity in all walks of life due to its usefulness and diverse use of the technology in almost every application. However, there have been some security concerns most especially in regards to how authentic readers and tags can confirm their authenticity before confidential data is exchanged between them. In this paper, Kerberos protocol is adopted for the mutual authentication of RFID system components in order to ensure the secure communication between those components and to realize the authenticity of the communicating components.

Keywords: RFID, security, mutual authentication, Kerberos

Procedia PDF Downloads 452
8749 Stressors Faced by Border Security Officers: The Singapore Experience

Authors: Jansen Ang, Andrew Neo, Dawn Chia

Abstract:

Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers.

Keywords: border security, Singapore, stress, operations

Procedia PDF Downloads 313
8748 Programming Systems in Implementation of Process Safety at Chemical Process Industry

Authors: Maryam Shayan

Abstract:

Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.

Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology

Procedia PDF Downloads 359
8747 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 426