Search results for: security education
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9508

Search results for: security education

9088 Parents' Expectations from Compulsory Pre-School Education in the Slovak Republic

Authors: Sona Lorencova, Beata Hornickova

Abstract:

The study deals with the presentation of the results of qualitatively oriented research, the aim of which was to find out the attitudes of parents to the planned compulsory pre-school education in the Slovak Republic. The research was conceived as an entry into the field of the researched issue and its aim was to support the validity and effectiveness of items in the questionnaire, which was created based on the statements of parents. The research method was an interview with 15 parents whose children attended kindergarten. The main question of the interviews was to find out what are the parents' expectations from compulsory pre-school education, which will be compulsory in the Slovak Republic from 2021 for all 5-year-old children. From the introduction of compulsory pre-school education, the professional public expects in particular greater participation of children from marginalized Roma communities in pre-school education, as well as children from socially disadvantaged backgrounds, better preparation of children for primary school and better results in international testing. The research found that the expectations of parents are different and depend on their socio-economic status, in accordance with which they place greater importance on the upbringing and education of children. The findings from interviews with parents contributed to the formulation of items in the questionnaire, which will be distributed to parents whose children will attend compulsory pre-school education in the Slovak Republic from 2021.

Keywords: compulsory pre-school education, kindergarten, education of pre-school children, parental expectations from pre-school education

Procedia PDF Downloads 159
9087 Mindfulness among Educators in General and Special Education at Independent Schools in Qatar and Its Effects on Their Academic Performance and Self-Efficacy

Authors: Mohamed S. Osman, Mohamed R. Nosair

Abstract:

The study aims to determine the effects of mindfulness on self-efficacy and professional success among educators of general and special education at Qatar Independent. The study sample will consist of 100 educators from the males and females divided to (50) educators of general education and (50) educators of Special Education in primary, and high schools. They will response to mindfulness scale and the scale of self-efficacy. In addition, use reports of the assessment by the Department of Education for their performance and assessments of their supervisors. The study will examine the effect of some variables such as differences between educators from general and special education, as well as the differences between males and females and years of experience. The study will use a statistic descriptive approach and Correlative analysis such as; means and the Pearson correlation coefficient. The study may predicts differences between educators in all variables study.

Keywords: mindfulness, educators, general education, special education, academic performance, self-efficacy

Procedia PDF Downloads 332
9086 Ethno-Religious Conflicts In Nigeria; Implications for National Security

Authors: Samuel Onyekachi Chidi

Abstract:

Nigeria today faces more internal threats stemming from ethnic and religious conflicts than external sources. This article seeks to examine the ethno-religious conflicts in Nigeria from 2015 to 2021 and their impact on national security. The research was guided by six objectives. The theoretical framework adopted for this study is Structural Conflict Theory, which provides an adequate explanation, a predictive rationale for the frequent occurrence of ethno-religious conflicts and a tendency to provide the necessary insight for their resolution. The results of the study revealed that there is a strong relationship between ethnicity, religion, conflict and national security and that the ethno-religious conflicts experienced in Nigeria have gross implications for national security. The study recommends that the secularity of the Nigerian state be restored and preserved and that the state of origin be removed and replaced by the state of residence in all our national documents, as this will reduce ethnic identity, which is in opposition to nationalism. Religious leaders, traditional rulers, the media and other stakeholders should support the government in its fight to reduce ethno-religious conflict by sensitizing its youth, preaching unity and peaceful coexistence, and discouraging the use of violence as a means of settling disputes between groups and individuals.

Keywords: ethnicity, religion, conflict, national security

Procedia PDF Downloads 47
9085 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 351
9084 Maras and Public Security in Central America in XXI Century

Authors: Michal Stelmach

Abstract:

The aim of this paper is a critical analysis of the security policy in the field of the fight against transnational criminal groups in Central America in XXI century. We are analyzing all taken issues from several perspectives: political, anthropological, sociological and legal which allows me to confront behavior and the attitudes of the political elites against official legislative changes and declared actions, strategies and policies against practice. In the first part of paper we would like to present the genesis and characteristic of transnational gangs, called maras and next we would like to present their activities and roles within chosen sectors of organized crimes. In the second part we will analyze the government’s policy towards transnational criminal groups. The analysis will be concentrated on public safety policy implemented in specific Central American countries as well as regional international cooperation. The main intention of the author is to present the state of the security in Central America in XXI century by emphasizing failures and successes in the fight against transnational criminal organizations. Additionally we want to present and define the challenges currently facing the region now and to show the prediction of the situation’s development within next future and to define the recommendations on the design of public security policies in Central American countries.

Keywords: maras, public security, human rights, Central America

Procedia PDF Downloads 307
9083 Need, Relevancy and Impact of Ethics Education in Accounting Profession

Authors: Mrigakshi Das

Abstract:

The ethics of a business is currently a high profile issue owing to sensational corporate scandals that had taken place in many countries causing extensive damages to the economy and society. These corporate scandals question the morality of businessmen in general and accountants in particular. It is argued that the accountants have been the main contributors to the decline in ethical standards of a business. This researcher has reviewed the need and impact of ethics education in accounting profession. Despite of ethical interventions, the rate of accounting scandals are increasing and have left the public questioning that has the profession become really less ethical?

Keywords: accounting, ethics education and intervention in accounting, accounting education, accounting profession, moral reasoning and development, ethics education

Procedia PDF Downloads 524
9082 Reshaping of Indian Education System with the Help of Multi-Media: Promises and Pitfalls

Authors: Geetu Gahlawat

Abstract:

The education system accustomed information on daily basis in term of variety i.e Multimedia channel. This can create a challenge to pedagogue to get hold on learner. Multimedia enhance the education system with its technology. Educators deliver their content effectively and beyond any limit through multimedia elements on another side it gives easy learning to learners and they are able to get their goals fast. This paper gives an overview of how multimedia reshape the Indian education system with its promises and pitfalls.

Keywords: multimedia, technology, techniques, development, pedagogy

Procedia PDF Downloads 253
9081 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 125
9080 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 331
9079 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 485
9078 The Need for Career Education Based on Self-Esteem in Japanese Youths

Authors: Kumiko Inagaki

Abstract:

Because of the rapidly changing social and industrial world, career education in Japan has recently gained in popularity with the government’s support. However, it has not fostered proactive mindsets and attitudes in the youths. This paper first provides a background of career education in Japan. Next, based on the International Survey of Youth Attitude, Japanese youths’ views of themselves and their future were identified and then compared to the views of youths in six other countries. Assessments of the feelings of self-satisfaction and future hopes of Japanese youths returned very low scores. Suggestions were offered on career education in order to promote a positive self-image.

Keywords: career education, self-esteem, self-image, youth attitude

Procedia PDF Downloads 461
9077 Preparing Education Enter the ASEAN Community: The Case Study of Suan Sunandha Rajabhat University

Authors: Sakapas Saengchai, Vilasinee Jintalikhitdee, Mathinee Khongsatid, Nattapol Pourprasert

Abstract:

This paper studied the preparing education enter the ASEAN Community by the year 2015 the Ministry of Education has policy on ASEAN Charter, including the dissemination of information to create a good attitude about ASEAN, development of students' skills appropriately, development of educational standards to prepare for the liberalization of education in the region and Youth Development as a vital resource in advancing the ASEAN community. Preparing for the liberalization of education Commission on Higher Education (CHE) has prepared Thailand strategic to become ASEAN and support the free trade in higher education service; increasing graduate capability to reach international standards; strengthening higher educational institutions; and enhancing roles of educational institutions in the ASEAN community is main factor in set up long-term education frame 15 years, volume no. 2. As well as promoting Thailand as a center for education in the neighbor countries. As well as development data centers of higher education institutions in the region make the most of the short term plan is to supplement the curriculum in the ASEAN community. Moreover, provides a teaching of English and other languages used in the region, creating partnerships with the ASEAN countries to exchange academics staff and students, research, training, development of joint programs, and system tools in higher education.

Keywords: ASEAN community, education, institution, dissemination of information

Procedia PDF Downloads 452
9076 The Importance of Compulsory Pre-School Education from the Parents’ Perspective in the Czech Republic

Authors: Beata Horníckova, Sona Lorencova

Abstract:

The study deals with the presentation of the results of quantitatively oriented research. The research was conducted as part of a questionnaire survey with the aim to find out what are the attitudes of parents to compulsory preschool education in the Czech Republic. This research presents results from the area of importance of compulsory pre-school education from the parents’ perspective. The research method was a questionnaire, which was distributed to respondents through an online platform. The research involved 107 parents, who answered a total of 36 questions that found out their attitudes to last year’s compulsory preschool attendance. The results show that compulsory pre-school attendance has increased the importance of pre-school education. However, the results also show that the compulsory last year of pre-school education is not more important according to parents than in previous years. Most participants consider compulsory pre-school attendance to be important and are happy that their child attends it. The results reveal the fact that the introduction of compulsory pre-school attendance has contributed to the importance of parents’ perceptions of pre-primary education.

Keywords: compulsory pre-school education, education of pre-school children, kindergarten, parents

Procedia PDF Downloads 135
9075 Attitude toward Co-education among Saudi Universities Students

Authors: Mohammed Mohsen Ahmed Al Azab

Abstract:

Co-education at universities is one of the options that may have an economic as well as social benefit, as it may have a positive impact on improving relationships between students and increasing competitiveness among them, which may have positive effects on educational achievement and alleviate some social problems such as divorce. There is, to the best knowledge of the researcher, no studies tested the subject matter of the current study in Saudi society. The Saudi society is undergoing radical changes at all levels. The current study aims to identify the attitudes of university students toward co-education, the differences between male and female students from various specialties in their attitudes towards co-education, and the relationship of this to the educational level of the parent (educated-uneducated) using the descriptive, comparative, correlational approach. The study sample (n = 200) was chosen randomly among male and female students at King Saud University. The researcher prepared and used an attitude scale. Results showed positive attitudes towards co-education among university students (mean = 3.7, Std. = 0.45). It was also shown that there are significant differences between students’ attitudes towards co-education that can be attributed to their field of study, with students in scientific majors scoring higher than humanities counterparts. Findings also show differences between students’ attitudes towards co-education that can be attributed to the educational level of the parent, where the attitudes of those whose parents received some education were more positive. The results did not indicate any differences between students’ attitudes towards co-education that can be attributed to their gender.

Keywords: attitude, co-education, university students, level of parental education

Procedia PDF Downloads 37
9074 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 311
9073 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 271
9072 Standards of Toxicity and Food Security in Brazil

Authors: Ana Luiza Da Gama E Souza

Abstract:

This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.

Keywords: standards, indicators, human rights, food security

Procedia PDF Downloads 311
9071 Importance of Women Education: Mother To Be Education in Order to Brighten Future Generation’s Foredoom

Authors: Ummi Sholihah Pertiwi Abidin, Eva Fadhilah

Abstract:

Social changes are more and more growing and having many different forms as the time passed and thought methods in the society. One of many forms of that social changes is the emancipation of women that is flourishing by the inception of gender equality perception between men and women in all aspects including education. It’s not anymore found the distinction between genders in learning and the education achieving right at this globalized era. But, it is still many perceptions which are against that equality of education achieving right, either come from the women’s selves or many external factors. They assumed that they are going to be a mother in the future, and a wife, someone with responsible for taking care of the household and everything inside, while the husband is the one who has the responsible for looking for the living. So comes from this kind of assumption, the perception against the education equality between genders, which means there is no need for them –women- to achieve the high education because they will still end up as housewives. Except those working or career women that need high education to support their works. These women are not aware that even a mother needs the high and capable education. Because, as the 'mother to be,' they surely need broad knowledge from the education to educate their children in the future. It is such a big fault to say the kind of thing, 'It is no matter that I am not educated, in case I’m just a housewife. The important thing is my children get a great education'. Unfortunately, it is still often found, saying 'A housewife job is not a big deal to do with high education.' This qualitative method paper raises a theme about the importance of education for women, no matter what will they be in the future. Because however, and whatever is the woman’s career outside the house, or even not working outside, she’s still a mother for her children, and 'educational provision' is a great need. And so forth, this educational provision is a big deal to do with future generation’s foredoom, regarding the first source of children’s knowledge and the first school for them is their mother.

Keywords: women education, mother to be, educational provision, first school, future generation’s foredoom

Procedia PDF Downloads 248
9070 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 392
9069 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 365
9068 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 324
9067 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 105
9066 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 665
9065 Gender Differences in Attitudes to Technology in Primary Education

Authors: Radek Novotný, Martina Maněnová

Abstract:

This article presents a summary of reviews on gender differences in perception of information and communication technology (ICT) by pupils in primary education. The article outlines the meaning of ICT in primary education then summarizes different studies of the use of ICT in primary education from the point of view of gender. The article also presents the specific differences of gender in the knowledge of modalities of use of specialized digital tools and the perception and value assigned to ICT, accordingly the article provides insight into the background of gender differences in performance in relation to ICT to determinate the complex meaning of pupils attitudes to the ICT.

Keywords: ICT in primary education, attitudes to ICT, gender differences, gender and ICT

Procedia PDF Downloads 458
9064 The Place of Inclusive Education in the Transformative Education of Children with Intellectual Disabilities in Oyo State, Nigeria

Authors: Adewale Olabisi

Abstract:

The society has bastion of people with diverse kinds of special needs which invariably affect the kind of education that is provided to this category of children. Most schools for pupils with intellectual disabilities seem not to be achieving the objectives it was set out to achieve. Hence, there is the need to provide transformative education for these children with intellectual disabilities which can only be achieved in an inclusive educational setting. However, achieving this has been a great challenge in Nigeria. This paper, however, dealt with the urgent need for transformative teaching for persons with intellectual disabilities in readiness for them to be accepted in the society and also enhance their self-concept and perception which in turn will make a way for their self-sustenance. Suggestions and recommendations that will better enhance the full implementation of transformative teaching for pupils with intellectual disabilities in an inclusive environment were also made.

Keywords: inclusive education, transformative education, intellectual disabilities, Oyo state, Nigeria

Procedia PDF Downloads 297
9063 Special Education in the South African Context: A Bio-Ecological Perspective

Authors: Suegnet Smit

Abstract:

Prior to 1994, special education in South Africa was marginalized and fragmented. Moving away from a Medical model approach to special education, the Government, after 1994, promoted an Inclusive approach, as a means to transform education in general, and special education in particular. This transformation, however, is moving at too a slow pace for learners with barriers to learning and development to benefit fully from their education. The goal of the Department of Basic Education is to minimize, remove, and prevent barriers to learning and development in the educational setting, by attending to the unique needs of the individual learner. However, the implementation of Inclusive education is problematic, and general education remains poor. This paper highlights the historical development of special education in South Africa, underpinned by a bio-ecological perspective. Problematic areas within the systemic levels of the education system are highlighted in order to indicate how the interactive processes within the systemic levels affect special needs learners on the personal dimension of the bio-ecological approach. As part of the methodology, thorough document analysis was conducted on information collected from a large body of research literature, which included academic articles, reports, policies, and policy reviews. Through a qualitative analysis, data were grouped and categorized according to the bio-ecological model systems, which revealed various successes and challenges within the education system. The challenges inhibit change, growth, and development for the child, who experience barriers to learning. From these findings, it is established that special education in South Africa has been, and still is, on a bumpy road. Sadly, the transformation process of change, envisaged by implementing Inclusive education, is still yet a dream, not fully realized. Special education seems to be stuck at what is, and the education system has not moved forward significantly enough to reach what special education should and could be. The gap that exists between a vision of Inclusive quality education for all, and the current reality, is still too wide. Problems encountered in all the education system levels, causes a funnel-effect downward to learners with special educational needs, with negative effects for the development of these learners.

Keywords: bio-ecological perspective, education systems, inclusive education, special education

Procedia PDF Downloads 121
9062 Perception of Secondary Schools’ Students on Computer Education in Federal Capital Territory (FCT-Abuja), Nigeria

Authors: Salako Emmanuel Adekunle

Abstract:

Computer education is referred to as the knowledge and ability to use computers and related technology efficiently, with a range of skills covering levels from basic use to advance. Computer continues to make an ever-increasing impact on all aspect of human endeavours such as education. With numerous benefits of computer education, what are the insights of students on computer education? This study investigated the perception of senior secondary school students on computer education in Federal Capital Territory (FCT), Abuja, Nigeria. A sample of 7500 senior secondary schools students was involved in the study, one hundred (100) private and fifty (50) public schools within FCT. They were selected by using simple random sampling technique. A questionnaire [PSSSCEQ] was developed and validated through expert judgement and reliability co-efficient of 0.84 was obtained. It was used to gather relevant data on computer education. Findings confirmed that the students in the FCT had positive perception on computer education. Some factors were identified that affect students’ perception on computer education. The null hypotheses were tested using t-test and ANOVA statistical analyses at 0.05 level of significance. Based on these findings, some recommendations were made which include competent teachers should be employed into all secondary schools; this will help students to acquire relevant knowledge in computer education, technological supports should be provided to all secondary schools; this will help the users (students) to solve specific problems in computer education and financial supports should be provided to procure computer facilities that will enhance the teaching and the learning of computer education.

Keywords: computer education, perception, secondary school, students

Procedia PDF Downloads 433
9061 Re-Imagining Physical Education Teacher Education in a South African Higher Education Institution

Authors: C. F. Jones Couto, L. C. Motlhaolwa, K. Williams

Abstract:

This article explores the re-imagining of physical education teacher education in South African higher education. Utilising student reflections from a physical education practical module, valuable insights into student experiences were obtained about the current physical education pedagogical approaches and potential areas for improvement. The traditional teaching model of physical education is based on the idea of teaching students a variety of sports and physical activities. However, this model has been shown to be ineffective in promoting lifelong physical activity. The modern world demands a more holistic approach to health and wellness. Data was collected using the arts-based collage method in combination with written group reflections from 139 second-year undergraduate physical education students. This study employed thematic analysis methods to gain a comprehensive understanding of the data and extract a broader perspective on the students' experiences. The study aimed to empower student teachers to learn, think, and act creatively within the many educational models that impact their experience, contributing to the ongoing efforts of re-imagining physical education teacher education in South African higher education. This research is significant as the students' valuable insights reflected that they can think and work across disciplines. Sustainable development goals and graduate attributes are important concepts that can contribute to student preparation. Using a multi-model educational approach based on the cultural-historical theory, higher education institutions can help develop graduate attributes that will prepare students for success in the workplace and life.

Keywords: holistic education, graduate attributes, physical education, teacher education, student experiences, sustainable development goals

Procedia PDF Downloads 56
9060 A Phenomenal Study of Parental Attitudes towards the Professional Education of Their Daughters in Karachi

Authors: Nusrat Ali, Muhammad Saleem Khan

Abstract:

Education is the process of bringing individuals aware of their own reality in a manner that leads them to the effective adjustment with the environment. Females’ participation is vital to reducing hunger and poverty and promoting the family welfare. Education is the right of men and women both. Female education is more needed rural areas as compared to urban areas. Without educating the women of the country we cannot think of developing our nation. It is a fact that women are the first teachers of their children. Hence, if mothers are well educated, they can play an important role in shaping and molding of their sons and daughters. The main purpose of study was to identify the barriers of female education and the attitude among the parents. The present study researchers selected a quantitative study to explore the highlighting problem in the particular areas. Through the stratified random sampling selected a sample size from each stratum and generalized whole population. Chi-square test was used to test the validity of the data. The conclusion shows attitudes of parents somehow influence their daughters’ education, particularly those who are living in countryside. Another a big challenge of female education is co-education system in our society is higher which directly subjected to parents unfavorable attitude towards their daughters’ education. In this modern era various organizations are working for female education in rural areas where females are considered as house working ladies, now it’s time to work more to change parent’s attitude towards their daughter’s education.

Keywords: parental attitude, professional education, daughter, unfavorable attitude

Procedia PDF Downloads 276
9059 Information Construction of Higher Education in Teaching Practice

Authors: Yang Meng, James L. Patnao

Abstract:

With the rapid development of information technology and the impact of the epidemic environment, the traditional teaching model can’t longer meet the requirements of the development of the times. The development of teaching mechanism is the inevitable trend of the future development of higher education. We must further promote the informatization of higher education in teaching practice, let modern information technology penetrate and practice in classroom teaching, and provide promising opportunities for the high-quality development of higher education. This article mainly through the distribution of questionnaires to teachers of colleges and universities, so as to understand the degree of informatization in the teaching of colleges and universities. And on the basis of domestic and foreign scholars' research on higher education informatization, it analyzes the existing problems, and finds the optimal solution based on the needs of education and teaching development. According to the survey results, most college teachers will use information technology in teaching practice, but the information technology teaching tools used by teachers are relatively simple, and most of them only use slides. In addition, backward informatization infrastructure and less informatization training are the main challenges facing the current teaching informatization construction. If colleges and universities can make good use of information technology and multimedia technology and combine it with traditional teaching, it will definitely promote the development of college education and further promote the modernization and informatization of higher education.

Keywords: higher education, teaching practice, informatization construction, e-education

Procedia PDF Downloads 89