Search results for: public attitudes security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9137

Search results for: public attitudes security

8657 Fiscal Stability Indicators and Public Debt Trajectory in Croatia

Authors: Hrvoje Simovic

Abstract:

Paper analyses the key problems of fiscal sustainability in Croatia. To point out key challenges of fiscal sustainability, the public debt sustainability is analyzed using standard indicators of fiscal stability, accompanied with the identification of regime changes approach in the public debt trajectory using switching regression approach. The analysis is conducted for the period from 2001 to 2016. Results show huge vulnerability in recession period (2009-14), so key challenges in current fiscal policy and public debt management are recognized in maturity prolongation, interest rates trends, and credit rating expectations.

Keywords: fiscal sustainability, public debt, Croatia, budget deficit

Procedia PDF Downloads 241
8656 Public Space, Environmental Violence and Female Vulnerability in Radwa Ashour’s Specters and Betool Khadiri’s Absent

Authors: Jihan Zakarriya

Abstract:

This paper aims at examining the concepts of gender vulnerability, militarized spaces and environmental degradation in Egyptian novelist Radwa Ashour’s Specters (1999) and Iraqi novelist Betool Khadiri’s Absent (2005). Although the socio-economic, environmental and political conditions in the 1990s- Egypt and Iraq are different, this paper argues that Ashour’s Specters and Khadiri’s Absent show the two societies as sharing a concern with the politics of public participation, individual freedom and political violence. For example, while Specters exposes the planned processes of economic-political and cultural violence towards Egyptian environment and people that undermine concepts of justice, equality and democracy, Absent shows the destructive effects of the systematic, successive waves of (international) militarized interferences and socio-economic sanctions imposed on Iraq following the Gulf War that hinder efforts of social development and kindle ethnic-religious violence and polarization in the country. This paper investigates and relates issues of gender, environmental and political violence and repression in Ashour’s Specters and Khadiri’s Absent in relation to the concepts of public space and security in the two countries. The paper argues that the selected novels articulate a particular awareness of the political-international conflicts and difficulties in the 1990s-Egypt and Iraq, with the aim both to emphasize the issue of gender as a tool of oppression and power hierarchy worldwide and to figure out new notions of public participation and change.

Keywords: gender violence, public space, environment, change

Procedia PDF Downloads 121
8655 Research on the Path of Renewal and Activation of Public Space in Guangzhou Historical City under the Guidance of Public Art

Authors: Jingjing Li, Shifu Wang

Abstract:

After the irreversible consequences of the traditional renewal mode of ‘function first and then beautification’, such as the constructive destruction, social differentiation, and cultural, ecological imbalance, the renewal of the historical urban area began to pay attention to the excavation of cultural connotation, and entered a new stage from the pursuit of ‘quantity’ growth to the promotion of ‘quality’, expecting to rejuvenate the old city through the intervention of public art. This paper interprets the cases at home and abroad, summarizes the different forms of expression and application strategies of public art in the renewal of historical urban areas, and combs the limitations of the existing practice in Guangzhou through observation. Finally, it puts forward suggestions from three aspects of the system, implementation strategy, and implementation path, respectively, and explores the path of simultaneous rejuvenation of material space and cultural space in historical urban areas under the intervention of public art.

Keywords: public art, historic city, public space, renewal activation

Procedia PDF Downloads 116
8654 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 80
8653 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 36
8652 An Analysis of Privacy and Security for Internet of Things Applications

Authors: Dhananjay Singh, M. Abdullah-Al-Wadud

Abstract:

The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.

Keywords: Internet of Things (IoT), message authentication, privacy, security

Procedia PDF Downloads 360
8651 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 216
8650 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 362
8649 Barriers to Business Model Innovation in the Agri-Food Industry

Authors: Pia Ulvenblad, Henrik Barth, Jennie Cederholm BjöRklund, Maya Hoveskog, Per-Ola Ulvenblad

Abstract:

The importance of business model innovation (BMI) is widely recognized. This is also valid for firms in the agri-food industry, closely connected to global challenges. Worldwide food production will have to increase 70% by 2050 and the United Nations’ sustainable development goals prioritize research and innovation on food security and sustainable agriculture. The firms of the agri-food industry have opportunities to increase their competitive advantage through BMI. However, the process of BMI is complex and the implementation of new business models is associated with high degree of risk and failure. Thus, managers from all industries and scholars need to better understand how to address this complexity. Therefore, the research presented in this paper (i) explores different categories of barriers in research literature on business models in the agri-food industry, and (ii) illustrates categories of barriers with empirical cases. This study is addressing the rather limited understanding on barriers for BMI in the agri-food industry, through a systematic literature review (SLR) of 570 peer-reviewed journal articles that contained a combination of ‘BM’ or ‘BMI’ with agriculture-related and food-related terms (e.g. ‘agri-food sector’) published in the period 1990-2014. The study classifies the barriers in several categories and illustrates the identified barriers with ten empirical cases. Findings from the literature review show that barriers are mainly identified as outcomes. It can be assumed that a perceived barrier to growth can often be initially exaggerated or underestimated before being challenged by appropriate measures or courses of action. What may be considered by the public mind to be a barrier could in reality be very different from an actual barrier that needs to be challenged. One way of addressing barriers to growth is to define barriers according to their origin (internal/external) and nature (tangible/intangible). The framework encompasses barriers related to the firm (internal addressing in-house conditions) or to the industrial or national levels (external addressing environmental conditions). Tangible barriers can include asset shortages in the area of equipment or facilities, while human resources deficiencies or negative willingness towards growth are examples of intangible barriers. Our findings are consistent with previous research on barriers for BMI that has identified human factors barriers (individuals’ attitudes, histories, etc.); contextual barriers related to company and industry settings; and more abstract barriers (government regulations, value chain position, and weather). However, human factor barriers – and opportunities - related to family-owned businesses with idealistic values and attitudes and owning the real estate where the business is situated, are more frequent in the agri-food industry than other industries. This paper contributes by generating a classification of the barriers for BMI as well as illustrating them with empirical cases. We argue that internal barriers such as human factors barriers; values and attitudes are crucial to overcome in order to develop BMI. However, they can be as hard to overcome as for example institutional barriers such as governments’ regulations. Implications for research and practice are to focus on cognitive barriers and to develop the BMI capability of the owners and managers of agri-industry firms.

Keywords: agri-food, barriers, business model, innovation

Procedia PDF Downloads 202
8648 Suicide Intervention Experiences and Practices of School Counselors: Basis for Development of Practice Guidelines

Authors: Joel C. Navarez

Abstract:

The current study investigated the Filipino school counselor’s knowledge, attitudes, and competencies in suicide intervention as well as their experiences and practices in suicide intervention. The study also aimed to develop and standardize suicide intervention guidelines. The study has two (2) phases. Phase 1 utilized the descriptive and generic qualitative inquiry methods of research. Purposive and convenience sampling was applied, and participants were college counselors from the National Capital Region (NCR), Luzon, Visayas, and Mindanao. Results revealed that counselors do not have high level of knowledge on suicidal behaviors, have some negative attitudes toward suicidal behavior, and need to acquire better intervention skills. The findings also showed that the trainings received by counselors are not enough to advance their suicide intervention skills, which would help enhance positive attitudes towards suicide risk assessment and management. Some common experiences of the counselors in suicide intervention were focused on the areas of accountability, stigmatizing attitudes of parents, and confidentiality issues. Phase 2 of the study was the development of suicide intervention practice guidelines using the Delphi process. The tentative guideline was based on the content analysis of interventions taken from literature and from the actual intervention practices of counselors, as seen from the findings of the qualitative study of Phase 1. After three (3) Delphi rounds and the consensus from sixteen (16) mental health experts, 145 recommended actions can be implemented by school counselors in suicide.

Keywords: counselor competencies, counselor development, suicide, suicide intervention

Procedia PDF Downloads 140
8647 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 416
8646 Effective Factors on Farmers' Attitude toward Multifunctional Agriculture

Authors: Mohammad Sadegh Allahyari, Sorush Marzban

Abstract:

The main aim of this study was to investigate the factors affecting farmers' attitude of the Shanderman District in Masal (Guilan Province in the north of Iran), towards the concepts of multifunctional agriculture. The statistical population consisted of all 4908 in Shanderman.The sample of the present study consisted of 209 subjects who were selected from the total population using the Bartlett et al. Table. Questionnaire as the main tool of data collection was divided in two parts. The first part of questionnaire consisted of farmers' profiles regarding individual, technical-agronomic, economic and social characteristics. The second part included items to identify the farmers’ attitudes regarding different aspects of multifunctional agriculture. The validity of the questionnaire was assessed by professors and experts. Cronbach's alpha was used to determine the reliability (α= 0.844), which is considered an acceptable reliability value. Overall, the average scores of attitudes towards multifunctional agriculture show a positive tendency towards multifunctional agriculture, considering farmers' attitudes of the Shanderman district (SD = 0.53, M = 3.81). Results also highlight a significant difference between farmers' income source levels (F = 0.049) and agricultural literature review (F = 0.022) toward farmers' attitudes considering multifunctional agriculture (p < 0.05). Pearson correlations also indicated that there is a positive relationship between positive attitudes and family size (r = 0.154), farmers' experience (r = 0.246), size of land under cultivation (r = 0.186), income (r = 0.227), and social contribution activities (r = 0.224). The results of multiple regression analyses showed that the variation in the dependent variable depended on the farmers' experience in agricultural activities and their social contribution activities. This means that the variables included in the regression analysis are estimated to explain 12 percent of the variation in the dependent variable.

Keywords: multifunctional agriculture, attitude, effective factor, sustainable agriculture

Procedia PDF Downloads 215
8645 Public Transport Analysis and Introducing of Bus Rapid Transit (BRT) System in Kabul City

Authors: Ramin Mirzada

Abstract:

This research investigates the valuation of public transport importance in decreasing congestion and in introduction of bus rapid transit in Kabul city. The main concern and main problem of the Kabul city public transport is traffic congestion. When buses and trams are stuck in traffic jams, it is clear that they fall behind from the schedule and this cause lots of problem for Kabul residence. In this research, the main attention has been given to improve current public transport in Kabul city which Public transport has large share almost 50% share among all mode. The main purpose of this research is to improve public transport system, to examine the demand and the supply of public transport in Kabul city, and to improve public transport system by introducing Bus rapid transit (BRT) system in Kabul city. The data which is used in this research is gathered by Transport Ministry, Kabul Municipality and Japan Cooperation Agency in Afghanistan (JICA). Urban transportation modeling system (UTMS) which is also known as traditional four-step modeling is used as the methodology of this research. The outcome of this research shows that by improving public transport which is local bus system mostly congestion problem of Kabul city become solve, and for those lanes which has the high demand and has more congestion, it is needed to introduce bus rapid transit system.

Keywords: transportation, planning, public transport, bus rapid transit, Kabul, Afghanistan

Procedia PDF Downloads 466
8644 The Burden and the Consequences of Waste Management in Nigeria: Geophysical Approach

Authors: Joseph Omeiza Alao

Abstract:

The wobbly state of waste management and the high level of environmental irresponsibility is a threat to environmental security, which invariably endangered public health, regional groundwater systems and atmospheric condition. The dumping of waste materials in water bodies and gutters and the frequent burning of waste materials heaped at dumpsites as well depict the highest level of environmental indiscipline. These unruly human factors have compelled this study to apply four different techniques for environmental impact assessment and the possible public health risks of poor waste management in Nigeria. The techniques include a geophysical survey (resistivity data acquisition), dispatched questionnaire surveys, physiochemical water analysis and a physical survey of several dumpsites. While the resistivity data indicates high-level dumpsite leachate invading the ground soil down to the water table, the physiochemical water analysis depicts high content of BOD (401 – 711) mg/l, COD (731 – 1312) mg/l, TDS (419 – 1871) mg/l and heavy metals (0.014 – 1.971) mg/l present in the regional groundwater systems, which have altered the chemistry of the regional groundwater. The resistivity data shows that the overburdened soil layer overlaying the regional groundwater systems was very low (4.5 Ωm – 151 Ωm) as against the existing data (180 Ωm – 3500 Ωm). However, the physical surveys and the dispatched questionnaire surveys explore the depth of environmental irresponsibility among the citizen. While the imprints of gross environmental indiscipline may be absolutely irreversible, adequate knowledge of the environmental implications of careless waste disposal. After a critical examination of the current waste management strategies in Nigeria, the study suggests a future direction for environmental security and sustainability. Several influential regional factors, such as geology, climatic conditions, and hydrology, were also discussed.

Keywords: groundwater, environmental indiscipline, waste management, water analysis, leachate plumes, public health

Procedia PDF Downloads 52
8643 The Legal Personality of The Security Council

Authors: Helyeh Doutaghi

Abstract:

The United Nations Security Council (UNSC) is one of the six principal organs of the United Nations. Under the Charter of the United Nations (UN Charter), the UNSC’s primary responsibility is maintaining international peace and security, which it does through establishing and adopting a Security Council resolution. United Nations resolutions are formal expressions of the opinion or will of United Nations organs. However, there have been times when powerful politicians (or governments with great political power) had the first say in situations where the UNSC should have had jurisdiction based on the principle of rule of law, which is the notion that people are governed by the law rather than by officials. This paper will assess the effectiveness of the UNSC by analyzing its actions during the Iran-Iraq war for it has been found that one of the major reasons for the prolongation of the war was a result of the one-sided positions taken by the UNSC and many nations. The UNSC’s success in achieving its primary goal during the war will be discussed, including an examination of the duties and structure of the UNSC by reviewing the articles in the UN Charter; this will include examples of the UNSC’s role in other international disputes as well.

Keywords: UN Security Council, Iran, Iraq, charter, international law

Procedia PDF Downloads 438
8642 Cross Boader Marriages in 3rd World Countries (Economical Perspective)

Authors: Shagufta Jahangir, Raisa Jahangir

Abstract:

According to researches the 3rd world youth crave to go to developed countries just merely to get sustainable economic situation. To accomplish their wish they use each and every thing like cross boarder marriages is one of them. The basic and main point of cross boarder marriages is financial sustainability neither cross boarder culture nor cross boarder religion or others. The consequences of this research are that 60% to 70% men of 3rd world do cross boarder marriages just for only economic firmness. Due to this thoughts these men flipside to their native areas with only economic firmness rather social attitudes, moral attitudes behaviors, norms, myths and religion.40% to 50 % men do cross boarder marriages to get firmness even they have families in their native areas.2nd family formation is the easy way to get their desired, according to their eyes. After satisfying their needs they back unaccompanied to their native areas even they leave their offspring. They give precedence to their inhabitant families. This study has been design to find out that economic perspective is the basic phenomena of cross boarder marriages in the 3rd world countries men.

Keywords: cross boarder marriages, moral attitudes, native areas, flipside, norms

Procedia PDF Downloads 292
8641 Microclimate Variations in Rio de Janeiro Related to Massive Public Transportation

Authors: Marco E. O. Jardim, Frederico A. M. Souza, Valeria M. Bastos, Myrian C. A. Costa, Nelson F. F. Ebecken

Abstract:

Urban public transportation in Rio de Janeiro is based on bus lines, powered by diesel, and four limited metro lines that support only some neighborhoods. This work presents an infrastructure built to better understand microclimate variations related to massive urban transportation in some specific areas of the city. The use of sensor nodes with small analytics capacity provides environmental information to population or public services. The analyses of data collected from a few small sensors positioned near some heavy traffic streets show the harmful impact due to poor bus route plan.

Keywords: big data, IoT, public transportation, public health system

Procedia PDF Downloads 230
8640 Assessment of ASEI-PDSI Method on Students’ Attitude and Achievement in Junior Secondary Schools Mathematics in FCT-Abuja

Authors: Amenaghawon Clement Osemwinyen

Abstract:

The Activity, Student-centred, Experiment, Improvisation - Plan, Do, See, Improve (ASEI-PDSI) method championed by the Strengthening Mathematics And Science Education (SMASE) - Nigeria Project is an attempt to improve the quality of mathematics, which has consistently declined over the years in both public primary and secondary schools across the country. The study thus assessed the ASEI-PDSI method on students’ attitudes and achievement in junior secondary schools (JSS) mathematics in FCT-Abuja. A survey research design was adopted, and 100 mathematics teachers using a stratified random sampling method were used for the study. The data were collected using structured questionnaires and analyzed using descriptive statistics. The findings showed that the ASEI-PDSI method had significantly improved the attitudes of students toward mathematics. The study also revealed that the ASEI-PDSI method significantly influenced junior secondary school (JSS) students’ mathematics achievement. Amongst the recommendations were that teachers should be encouraged to adopt the ASEI-PDSI method in teaching and learning mathematics in order to create a mathematically stimulating classroom environment which could advertently influence junior secondary school (JSS) students’ attitude and academic performance in mathematics. Also, regular in-service training programs should be organized by stakeholders (government and other interest groups) so as to improve the teaching strategies of teachers, mostly as they affect the ASEI-PDSI method.

Keywords: achievement, ASEI-PDSI method, attitude, mathematics, SMASE

Procedia PDF Downloads 86
8639 Empirical Evidence to Beliefs and Perceptions on Mental Health Disorder and Substance Abuse: The Role of a Social Worker

Authors: Helena Baffoe

Abstract:

The US has developed numerous programs over the past 50 years to enhance the lives of those who suffer from mental health illnesses and substance abuse, as well as the effectiveness of their treatments. Despite these advances over the past 50 years, there hasn't been a corresponding improvement in American public attitudes and beliefs about mental health disorders and substance abuse. Highly publicized acts of violence frequently elicit comments that blame the perpetrator's perceived mental health disorder since such people are thought to be substance abusers. Despite these strong public beliefs and perception about mental disorder and substance abuse, concreate empirical evidence that entail this perception is lacking, and evidence of their effectiveness has not been integrated. A rich data was collected from Substance Abuse and Mental Health Services Administration (SAMHSA) with a hypothesis that people who are diagnosed with a mental health disorder are likely to be diagnosed with substance abuse using logit regression analysis and Instrumental Variable. It was found that depressive, anxiety, and trauma/stressor mental disorders constitute the most common mental disorder in the United States, and the study could not find statistically significant evidence that being diagnosed with these leading mental health disorders in the United States does necessarily imply that such a patient is diagnosed with substances abuse. Thus, the public has a misconception of mental health and substance abuse issues, and social workers' responsibilities are outlined in order to assist ameliorate this attitude and perception.

Keywords: mental health disorder, substance abuse, role of a social worker, evidence based research

Procedia PDF Downloads 45
8638 Low-Emission Commuting with Micro Public Transport: Investigation of Travel Times and CO₂ Emissions

Authors: Marcel Ciesla, Victoria Oberascher, Sven Eder, Stefan Kirchweger, Wolfgang E. Baaske, Gerald Ostermayer

Abstract:

The omnipresent trend towards sustainable mobility is a major challenge, especially for commuters in rural areas. The use of micro public transport systems is expected to significantly reduce pollutant emissions, as several commuters travel the first mile together with a single pick-up bus instead of their own car. In this paper, different aspects of such a micro public transport system are analyzed. The main findings of the investigations should be how the travel times of commuters change and how many CO₂ emissions can be saved if some of the commuters use public transport instead of their own vehicle.

Keywords: micro public transport, green transportation, sustainable mobility, low-emission commuting

Procedia PDF Downloads 448
8637 Perception of Risks of the Telecommunication Towers in Malaysia: A Qualitative Inquiry

Authors: Y. Kamarulzaman, A. Madun, F. D. Yusop, N. Abdullah, N. K. Hoong

Abstract:

In 2011, the Malaysian Government has initiated a nationwide project called 1BestariNet which will adopt the using of technology in teaching and learning, resulting in the construction of telecommunication towers inside the public schools’ premise. Using qualitative approach, this study investigated public perception of risks associated with the project, particularly the telecommunication towers. Data collection involved observation and in-depth interviews with 22 individuals consist of a segment of public that was anxious about the risks of radio frequency electromagnetic field (RFEMF) which include two employees of telecommunication companies (telcos) and five employees of Government agencies. Observation of the location of the towers at 10 public schools, a public forum, and media reports provide valuable information in our analysis. The study finds that the main concern is related to the health risks. This study also shows that it is not easy for the Government to manage public perception mainly because it involves public trust. We find that risk perception is related with public trust, as well as the perceived benefits and level of knowledge. Efficient communication and continuous engagement with the local communities help to build and maintain public trust, reduce public fear and anxiety, hence mitigating the risk perception among the public.

Keywords: risk perception, risk communication, trust, telecommunication tower, radio frequency electromagnetic field (RFEMF)

Procedia PDF Downloads 301
8636 Adult Education for Transformation and Security Challenges in Nigeria

Authors: Asmau Zarma Gogaram

Abstract:

The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education.

Keywords: adult education, transformation and security challenges, Nigeria, education and human development

Procedia PDF Downloads 498
8635 Students’ Perceptions of the Use of Social Media in Higher Education in Saudi Arabia

Authors: Omar Alshehri, Vic Lally

Abstract:

This paper examined the attitudes of using social media tools to support learning at a university in Saudi Arabia. Moreover, it investigated the students’ current usage of these tools and examined the barriers they could face during the use of social media tools in the education process. Participants in this study were 42 university students. A web-based survey was used to collect data for this study. The results indicate that all of the students were familiar with social media and had used at least one type of social media for learning. It was found out that all students had very positive attitudes towards the use of social media and welcomed using these tools as a supplementary to the curriculum. However, the results indicated that the major barriers to using these tools in learning were distraction, opposing Islamic religious teachings, privacy issues, and cyberbullying. The study recommended that this study could be replicated at other Saudi universities to investigate factors and barriers that might affect Saudi students’ attitudes toward using social media to support learning.

Keywords: barriers to social media use, benefits of social media use, higher education, Saudi Arabia, social media

Procedia PDF Downloads 147
8634 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 253
8633 Social Inclusion in Higher Institutions: The Plights of Students with Disabilities in Kaduna Polytechnic, Nigeria

Authors: Mairo H. Ipadeola, Catherine James Atteng

Abstract:

The term social inclusion refers to a process by which those disadvantaged in society can have access to fully participate in education like others. Student with special needs are expected to learn along with their peers within the some educational institutions which provide adequate access for all. There for, the study sort to understand the typical ways in which students with disabilities (SWD) were denied from fully participating as students in Kaduna Polytechnic. In doing this, two (2) objectives and research questions were raised. Firstly, to explore the attitudes of others towards students with disabilities in the institutions and secondly, to ascertain the extent of social participation and physical accessibility for students with disabilities (SWD) while in the institutions. Based on the objectives the paper postulated the research questions: what are the attitudes of management, teachers, and students towards students with special need in Kaduna Polytechnic and to what extent did the students with disabilities experience social participation and physical accessibility within Kaduna Polytechnic school environment? The study area was Kaduna Polytechnic. The study engaged the interview for the data collected which were transcribed and analyzed by thematic coding. The findings were categorized under themes, sub-themes, and codes. The findings revealed that the perception, behavior, and association experiences of students with disabilities within Kaduna Polytechnic were not encouraging. Their experiences were characterized by negative attitudes, feelings of rejection, neglect, and bullying. Data generated on social participation indicated that 71% of the respondents believed that learning, school activities, recreations, and student politics between SWD and the other student were in the direction of low / very low. All the respondents, particularly students with blindness and physical challenges faced difficulty with environmental and physical access above all within the school environment, classroom, walkways and ramps, Also, directions were none existent in most departments with physical access to classrooms, toilets, cafeterias, and school shops absent or very low (71% and 29% of the respondents). The conclusion was that the physical barriers limited the possibilities of social participation of SWD.The paper made some recommendations such as mass public enlightenment on radio and television to change the perception of society about people with disability. Also, the federal, state, and local governments enact building acts for fresh builders and adopted measures and time frames for existing public buildings to be made accessible for people with disabilities. All stakeholders should ensure that the five (5) percent budget set aside by State Universal Basic Education Board (SUBEB) and/or Tertiary Education Trust Fund (TETFUND) for the provision of specialized equipment and facilities for the student with special needs should be used prudently spent and monitored by the board.cm.

Keywords: social inclusion, students with disability, social participation, environmental/physical access

Procedia PDF Downloads 37
8632 Between Legal Authority and Epistemic Competence: A Case Study of the Brazilian Supreme Court

Authors: Júlia Massadas

Abstract:

The objective of this paper is to analyze the role played by the institute of the public hearings in the Brazilian Supreme Court. The public hearings are regulated since 1999 by the Brazilian Laws nº 9.868, nº 9.882 and by the Intern Regiment of the Brazilian Supreme Court. According to this legislation, the public hearings are supposed to be called when a matter of circumstance of fact must be clarified, what can be done through the hearing of the testimonies of persons with expertise and authority in the theme related to the cause. This work aims to investigate what is the role played by the public hearings and by the experts in the Brazilian Supreme Court. The hypothesis of this research is that: (I) The public hearings in the Brazilian Supreme Court are used to uphold a rhetoric of a democratic legitimacy of the Court`s decisions; (II) The Legislative intentions have been distorted. To test this hypothesis, the adopted methodology involves an empirical study of the Brazilian jurisprudence. As a conclusion, it follows that the public hearings convened by the Brazilian Supreme Court do not correspond, in practice, to the role assigned to them by the Congress since they do not serve properly to epistemic interests. The public hearings not only do not legitimate democratically the decisions, but also, do not properly clarify technical issues.

Keywords: Brazilian Supreme Court, constitutional law, public hearings, epistemic competence, legal authority

Procedia PDF Downloads 384
8631 Enhancing Food Security through Cabbage Production by Local Fammers in Nkokobe Municipality

Authors: Sipumle Qapeshu, Bongiwe Mcata, Ajuruchukwu Obi

Abstract:

Subsistence farmers practice farming for survival while commercial farmers produce to feed themselves and larger society with the motive to achieve highest profit. These types of farmers are characterised by growing what they eat, live without making regular purchases in the markets. The main objective of subsistence/peasant farmers is to ensure food security at household level. Cabbage is a crop that has been identified to have vital food nutrient sources like Vitamin A, B and C, protein, calcium, iron and antioxidative compounds beneficial for preventing cancer. This paper, therefore, looks at the potential that cabbage production has in enhancing household food security and also the challenges encountered by these cabbage producers. Primary data was obtained from 50 respondents, and linear regression model was used to analyse the data used. Income was used as food security measure. The results showed that three variables were statistically significant and they are gender (10%), education (5%) and household size (5%). Meaning that these are variables that influenced cabbage production by these households, and it also affects their food security status since income is affected.

Keywords: subsistence farmers, food security, cabbage, farming

Procedia PDF Downloads 281
8630 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 96
8629 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 52
8628 The Effects of Semi-Public Spaces with Distinctive Functions on the Urban Space Quality

Authors: Melike Orhan

Abstract:

Along with impetuous physical change, configuration and increase in the density of cities, urban public spaces have started to become a transition area rather than spaces to inhabit. The insufficiency of public spaces, one of the most significant components of a city, where communal life is maintained and the decrease in the quality of urban spaces have led to an increase in the use of semi-public spaces as urban space. Semi-public spaces are those that ensure transition between private and public spaces and can be seen, observed, reached and used by urban-dwellers. Humans are in a constant relation to their surroundings and care for integration as part of their surroundings. Semi-public spaces providing balance for the individual between private spaces (structures) and urban-public spaces make this integration easier. Spaces with a semi-public characteristic serve for a particular neighboring unit and the user (i.e. common use areas in residential spaces and dwellings, common outdoor areas situated between office buildings, and etc.) These spaces, whose density of usage is increased with distinctive functions and activities, gain different attributions according to the characteristics of the urban space they are located in (commercial, residential, touristic, and etc.) and to the functions of the structures with which they are in relation. At the same time, they begin to serve other neighboring units along with an increase in public usage. As a result, the interaction between environment-space-structure-humans changes, which directly affects the urban space quality. The aim of this study is to determine how and depending on what characteristics the public usage density of semi-public spaces change and to put forth the effects of this change on the urban environment it is located in and to designate its role in terms of 'urban space quality'. In conclusion, within the scope of this study, semi-public spaces located in urban spaces with distinctive functions will be explored through examples, and the effects of these spaces with altered public usage and density on urban space and quality of life will be put forward. Accordingly, applicable criteria will be determined by means of semi-public spaces oriented at increasing and sustaining the quality of urban space.

Keywords: semi-public spaces, urban public spaces, urban space quality, public usage

Procedia PDF Downloads 219