Search results for: international peace and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6464

Search results for: international peace and security

6014 US-India Strategic Bargaining and Power Balancing in South Asia

Authors: Anila Syed, Manzoor Ahmad

Abstract:

The relationship between United States and India has transformed from estrangement to wider engagement since 2004. With the convergence of interests and shared values both the US and India came close towards each other and evolved strategic partnership through civil nuclear cooperation. This paper analyze the cost and benefit of strategic partnership with India for US, the impact of India’s emergence as regional power on South Asian balance of power and its impact on Pak-US relationship. It also focuses on security structure of the region and challenges for the US to maintain strategic partnership with two rival states (India and Pakistan). The work also gives some recommendations for balancing power in the region in order to ensure durable peace not only between India and Pakistan but also in south Asia.

Keywords: US-India strategic partnership, civil-nuclear cooperation, balance of power, impacts on Pak-US relationship

Procedia PDF Downloads 407
6013 International Service Learning 3.0: Using Technology to Improve Outcomes and Sustainability

Authors: Anthony Vandarakis

Abstract:

Today’s International Service Learning practices require an update: modern technologies, fresh educational frameworks, and a new operating system to accountably prosper. This paper describes a model of International Service Learning (ISL), which combines current technological hardware, electronic platforms, and asynchronous communications that are grounded in inclusive pedagogy. This model builds on the work around collaborative field trip learning, extending the reach to international partnerships across continents. Mobile technology, 21st century skills and summit-basecamp modeling intersect to support novel forms of learning that tread lightly on fragile natural ecosystems, affirm local reciprocal partnership in projects, and protect traveling participants from common yet avoidable cultural pitfalls.

Keywords: International Service Learning, ISL, field experiences, mobile technology, out there in here, summit basecamp pedagogy

Procedia PDF Downloads 171
6012 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 354
6011 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 466
6010 Does Rumor Shakes Trust: The Role of Emotions in Local Conflict and Peacemaking

Authors: Safiye Ates Burc

Abstract:

This proposal is based on the story of Kurdish tribal conflict and peace in Mardin (Turkey). In the stories that will be detailed with in-depth interviews with the parties to the conflict (family elders, mediators and other tribal lords); It will be examined how rumor has an effect on establishing conflict and peace and whether it shakes the trust between the parties. In fact, this research is still at an ongoing stage. In this paper, the effect of emotions on conflict and reconciliation, which is the main subject of this ongoing study, will be conveyed in line with the data obtained from the preliminary research. In-depth interviews are conducted in the research in which the ethnography method is used. As an early result, it can be said that in organizations such as the Kurdish tribes, where local loyalties and traditions are very strong, the rumor has the potential to shake the trust between the parties and thus can become the excuse for conflict. Because rumors damage the prestige of tribes, that’s, it’s social capital.

Keywords: rumor, trust, Kurdish tribes, local peacemaking, conflict

Procedia PDF Downloads 150
6009 The Lightener of Love - The World Peace

Authors: Abdul Razzaq

Abstract:

It is known that every human society throughout the world and throughout history, the various religions and their theologies, ethics, and traditions influence everything in their life, shaping socio-economic and political ideas, attitudes and institutions. It is observed that religious teachings and traditions shape how people respond to each other in their daily social inter-course and interaction in the community at large. The majorities of us preserves and protect our own religious beliefs and traditions as generally they symbolize our essential identities, theologically, historically, culturally, socially, and even politically. Our religious faiths symbolize our dignity as persons and our very souls as communities and individuals. It thus goes without saying that in our multi-racial and multi-religious society, the only way for us to live in peace and harmony is for us to live in peaceful co-existence. It is important for us to recognize, understand, accept and respect each other regardless of our respective belief. The history of interfaith is as ancient as the religions since men and women when not at war with their neighbors have always made an effort to understand them (not least because understanding is a strategy for defense, but also because for as long as there is dialogue wars are delayed).

Keywords: Islam, interfaith, Sects, world, piece

Procedia PDF Downloads 677
6008 Post-Covid 19 Pandemic Economy: Corporate Governance and Performance of Private Security Firms in Kenya

Authors: Sewe Silvanus Odhiambo

Abstract:

Globally, many governments have publicly recognized private security firms as essential services providers. The private security firms face a lot of challenges, but the COVID-19 situation also has exacerbated them to another level. This paper locates its relevance in the post-coronavirus era. The COVID-19 pandemic has redefined the world operation, which shows a higher impact on the security field. Accordingly, the purpose of the study was to examine the role of corporate governance on the performance of private security firms in a post-covid pandemic era in Kenya. The study employed a descriptive research design, which included a quantitative approach and secondary data. The study was carried in the month of July 2021 from the registered private security firms. After targeting all private security firms, only 54 firms had disclosed their annual report by the time of conducting the study. The results depicted that pandemic has affected the performance of private security firms measures unfavorably. Further, boards of directors show a positive association with security firm performance. The study recommends that there is need board of directors to enhance management’s risk assessments in the midst of COVID-19; ensure that there are business continuity plans; there is organizational resilience; there is need for the development of new digital strategies; enabling the digital workforce in the firms and have effective communication plans with both internal and external stakeholders to deal with uncertainties and develop more post-COVID practices for boards of directors to improve performance of private security firms in Kenya. The practical implications of the study are that the research outcomes might assist regulatory bodies, investors, policymakers, and the security sector in general in their formulation of public and corporate governance strategies concerning future emergency preparedness and responses. This study also provides a unique contribution to the literature of COVID-19 and security firm performance in emerging economies context.

Keywords: COVID-19, corporate governance, firm performance, private security firms

Procedia PDF Downloads 160
6007 Enhancing Code Security with AI-Powered Vulnerability Detection

Authors: Zzibu Mark Brian

Abstract:

As software systems become increasingly complex, ensuring code security is a growing concern. Traditional vulnerability detection methods often rely on manual code reviews or static analysis tools, which can be time-consuming and prone to errors. This paper presents a distinct approach to enhancing code security by leveraging artificial intelligence (AI) and machine learning (ML) techniques. Our proposed system utilizes a combination of natural language processing (NLP) and deep learning algorithms to identify and classify vulnerabilities in real-world codebases. By analyzing vast amounts of open-source code data, our AI-powered tool learns to recognize patterns and anomalies indicative of security weaknesses. We evaluated our system on a dataset of over 10,000 open-source projects, achieving an accuracy rate of 92% in detecting known vulnerabilities. Furthermore, our tool identified previously unknown vulnerabilities in popular libraries and frameworks, demonstrating its potential for improving software security.

Keywords: AI, machine language, cord security, machine leaning

Procedia PDF Downloads 35
6006 The Role of International Organizations in the Implementation of Return Migration Policy in Cameroon

Authors: Charles Simplice Mbatsogo Mebo

Abstract:

With growth picking up again, Africa seems increasingly attractive for its own nationals who return home through new opportunities available for them. The purpose of our research paper is to understand the role of the international partners in Cameroon, with regards to their support for the return and reintegration of migrants. We, therefore, questioned the relevance and effectiveness and efficacy of international instruments in reintegrating returnees to Cameroon. After our analysis that was conducted on the basis of a documentary exploration, interviews, and field surveys, it appears that the contribution of the international partners in Cameroon is proven in relation to their participation in the financing and placement of returned experts. However, their contribution remains insufficient due to their low level of deployment and the insignificant impact of their investments on the reintegration of Cameroonian Diasporas. The research also reveals some exogenous and endogenous constraints that hinder international institutions' actions in terms of accompanying migrants returning to Cameroon. Finally, for a better management of the returnees' issue, it is necessary to set up a mechanism to raise awareness and a coordination system of all international actors involved. It is also relevant to reform the migration policy, build institutional capacities, and improve the juridical-administrative and economic environment so as to favor co-development in Cameroon.

Keywords: international partners, returnees, diaspora, migration policy, co-development

Procedia PDF Downloads 153
6005 'Utopian Performatives' for Peace: A Radical Approach to Evaluating the Value of Documentary Theatre in Northern Ireland

Authors: Harry Mccallum

Abstract:

In the last decade, there has been an upsurge in documentary theatre projects that seek to address issues arising from ‘the Troubles’ by theatre and community organisations such as The Playhouse, Kabosh, and The Verbal Arts Centre. This movement has been supported by a variety of funding agencies who have identified the importance of the instrumental use of theatre for generating societal development. However, with this upsurge in interest comes complications surrounding the subjectivity of evaluations and an understanding of their empirical impact on society. This largely theoretical led-discussion promotes the engagement of Jill Dolan’s ‘utopian performatives’ (2005) within the remit of documentary theatre for peacebuilding practices in Northern Ireland.‘Utopian Performatives’ are described as being profound moments in a theatre production that transforms audience members into a state of ‘hopeful feeling’.As a concept, they are situated within the discourse surrounding audience reception and the ‘affective turn’ (Brennan, 2004; Clough and Halley, 2007; Ahmed, 2014), which indicates its persistence on a short-term ephemeral outlook. It is therefore important to understand how this short-term ‘affect’ can expand into a longer-term ‘effect.’ Through this interdisciplinary study between ‘peace’ and ‘theatre’ studies, I am proposinga theoretical framework that examines how these individual ‘utopian performatives’ at the personal level can lead to a change at the societal level. The framework understands that ‘utopian performatives’ have the capacity to generate discussion and empower audience members to actively strive for a ‘positive peace’; something which is evidently absent in a contemporary Northern Ireland.

Keywords: theatre, peacebuilding, conflict transformation, northern Ireland

Procedia PDF Downloads 130
6004 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 95
6003 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 55
6002 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 381
6001 The Islamic Perspective in International Relations

Authors: Hakam Junus, Natassha Chrysanti

Abstract:

The international relations theory currently is dominated by the western theoretical perspectives. Although the western theories are often used by many scholars as the universal perspective to explain the phenomena that occur in the world, sometimes the existing theories are failed to explain various issues that occur in the non-western world, for example, in the studies concerning on terrorism issues. Using inappropriate theories to explain the international issues such as terrorism will cause a failure in the decision-making process. The lack of understanding regarding Islamic perspective could be one of the factors that make international society unable to eradicate violent terrorism in the name of religion. Thus, this paper is argued that considering Islamic perspective as one of the major studies in international relations is significant to build a bridge between the Islamic world and the western world. It is believed that enhancing the study of Islamic perspective will create better understanding of the Islamic world and will enrich the study of international relations. This paper is conducted through a qualitative approach, in which data is obtained from the literature analysis. Considering Islamic perspective is important because Islam is listed as one of the major religions in the world. It is also due to the geopolitical spread of the Muslim in the world and the likelihood of the Islamic perspective to shape and influence Muslim’s behavior in the international level. The study of Islamic perspective in the international level is neither to contempt nor to oppose the existing western theories; rather it is needed in order to broaden the perspective in the international relations studies. The Islamic perspective is different compared to the non-western school of thought such as realism, and liberalism in some respects. The Islamic perspective cannot be explained through the lens of rationalist approaches. Compares to the post-positivism international relations perspectives, Islamic perspective is probably closer to the constructivist school of thought. However, the Islamic perspective offers some uniqueness that is not limited to the socially constructed ideas as in the constructivist arguments. This paper will be developed according to the discussion of three aspects that make Islamic perspective different with the existing international relations theories. The first aspect is the main actors in the international level. The second aspect is regarding on what appears to be the most important point for the actors in the international relations. The third aspect is regarding the pattern of relationship between the actors in the international level. In addition, this paper will briefly discuss the perspective of Islam in economics compare to the existing theories in the realm of international political economy.

Keywords: international relations, Islam, non-western theories, societies

Procedia PDF Downloads 498
6000 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 382
5999 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 428
5998 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.

Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs

Procedia PDF Downloads 95
5997 Participation in IAEA Proficiency Test to Analyse Cobalt, Strontium and Caesium in Seawater Using Direct Counting and Radiochemical Techniques

Authors: S. Visetpotjanakit, C. Khrautongkieo

Abstract:

Radiation monitoring in the environment and foodstuffs is one of the main responsibilities of Office of Atoms for Peace (OAP) as the nuclear regulatory body of Thailand. The main goal of the OAP is to assure the safety of the Thai people and environment from any radiological incidents. Various radioanalytical methods have been developed to monitor radiation and radionuclides in the environmental and foodstuff samples. To validate our analytical performance, several proficiency test exercises from the International Atomic Energy Agency (IAEA) have been performed. Here, the results of a proficiency test exercise referred to as the Proficiency Test for Tritium, Cobalt, Strontium and Caesium Isotopes in Seawater 2017 (IAEA-RML-2017-01) are presented. All radionuclides excepting ³H were analysed using various radioanalytical methods, i.e. direct gamma-ray counting for determining ⁶⁰Co, ¹³⁴Cs and ¹³⁷Cs and developed radiochemical techniques for analysing ¹³⁴Cs, ¹³⁷Cs using AMP pre-concentration technique and 90Sr using di-(2-ethylhexyl) phosphoric acid (HDEHP) liquid extraction technique. The analysis results were submitted to IAEA. All results passed IAEA criteria, i.e. accuracy, precision and trueness and obtained ‘Accepted’ statuses. These confirm the data quality from the OAP environmental radiation laboratory to monitor radiation in the environment.

Keywords: international atomic energy agency, proficiency test, radiation monitoring, seawater

Procedia PDF Downloads 169
5996 Bring Your Own Device Security Model in a Financial Institution of South Africa

Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren

Abstract:

This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.

Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis

Procedia PDF Downloads 28
5995 Development of Risk-Based Ambient Air Quality Standards in the Russian Federation on the Basis of Risk Assessment Procedures Harmonized with International Approaches

Authors: Nina V. Zaitseva, Pavel Z. Shur, Nina G. Atiskova

Abstract:

Nowadays harmonization of sanitary and hygienic standards of environmental quality with international standards is crucial part of integration of Russia into the international community. Harmonization of Russian and international ambient air quality standards may be realized by risk-based standards development. In this paper approaches to risk-based standards development and examples of these approaches implementation are presented.

Keywords: harmonization, health risk assessment, evolutionary modelling, benchmark level, nickel, manganese

Procedia PDF Downloads 389
5994 Adult Education for Transformation and Security Challenges in Nigeria

Authors: Asmau Zarma Gogaram

Abstract:

The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education.

Keywords: adult education, transformation and security challenges, Nigeria, education and human development

Procedia PDF Downloads 520
5993 Role of Education in the Transference of Global Values

Authors: Baratali Monfarediraz

Abstract:

Humans’ identity is not only under the influence of a certain society or social structure but also it is influenced by an international identity. This article is a research on role of education in the manifestation of universally accepted values such as, advancement of science, improvement in the quality of education, preservation of the natural environment, preservation, and spread of peace, exchange of knowledge and technology, equal educational opportunities, benefiting from a universal morality and etc. Therefore, the relation between universal beliefs and values and educational approaches and programs is the first thing to pay attention to. Studies indicate that the first step in achieving the above mentioned goals is offering learning strategies. Therefore the importance of educational approaches and programs as a tool for the transference of ideas, experiences and thoughts becomes quite clear. Proper education gives everyone the opportunity of acquiring knowledge while creating tendency toward social activities paves the way for achieving the universal values.

Keywords: globalization, universal values, education, universal goal, values, society

Procedia PDF Downloads 378
5992 Impacts of International Training Program in Pedagogy in Higher Education in the United States on Visiting Scholars in China

Authors: Yuliang Liu, Thomas Lavallee, Mary Weishaar, Gretchen Fricke, Huaibo Xin

Abstract:

The longitudinal study was designed to investigate the impacts of the International Training Program in Pedagogy (ITPP) at a midwestern institution in the United States on the visiting scholars from China from 2012-18. The study used the survey research method and involved 48 visiting scholars from Northwest Normal University in China in those eight ITPP cohorts. The results of both quantitative and qualitative data were critically examined and indicated both types of data sources revealed similar findings. It was found that the ITPP has significantly affected all scholars' instruction in China. International implications resulted from the study.

Keywords: international training program in pedagogy, visiting scholars, survey research method, International implications

Procedia PDF Downloads 210
5991 Enhancing Food Security through Cabbage Production by Local Fammers in Nkokobe Municipality

Authors: Sipumle Qapeshu, Bongiwe Mcata, Ajuruchukwu Obi

Abstract:

Subsistence farmers practice farming for survival while commercial farmers produce to feed themselves and larger society with the motive to achieve highest profit. These types of farmers are characterised by growing what they eat, live without making regular purchases in the markets. The main objective of subsistence/peasant farmers is to ensure food security at household level. Cabbage is a crop that has been identified to have vital food nutrient sources like Vitamin A, B and C, protein, calcium, iron and antioxidative compounds beneficial for preventing cancer. This paper, therefore, looks at the potential that cabbage production has in enhancing household food security and also the challenges encountered by these cabbage producers. Primary data was obtained from 50 respondents, and linear regression model was used to analyse the data used. Income was used as food security measure. The results showed that three variables were statistically significant and they are gender (10%), education (5%) and household size (5%). Meaning that these are variables that influenced cabbage production by these households, and it also affects their food security status since income is affected.

Keywords: subsistence farmers, food security, cabbage, farming

Procedia PDF Downloads 297
5990 Formation of an Empire in the 21st Century: Theoretical Approach in International Relations and a Worldview of the New World Order

Authors: Rami Georg Johann

Abstract:

Against the background of the current geopolitical constellations, the author looks at various empire models, which are discussed and compared with each other with regard to their stability and functioning. The focus is on the fifth concept as a possible new world order in the 21st century. These will be discussed and compared to one another according to their stability and functioning. All empires to be designed will be conceptualised based on one, two, three, four, and five worlds. All worlds are made up of a different constellation of states and relating coalitions. All systems will be discussed in detail. The one-world-system, the“Western Empire,” will be presented as a possible solution to a new world order in the 21st century (fifth concept). The term “Western” in “Western Empire” describes the Western concept after World War II. This Western concept was the result of two horrible world wars in the 20th century.” With this in mind, the fifth concept forms a stable empire system, the “Western Empire,” by political measures tied to two issues. Thus, this world order provides a significantly higher long-term stability in contrast to all other empire models (comprising five, four, three, or two worlds). Confrontations and threats of war are reduced to a minimum. The two issues mentioned are “merger” and “competition.” These are the main differences in forming an empire compared to all empires and realms in the history of mankind. The fifth concept of this theory, the “Western Empire,” acts explicitly as a counter model. The Western Empire (fifth concept) is formed by the merger of world powers without war. Thus, a world order without competition is created. This merged entity secures long-term peace, stability, democratic values, freedom, human rights, equality, and justice in the new world order.

Keywords: empire formation, theory of international relations, Western Empire, world order

Procedia PDF Downloads 146
5989 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 76
5988 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 560
5987 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia

Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana

Abstract:

Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.

Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom

Procedia PDF Downloads 451
5986 The Time for the World to Go Back to Forgotten "Values Pedagogy"

Authors: Sakineh Tashakori, Terrence Lovat

Abstract:

With the start of war in every part of the world, from the war between Russia and Ukraine to the unbelievable start of the war between Israel and Palestine, the number of war refugees is increasing day by day. They are all homeless dads, moms, and kids looking for a safe place to go back to their ordinary lives without the fear of being mistreated and misunderstood by others. The significance of this study is to help the education system make life easier for refugees by going to values pedagogy inspired by Habermasian epistemology. The study employs a literature review methodology, which involves gathering relevant sources from academic journals and books to answer how values pedagogy is going to help the education system in this regard. The collected literature will be critically analyzed and synthesized to draw meaningful conclusions and support the argument for the implementation of values pedagogy. The findings of the study illustrate that values pedagogy can have a role in peace education and softening discourse to give students a better sense of mutual cultural and religious understanding and respect.

Keywords: war, refugee, values pedagogy, Habermasian epistemology, peace education

Procedia PDF Downloads 55
5985 International Marketing in Business Practice of Small and Medium-Sized Enterprises

Authors: K. Matušínská, Z. Bednarčík, M. Klepek

Abstract:

This paper examines international marketing in business practice of Czech exporting small and medium-sized enterprises (SMEs) with regard to the strategic perspectives. Research was focused on Czech exporting SMEs from Moravian-Silesia region and their behaviour on international markets. For purpose of collecting data, a questionnaire was given to 262 SMEs involved in international business. Statistics utilized in this research included frequency, mean, percentage, and chi-square test. Data were analysed by Statistical Package for the Social Sciences software. The research analysis disclosed that there is certain space for improvement in strategic marketing especially in marketing research, perception of cultural and social differences, product adaptation and usage of marketing communication tools.

Keywords: international marketing, marketing mix, marketing research, small and medium-sized enterprises, strategic marketing

Procedia PDF Downloads 329