Search results for: security experiences
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5238

Search results for: security experiences

4758 Work-Home Interference and Emotional Exhaustion: The Role of Psychological Detachment, Relaxation and Technology-Assisted Supplemental Work

Authors: Nidhi S. Bisht

Abstract:

The study examines the role of work-home interference, on enhancing emotional exhaustion in the branch officers of private MFIs in India. Additionally, the moderating role of recovery experiences and technology-assisted supplemental work (TASW) were studied. With the increasing expectations to perform job related tasks at home, technology-assisted supplemental work (TASW) was hypothesized to positively moderate the relationship between work-home interference and emotional exhaustion. Further, it was expected that recovery experiences-psychological detachment, relaxation will help to recover and unwind from work and negatively moderate the relationship between work-home interference and emotional exhaustion. Results of SEM-analyses largely offered support for the hypotheses. These findings increase our insight in the processes leading to increased emotional exhaustion and suggest that employees can protect themselves from emotional exhaustion by keeping a tab on technology-assisted supplemental work and facilitating recovery experiences.

Keywords: emotional exhaustion, India, microfinance institutions (MFIs), work-home interference

Procedia PDF Downloads 203
4757 Exploring Employee Experiences of Distributed Leadership in Consultancy SMEs

Authors: Mohamed Haffar, Ramdane Djebarni, Russell Evans

Abstract:

Despite a growth in literature on distributed leadership, the majority of studies are centred on large public organisations particularly within the health and education sectors. The purpose of this study is to fill the gap in the literature by exploring employee experiences of distributed leadership within two commercial consultancy SME businesses in the UK and USA. The aim of the study informed an exploratory method of research to gather qualitative data drawn from semi-structured interviews involving a sample of employees in each organisation. A series of broad, open questions were used to explore the employees’ experiences; evidence of distributed leadership; and extant barriers and practices in each organisation. Whilst some of our findings aligned with patterns and practices in the existing literature, it importantly discovered some emergent themes that have not previously been recognised in the previous studies. Our investigation identified that whilst distributed leadership was in evidence in both organisations, the interviewees’ experience reported that it was sporadic and inconsistent. Moreover, non-client focused projects were reported to be less important and distributed leadership was found to be inconsistent or non-existent.

Keywords: consultancy, distributed leadership, owner-manager, SME, entrepreneur

Procedia PDF Downloads 97
4756 Student Teachers' Experiences and Perceptions of a Curriculum Designed to Promote Social Justice

Authors: Emma Groenewald

Abstract:

In 1994, numerous policies of a democratic dispensation envisage social justice and the transformation of the South Africa society. The drive for transformation and social justice resulted in an increasing number of university students from diverse backgrounds, which in turn, lead to the establishment of Sol Plaatje University (SPU) in 2014. A re-curriculated B. Ed. programme at SPU aims to equip students with knowledge and skills to realise the aim of social justice and to enhance the transformation of the South African society. The aim of this study is to explore the experiences and perceptions of students at a diverse university campus on a curriculum that aims to promote social justice. Four education modules, with the assumption that it reflects social justice content, were selected. Four students, representative of different ethnic and language groupings found at the SPU, were chosen as participants. Data were generated by the participants through four reflective exercises on each of the modules, spread over a period of four years. The module aims, linked with the narratives of the participants' perceptions and experiences of each module, provided an overview of the enacted curriculum. A qualitative research design with an interpretivist approach informed by Vygotsky's theory of learning was used. The participants' experiences of the four modules were analysed, and their views were interpreted. The students' narratives shed light on the strengths and weaknesses of how the B.Ed. Curriculum works towards social justice and revealed student's perceptions of otherness. From the narratives it became apparent that module did promote a social justice orientation in prospective teachers trained at a university.

Keywords: student diversity, social justice, transformation, teacher education

Procedia PDF Downloads 120
4755 Validating the Home Experiences of Children that Negatively Impact Their Right to Education in South Africa: The Case of HIV/AIDS Orphans and Vulnerable Children (OVCs) Living in the Amatole District

Authors: Tatenda Manomano, Moreblessing Memory Ndonga

Abstract:

In South Africa and the world over, despite an array of commendable policies to protect the rights of children, the situation on the ground indicates that HIV/AIDS continues to pose increasing challenges on the children’s’ right to education due to the death of their parents. This study sought to validate the home experiences of children that negatively impact on their right to education in South Africa with a case of HIV/AIDS orphans and vulnerable children (OVCs) in Amatole District. The study utilized a qualitative research method in collecting the feelings, views and attitudes of these children to establish the children’s home experiences. An interview guide with semi-structured questions was used to steer the one-on-one in-depth interviews with children from Parkside Primary School, Langa-Liphumile High School and one anonymous school in East London, Eastern Cape Province. 5 learners were purposively selected from each school and subjected to a one-on-one interview with the researcher. The researcher purposively selected one teacher per school, 2 members each from 3 community based organizations (CBOs) who were also subjected to a one-on-one in-depth interview. The findings indicated these negative experiences of the OVCs in their homes such as; attendance to a school was poor; academic performance was low; enrollment in schools was very low and abuse of these children was high. These researchers recommend for psychosocial support for these children to be placed in the schools; integration of HIV/AIDS programmes to target especially the OVCs; social workers should ensure that they regularly do home visits to these OVCs to establish whether the home circumstances these children are still conducive for them. It is hoped that the findings from this paper will be an asset that other researchers, policy makers, the government and NGOs/CBOs will take into consideration for the benefit of OVCs.

Keywords: orphaned and vulnerable children (OVCs), HIV, AIDS, home experiences

Procedia PDF Downloads 343
4754 First-Generation College Students and Persistence: A Phenomenological Study of Students’ Experiences in Indonesian Higher Education

Authors: Taufik Mulyadin

Abstract:

The tuition reform for public colleges that the Indonesian government initiated and has implemented since 2013 resulted in the growing number of college students from low-income families, many of whose parents did not attend college. This study sought to examine the experiences of persistence for Indonesian first-generation college students in public universities utilizing social capital as a framework. It is a qualitative study with a phenomenological approach primarily to capture the essence of how Indonesian first-generation college students interpret, process, and experience their persistence during college years. Fifteen Indonesian young college graduates were involved as well as questionnaire and interview were employed for data collection in this study. It revealed certain themes from the experiences that first-generation college students attributed to their persistence: (a) family encouragement, (b) support from friends, (c) guidance from faculty and staff, (d) fund of knowledge they bring with them, (e) financial aid availability, and (f) self-motivation. By examining first-generation college students’ voices, Indonesian public universities can better support, engage, and retain this group of students who were historically struggled to persist in college and complete their degree.

Keywords: first-generation student, Indonesian higher education, persistence, public universities

Procedia PDF Downloads 244
4753 The Effect of Sustainable Land Management Technologies on Food Security of Farming Households in Kwara State, Nigeria

Authors: Shehu A. Salau, Robiu O. Aliu, Nofiu B. Nofiu

Abstract:

Nigeria is among countries of the world confronted with food insecurity problem. The agricultural production systems that produces food for the teaming population is not endurable. Attention is thus being given to alternative approaches of intensification such as the use of Sustainable Land Management (SLM) technologies. Thus, this study assessed the effect of SLM technologies on food security of farming households in Kwara State, Nigeria. A-three stage sampling technique was used to select a sample of 200 farming households for this study. Descriptive statistics, Shriar index, Likert scale, food security index and logistic regression were employed for the analysis. The result indicated that majority (41%) of the household heads were between the ages of 51 and 70 years with an average of 60.5 years. Food security index revealed that 35% and 65% of the households were food secure and food insecure respectively. The logistic regression showed that SLM technologies, estimated income, household size, gender and age of the household heads were the critical determinants of food security among farming households. The most effective coping strategies adopted by households geared towards lessening the effects of food insecurity are reduced quality of food consumed, employed off-farm jobs to raise household income and diversion of money budgeted for other uses to purchase foods. Governments should encourage the adoption and use of SLM technologies at all levels. Policies and strategies that reduce household size should be enthusiastically pursued to reduce food insecurity.

Keywords: agricultural practices, coping strategies, farming households, food security, SLM technologies, logistic regression

Procedia PDF Downloads 150
4752 Experiences Using Autoethnography as a Methodology for Research in Education

Authors: Sarah Amodeo

Abstract:

Drawing on the author’s research about the experiences of female immigrant students in academic Adult Education, in Montreal, Quebec, this paper deconstructs the benefits of autoethnography as a methodology for educators in Adult Education. Autoethnography is an advantageous methodology for teachers in Adult Education as it allows for deep engagement, allowing for educators to reflect on student experiences and their day-to-day realities, and in turn, allowing for professional development, improved andragogy, and changes to classroom practices. Autoethnography is a qualitative research methodology that cultivates strategies for improving adult learning. The paper begins by outlining the context that inspired autoethnography for the author’s work, highlighting the emergence of autoethnography as a method, while examining how it is evolving and drawing on foundational work that continues to inspire research. The basic autoethnographic methodologies that are explored in this paper include the use of memory work in episode formation, the use of personal photographs, and textual readings of artworks. Memory work allows for the researcher to use their professional experience and the lived/shared experiences of their students in their research, drawing on episodes from their past. Personal photographs and descriptions of artwork allow researchers to explore images of learning environments/realities in ways that compliment student experiences. Major findings of the text are examined through the analysis of categories of autoethnography. Specific categories include realism, impressionism, and conceptualism which aid in orientating the analysis and emergent themes that develop through self-study. Finally, the text presents a discussion surrounding the limitations of autoethnography, with attention to the trustworthiness and ethical issues. The paper concludes with a consideration of the implications of autoethnography for adult educators in juxtaposition with youth sector work.

Keywords: artwork, autoethnography, conceptualism, episode formation, impressionism, memory work, personal photographs, and realism, realism

Procedia PDF Downloads 162
4751 Urban Agriculture in a Scandinavian Context as a Tool for Climate Adaption and for Empowering Communities through Food Production

Authors: Signe Voltelen, Kristin Astrup Aas

Abstract:

In the Scandinavian cities, there is a raised focus on the potential of using urban agriculture in city development, both as a tool for handling challenges provoked by climate change and to develop new, and stronger social communities. During the last couple of years, Copenhagen has experienced an increase in extreme weather resulting in dramatical floods with huge humanitarian and economic consequences. As an approach for climate adaption and mitigation the government has made a strategy for changing a significant amount of the cities hard surfaces into green and absorbing surfaces. Including urban farms and gardens. In close collaboration with the municipality, it has been possible to implement citizen-run gardens under the different concepts climate adaption and food literacy. Like other European cities, Copenhagen has a historical tradition of small-scale farming for food security inside the city, and in the outskirts of the urban area. Lately, this tradition has gotten new relevance, and new initiatives are popping up. In addition to providing local food, the urban farm becomes a semi-public, semi-private room that invites to community and integration across ethnicity, social background, and age. The direct interaction in the process of farming creates a connection between the urban and the rural and are educational for people growing up and living their whole life in the dense city. In the paper, three local example models of urban agriculture are presented, and the experiences of their potential as tools for developing social and environmental sustainable cities is examined.

Keywords: city development, climate mitigation, community building, urban agriculture, urban- rural transition, food security

Procedia PDF Downloads 264
4750 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case

Authors: Azin Karami, Bahareh Heydari

Abstract:

There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.

Keywords: human rights, human security, national sovereignty, irregular immigrants

Procedia PDF Downloads 156
4749 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 108
4748 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture

Authors: Mirad Böhm, Diede De Kok

Abstract:

It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.

Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder

Procedia PDF Downloads 303
4747 Migrant Women English Instructors' Transformative Workplace Learning Experiences in Post-Secondary English Language Programs in Ontario, Canada

Authors: Justine Jun

Abstract:

This study aims to reveal migrant women English instructors' workplace learning experiences in Canadian post-secondary institutions in Ontario. Although many scholars have conducted research studies on internationally educated teachers and their professional and employment challenges, few studies have recorded migrant women English language instructors’ professional learning and support experiences in post-secondary English language programs in Canada. This study employs a qualitative research paradigm. Mezirow’s Transformative Learning Theory is an essential lens for the researcher to explain, analyze, and interpret the research data. It is a collaborative research project. The researcher and participants cooperatively create photographic or other artwork data responding to the research questions. Photovoice and arts-informed data collection methodology are the main methods. Research participants engage in the study as co-researchers and inquire about their own workplace learning experiences, actively utilizing their critical self-reflective and dialogic skills. Co-researchers individually select the forms of artwork they prefer to engage with to represent their transformative workplace learning experiences about the Canadian workplace cultures that they underwent while working with colleagues and administrators in the workplace. Once the co-researchers generate their cultural artifacts as research data, they collaboratively interpret their artworks with the researcher and other volunteer co-researchers. Co-researchers jointly investigate the themes emerging from the artworks. They also interpret the meanings of their own and others’ workplace learning experiences embedded in the artworks through interactive one-on-one or group interviews. The following are the research questions that the migrant women English instructor participants examine and answer: (1) What have they learned about their workplace culture and how do they explain their learning experiences?; (2) How transformative have their learning experiences been at work?; (3) How have their colleagues and administrators influenced their transformative learning?; (4) What kind of support have they received? What supports have been valuable to them and what changes would they like to see?; (5) What have their learning experiences transformed?; (6) What has this arts-informed research process transformed? The study findings implicate English language instructor support currently practiced in post-secondary English language programs in Ontario, Canada, especially for migrant women English instructors. This research is a doctoral empirical study in progress. This research has the urgency to address the research problem that few studies have investigated migrant English instructors’ professional learning and support issues in the workplace, precisely that of English instructors working with adult learners in Canada. While appropriate social and professional support for migrant English instructors is required throughout the country, the present workplace realities in Ontario's English language programs need to be heard soon. For that purpose, the conceptualization of this study is crucial. It makes the investigation of under-represented instructors’ under-researched social phenomena, workplace learning and support, viable and rigorous. This paper demonstrates the robust theorization of English instructors’ workplace experiences using Mezirow’s Transformative Learning Theory in the English language teacher education field.

Keywords: English teacher education, professional learning, transformative learning theory, workplace learning

Procedia PDF Downloads 109
4746 Trapped Versus Stepping Stones: Work Trajectories of Young Workers During the COVID-19 Pandemic

Authors: Goh Mingyuan Asher, Nurul Fadiah Johari, Neo Yu Wei, Kim Aryung, Ho Kong Chong, Irene Y. H. N. G.

Abstract:

The COVID-19 pandemic represents an externally induced force as they face a combination of reduced work, dismissal, and job change for young precarious workers. The paper drew insights from two interview waves of the in-work poverty study in Singapore which were conducted a year apart. By analysing respondents’ job histories before and at the start of the pandemic as well as their job experiences over the two waves of interviews, the study found the presence of what scholars describe as trap and stepping stone trajectories. Trap trajectories refer to how the nature of precarious employment leads respondents to be in dead-end jobs with no room for progression while stepping stone trajectories refer to how poor work provides opportunities for the accumulation of work experiences. We also look at how structure, agency and biographical factors affect job trajectories and discuss the impacts of COVID-19 on work experiences and the implications of the bifurcation of trajectory outcomes on poverty and inequality among the young working poor in Singapore.

Keywords: working poor, precarity, young workers, COVID-19, work trajectories

Procedia PDF Downloads 84
4745 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 361
4744 Exploring the Nexus of Gastronomic Tourism and Its Impact on Destination Image

Authors: Usha Dinakaran, Richa Ganguly

Abstract:

Gastronomic tourism has evolved into a prominent niche within the travel industry, with tourists increasingly seeking unique culinary experiences as a primary motivation for their journeys. This research explores the intricate relationship between gastronomic tourism and its profound influence on the overall image of travel destinations. It delves into the multifaceted aspects of culinary experiences, tourists' perceptions, and the preservation of cultural identity, all of which play pivotal roles in shaping a destination's image. The primary aim of this study is to comprehensively examine the interplay between gastronomy and tourism, specifically focusing on its impact on destination image. The research seeks to achieve the following objectives: (1) Investigate how tourists perceive and engage with gastronomic tourism experiences. (2) Understand the significance of food in shaping the tourism image. (3.) Explore the connection between gastronomy and the destination's cultural identity Quantify the relationship between tourists' engagement in co-creation activities related to gastronomic tourism and their overall satisfaction with the quality of their culinary experiences. To achieve these objectives, a mixed-method research approach will be employed, including surveys, interviews, and content analysis. Data will be collected from tourists visiting diverse destinations known for their culinary offerings. This research anticipates uncovering valuable insights into the nexus between gastronomic tourism and destination image. It is expected to shed light on how tourists' perceptions of culinary experiences impact their overall perception of a destination. Additionally, the study aims to identify factors influencing tourist satisfaction and how cultural identity is preserved and promoted through gastronomic tourism. The findings of this research hold practical implications for destination marketers and stakeholders. Understanding the symbiotic relationship between gastronomy and tourism can guide the development of more targeted marketing strategies. Furthermore, promoting co-creation activities can enhance tourists' culinary experiences and contribute to the positive image of destinations.This study contributes to the growing body of knowledge regarding gastronomic tourism by consolidating insights from various studies and offering a comprehensive perspective on its impact on destination image. It offers a platform for future research in this domain and underscores the importance of culinary experiences in contemporary travel. In conclusion, this research endeavors to illuminate the dynamic interplay between gastronomic tourism and destination image, providing valuable insights for both academia and industry stakeholders in the field of tourism and hospitality.

Keywords: gastronomy, tourism, destination image, culinary

Procedia PDF Downloads 61
4743 Sharing Tourism Experience through Social Media: Consumer's Behavioral Intention for Destination Choice

Authors: Mohammad Tipu Sultan, Farzana Sharmin, Ke Xue

Abstract:

Social media create a better opportunity for travelers to search for travel information, select destination and share their personal experiences of the travel. This study proposes a framework which describes the relationships between social media, and positive or negative tourism experience sharing impact on destination choice. To find out new trends of travelers behavioral intention, we propose an extended theoretical model, the Theory of Reasoned Action (TRA). We conducted a survey to analyze three external factors, subjective norms, and positive and negative experience influence on travel destination choice. Structural questionnaire analysis was employed to confirm the proposed research hypothesis within the relationship between consumer influences on the shared experience of social media. The results of the study confirm that sharing positive experiences influence the positive effect of destination choice, while negative experiences decrease the destination selection option. The results indicate that attitudes, subjective norms are passively influenced by shared experience. Moreover, we find that sharing live pictures of travel experiences through social media helps to reduce negative perceptions of the destination brand. This research contribution is useable to the research field as a new determination factor and the findings could be used by destination organization management (DMO) to enhancing their tourism promotion through social media.

Keywords: destination choice, tourism experience sharing, Theory of Reasoned Action, TRA, social media

Procedia PDF Downloads 136
4742 Selected Childhood Experiences, Current Psychological Status and Its Associates among Imprisoned Women in Welikada Prison, Colombo Sri Lanka

Authors: Jayathilake Wijethunga B. G. Mudiyanselage, Jeewantha Ranawaka, Nirosha Lansakara

Abstract:

Introduction: Women imprisonment is rising in the world. Imprisoned women have more psychological problems and more adverse childhood experiences than the general population. Female prisoners who had psychological problems had more adverse childhood experiences than the prisoners who did not have psychological problems. Most of the imprisoned women are mothers. Mothers are the principal carer for the children. The psychological status of imprisoned female is worth seeking along with its associates since this is a group of women who need others assistance to make their life adjusted. Any intervention that could uplift their psychological wellbeing would make their life better if they are to be released out of the prison. Since there are no studies done in Sri Lanka to study the imprisoned women psychological wellbeing and their childhood experiences, it is important to study on this to find the magnitude of the problem in Sri Lanka. Methodology: A descriptive cross-sectional study was done at the Welikada Prison, Colombo, among the imprisoned women. 273 imprisoned women were selected using simple random sampling technique. Using interviewer administered questionnaire 270 women were interviewed. Three women did not consent for the study. Frequencies of the selected socio demographic characteristics and selected childhood experiences calculated. GHQ 30 questionnaire was used to assess the psychological distress. Odds ratio was used to calculate the associations between the psychological distress and the selected socio demographic characteristics, selected childhood experiences. Results: Response rate was 98.9%. Mean age of the imprisoned women were 41.28years (SD ±11.86yrs) and Most of women were within the age group of 35-49 years (38.1%). Of them 68.5% were currently married and majority had at least one child. (86.3%). House hold member’s smoking (58.5%) and alcohol (40.4%) use was the commonest adverse childhood experience experienced by the imprisoned women. Nearly one fourth (22.6%) of the imprisoned women had attempted suicide during their life and more than half (55.7%) of them had attempted before the age of 18 years. Similarly of the 258 women who had been sexually active during their life, half (50.0%) of the women had exposed to sexual activities during first eighteen years of life and mean age at first sexual exposure was 19.2 (SD±4.86) years. Nearly three forth (73.7%) of imprisoned women were psychologically distressed in the study sample. Being a women of aged less than 25 years((OR=4.51, 95% CI=1.035-19.64)),previous history of suicidal attempts(OR=2.10,95%CI =1.00-4.41), not having enough foods to eat( OR=2.97, 1.009-8.75) and absence of someone to tell worries (OR=0.355, 95% CI =0.113-0.945) during childhood were significantly associate with psychological distress. Conclusion: Nearly three forth of the imprisoned women were psychologically distressed and younger age, history of suicidal attempts, the absence of someone to tell their worries and not having enough food to eat during childhood were risk factors for psychological distress. Recommendation: Need to strengthen the rehabilitation and mental health services to the imprisoned women.

Keywords: adverse childhood experiences, imprisoned women, psychological distress, prisoners

Procedia PDF Downloads 250
4741 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 375
4740 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 385
4739 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 315
4738 Competences for Learning beyond the Academic Context

Authors: Cristina Galván-Fernández

Abstract:

Students differentiate the different contexts of their lives as well as employment, hobbies or studies. In higher education is needed to transfer the experiential knowledge to theory and viceversa. However, is difficult to achieve than students use their personal experiences and social readings for get the learning evidences. In an experience with 178 education students from Chile and Spain we have used an e-portfolio system and a methodology for 4 years with the aims of help them to: 1) self-regulate their learning process and 2) use social networks and professional experiences for make the learning evidences. These two objectives have been controlled by interviews to the same students in different moments and two questionnaires. The results of this study show that students recognize the ownership of their learning and progress in planning and reflection of their own learning.

Keywords: competences, e-portfolio, higher education, self-regulation

Procedia PDF Downloads 274
4737 Applications of Multi-Path Futures Analyses for Homeland Security Assessments

Authors: John Hardy

Abstract:

A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.

Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning

Procedia PDF Downloads 121
4736 Challenges in Creating Social Capital: A Perspective of Muslim Female Managers in Malaysia

Authors: Zubeida Rossenkhan, Pervaiz K. Ahmed, Wee Chan Au

Abstract:

In view of cross cultural career experiences, to the author’s best knowledge, the crucial role of culture and religious traditions in Asia remains understudied. Drawing on the notion of social capital as an invaluable resource needed for manager’s to progress, the purpose of this study is to probe the contextual experiences of Muslim women to elucidate unique challenges associated with social capital and career progress. Twenty-three in-depth interviews with top level Malay managers were conducted to probe experiences of upward career mobility and inequities in the workplace. Interpretive phenomenology was used to surface unique challenges and processes of creating and leveraging social capital. The study uncovers the unique challenges of Muslim women in Malaysia. Narratives of participants highlight not only generic forms of gender discrimination, but also culturally specific stereotypes and social expectations limiting their advancement. Interestingly, the findings identify a gender-religion handicap in the form of perceived inequality and restrictions rooted from the women manager’s gender and religion. The analysis also reveals how these Muslim women managers’ negotiate their challenges, especially how they access social capital and progress their careers. The research offers a unique perspective on the career experiences of Malay women managers’ in top management. The research provides insight into the unique processes of developing social capital utilized by this group of women for career success.

Keywords: career success, gender discrimination, malaysia, Muslim women, social capital

Procedia PDF Downloads 108
4735 Academic and Sociocultural Adaptation Experiences of International Students Studying in Kazakhstan

Authors: Tatyana Kim

Abstract:

This paper seeks to explore the academic and sociocultural adaptation experiences of international students studying in Kazakhstan. Using multiple case study design, the research will be undertaken at two private Kazakhstani universities having a relatively large and diverse body of international students. Thus, 20 full-time undergraduate international students from the sampled universities will be interviewed to identify factors that impede or, vice versa, facilitate their academic and sociocultural adaptation in Kazakhstan, as well as to reveal how universities support these students in the process of their adaptation. To investigate the issue more deeply, it was decided to explore the university administrators’ viewpoint of the issue. Thus, six university administrators who are in charge of recruiting and supporting international students and, thus, are particularly knowledgeable about their experiences, have been recruited for this study. Identification of both students’ and administrators’ perspectives on the matter may help reveal miscommunication, if any, and gain greater insight into the phenomenon. The data will be collected between November 5, 2019, and December 10, 2019. Preliminary findings will be presented at the conference. Lysgaard’s U-curve adjustment theory (1955) will be employed as a guiding framework to discuss and interpret the findings.

Keywords: academic adaptation, adaptation, higher education, international students, sociocultural adaptation

Procedia PDF Downloads 207
4734 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 59
4733 The Utility and the Consequences of Counter Terrorism Financing

Authors: Fatemah Alzubairi

Abstract:

Terrorism financing is a theme that dramatically evolved post-9/11. Supra-national bodies, above all UN Security Council and the Financial Action Task Form (FATF), have established an executive-like mechanism, which allows blacklisting individuals and groups, freezing their funds, and restricting their travel, all of which have become part of states’ anti-terrorism frameworks. A number of problems arise from building counter-terrorism measures on the foundation of a vague definition of terrorism. This paper examines the utility and consequences of counter-terrorism financing with considering the lack of an international definition of terrorism. The main problem with national and international anti-terrorism legislation is the lack of a clear objective definition of terrorism. Most, if not all, national laws are broad and vague. Determining what terrorism remains the crucial underpinning of any successful discussion of counter-terrorism, and of the future success of counter-terrorist measures. This paper focuses on the legal and political consequences of equalizing the treatment of violent terrorist crimes, such as bombing, with non-violent terrorism-related crimes, such as funding terrorist groups. While both sorts of acts requires criminalization, treating them equally risks wrongfully or unfairly condemning innocent people who have associated with “terrorists” but are not involved in terrorist activities. This paper examines whether global obligations to counter terrorism financing focus on controlling terrorist groups more than terrorist activities. It also examines the utility of the obligations adopted by the UN Security Council and FATF, and whether they serve global security; or whether the utility is largely restricted to Western security, with little attention paid to the unique needs and demands of other regions.

Keywords: counter-terrorism, definition of terrorism, FATF, security, terrorism financing, UN Security Council

Procedia PDF Downloads 308
4732 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm

Authors: Fairouz Beggas

Abstract:

Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.

Keywords: arabic data, encryption, playfair, symmetric algorithm

Procedia PDF Downloads 69
4731 The Miseducation of Color: Examining Racialized Experiences of Students of Color at Predominantly White Institutions (PWIs)

Authors: Sonia Darshini Singh

Abstract:

Recently, the Supreme Court and the federal government made affirmative action illegal. Colleges and universities are no longer allowed to consider race in admissions policies. Colleges and universities had the opportunity to increase racial diversity through affirmative action. Instead, a recent educational outlook has emerged where this race-conscious affirmative action is banned, and elitism is prioritized, thus altering the collegiate experience of students of color. While the statute restricts the consideration of race as a facet in admissions, this prohibition should not allow for the gravity of race and structural racism in the lives of marginalized students to diminish, nor should it limit further efforts to establish equitable access and outcomes for students of color. Not much is known about the racialized experiences of students of color who attend predominantly white institutions in the post-affirmative action era. The purpose of this ethnographic study will be to understand the racialized experiences of students who attend predominantly white institutions (PWI) in New York. This also aims to examine the potential data triangulation between what students wrote about to get into college and their actual racialized experience.

Keywords: higher education, predominantly white institution, equity, accessibility, affirmative action

Procedia PDF Downloads 22
4730 An Integrative Review on the Experiences of Integration of Quality Assurance Systems in Universities

Authors: Laura Mion

Abstract:

Concepts of quality assurance and management are now part of the organizational culture of the Universities. Quality Assurance (QA) systems are, in large part, provided for by national regulatory dictates or supranational indications (such as, for example, at European level are, the ESG Guidelines "European Standard Guidelines"), but their specific definition, in terms of guiding principles, requirements and methodologies, are often delegated to the national evaluation agencies or to the autonomy of individual universities. For this reason, the experiences of implementation of QA systems in different countries and in different universities is an interesting source of information to understand how quality in universities is understood, pursued and verified. The literature often deals with the treatment of the experiences of implementation of QA systems in the individual areas in which the University's activity is carried out - teaching, research, third mission - but only rarely considers quality systems with a systemic and integrated approach, which allows to correlate subjects, actions, and performance in a virtuous circuit of continuous improvement. In particular, it is interesting to understand how to relate the results and uses of the QA in the triple distinction of university activities, identifying how one can cause the performance of the other as a function of an integrated whole and not as an exploit of specific activities or processes conceived in an abstractly atomistic way. The aim of the research is, therefore, to investigate which experiences of "integrated" QA systems are present on the international scene: starting from the experience of European countries that have long shared the Bologna Process for the creation of a European space for Higher Education (EHEA), but also considering experiences from emerging countries that use QA processes to develop their higher education systems to keep them up to date with international levels. The concept of "integration", in this research, is understood in a double meaning: i) between the different areas of activity, in particular between the didactic and research areas, and possibly with the so-called "third mission" "ii) the functional integration between those involved in quality assessment and management and the governance of the University. The paper will present the results of a systematic review conducted according with a method of an integrative review aimed at identifying best practices of quality assurance systems, in individual countries or individual universities, with a high level of integration. The analysis of the material thus obtained has made it possible to grasp common and transversal elements of QA system integration practices or particularly interesting elements and strengths of these experiences that can, therefore, be considered as winning aspects in a QA practice. The paper will present the method of analysis carried out, and the characteristics of the experiences identified, of which the structural elements will be highlighted (level of integration, areas considered, organizational levels included, etc.) and the elements for which these experiences can be considered as best practices.

Keywords: quality assurance, university, integration, country

Procedia PDF Downloads 68
4729 Contingency Screening Using Risk Factor Considering Transmission Line Outage

Authors: M. Marsadek, A. Mohamed

Abstract:

Power system security analysis is the most time demanding process due to large number of possible contingencies that need to be analyzed.  In a power system, any contingency resulting in security violation such as line overload or low voltage may occur for a number of reasons at any time.  To efficiently rank a contingency, both probability and the extent of security violation must be considered so as not to underestimate the risk associated with the contingency. This paper proposed a contingency ranking method that take into account the probabilistic nature of power system and the severity of contingency by using a newly developed method based on risk factor.  The proposed technique is implemented on IEEE 24-bus system.

Keywords: line overload, low voltage, probability, risk factor, severity

Procedia PDF Downloads 526