Search results for: security program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6281

Search results for: security program

5801 Health Promotion Program on Prevention of Zoonotic Diseases among Aborigines in Peninsular Malaysia

Authors: Siti Fatimah Kader Maideen, Abdul Rashid, Nur Indah Ahmad

Abstract:

Introduction: Indigenous people have an increased risk of contracting zoonotic infections due to their practices. Similarly, the aborigines in Peninsular Malaysia, the Orang Asli, have a higher risk too. This study aimed to empower the Jahai children on the prevention of zoonotic infections by implementing a health promotion intervention program. Methods: A non-experimental pre and post-test interventional study was conducted among the indigenous primary school children aged between nine and 12 years in Perak, Malaysia. A structured questionnaire was used to assess the pre-and post-knowledge and attitudes towards zoonotic infections and hand hygiene practice. This is followed by three sessions of the health promotion program. Ethical approval was obtained prior to the data collection. Data were analysed using SPSS software. Results: The knowledge on whether diseases can spread from animals to humans, transmission via saliva and faeces, types of organisms that can infect, and signs and symptoms increased significantly between pre and post. Significant improvements were observed in the attitude and practices too. Conclusion: The intervention program demonstrated improvement in the knowledge, attitude, and practice among the children. The continuous program needs to be conducted for a sustainable outcome.

Keywords: health promotion, zoonotic infections, aborigines, knowledge, practice

Procedia PDF Downloads 140
5800 Feasibility Study for the Implementation of a Condition-Based Maintenance System in the UH-60 Helicopters

Authors: Santos Cabrera, Halbert Yesid, Moncada Nino, Alvaro Fernando, Rincon Cuta, Yeisson Alexis

Abstract:

The present work evaluates the feasibility of implementing a health and use monitoring system (HUMS), based on vibration analysis as a condition-based maintenance program for the UH60L 'Blackhawk' helicopters. The mixed approach used consists of contributions from national and international experts, the analysis of data extracted from the software (Meridium), the correlation of variables derived from the diagnosis of availability, the development, and application of the HUMS system, the evaluation of the latter through of the use of instruments designed for the collection of information using the DELPHI method and data capture with the device installed in the helicopter studied. The results obtained in the investigation reflect the context of maintenance in aerial operations, a reduction of operation and maintenance costs of over 2%, better use of human resources, improvement in availability (5%), and fulfillment of the aircraft’s security standards, enabling the implementation of the monitoring system (HUMS) in the condition-based maintenance program. New elements are added to the study of maintenance based on condition -specifically, in the determination of viability based on qualitative and quantitative data according to the methodology. The use of condition-based maintenance will allow organizations to adjust and reconfigure their strategic, logistical, and maintenance capabilities, aligning them with their strategic objectives of responding quickly and adequately to changes in the environment and operational requirements.

Keywords: air transportation sustainability, HUMS, maintenance based condition, maintenance blackhawk capability

Procedia PDF Downloads 128
5799 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 124
5798 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 331
5797 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 478
5796 Development of a Matlab® Program for the Bi-Dimensional Truss Analysis Using the Stiffness Matrix Method

Authors: Angel G. De Leon Hernandez

Abstract:

A structure is defined as a physical system or, in certain cases, an arrangement of connected elements, capable of bearing certain loads. The structures are presented in every part of the daily life, e.g., in the designing of buildings, vehicles and mechanisms. The main goal of a structure designer is to develop a secure, aesthetic and maintainable system, considering the constraint imposed to every case. With the advances in the technology during the last decades, the capabilities of solving engineering problems have increased enormously. Nowadays the computers, play a critical roll in the structural analysis, pitifully, for university students the vast majority of these software are inaccessible due to the high complexity and cost they represent, even when the software manufacturers offer student versions. This is exactly the reason why the idea of developing a more reachable and easy-to-use computing tool. This program is designed as a tool for the university students enrolled in courser related to the structures analysis and designs, as a complementary instrument to achieve a better understanding of this area and to avoid all the tedious calculations. Also, the program can be useful for graduated engineers in the field of structural design and analysis. A graphical user interphase is included in the program to make it even simpler to operate it and understand the information requested and the obtained results. In the present document are included the theoretical basics in which the program is based to solve the structural analysis, the logical path followed in order to develop the program, the theoretical results, a discussion about the results and the validation of those results.

Keywords: stiffness matrix method, structural analysis, Matlab® applications, programming

Procedia PDF Downloads 98
5795 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 311
5794 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 268
5793 Standards of Toxicity and Food Security in Brazil

Authors: Ana Luiza Da Gama E Souza

Abstract:

This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.

Keywords: standards, indicators, human rights, food security

Procedia PDF Downloads 311
5792 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 364
5791 TeleMe Speech Booster: Web-Based Speech Therapy and Training Program for Children with Articulation Disorders

Authors: C. Treerattanaphan, P. Boonpramuk, P. Singla

Abstract:

Frequent, continuous speech training has proven to be a necessary part of a successful speech therapy process, but constraints of traveling time and employment dispensation become key obstacles especially for individuals living in remote areas or for dependent children who have working parents. In order to ameliorate speech difficulties with ample guidance from speech therapists, a website has been developed that supports speech therapy and training for people with articulation disorders in the standard Thai language. This web-based program has the ability to record speech training exercises for each speech trainee. The records will be stored in a database for the speech therapist to investigate, evaluate, compare and keep track of all trainees’ progress in detail. Speech trainees can request live discussions via video conference call when needed. Communication through this web-based program facilitates and reduces training time in comparison to walk-in training or appointments. This type of training also allows people with articulation disorders to practice speech lessons whenever or wherever is convenient for them, which can lead to a more regular training processes.

Keywords: web-based remote training program, Thai speech therapy, articulation disorders, speech booster

Procedia PDF Downloads 352
5790 Evaluating a Holistic Fitness Program Used by High Performance Athletes and Mass Participants

Authors: Peter Smolianov, Jed Smith, Lisa Chen, Steven Dion, Christopher Schoen, Jaclyn Norberg

Abstract:

This study evaluated the effectiveness of an experimental training program used to improve performance and health of competitive athletes and recreational sport participants. This holistic program integrated and advanced Eastern and Western methods of prolonging elite sports participation and enjoying lifelong fitness, particularly from China, India, Russia, and the United States. The program included outdoor, gym, and water training approaches focused on strengthening while stretching/decompressing and on full body activation-all in order to improve performance as well as treat and prevent common disorders and pains. The study observed and surveyed over 100 users of the program including recreational fitness and sports enthusiasts as well as elite athletes who competed for national teams of different countries and for Division I teams of National Collegiate Athletic Association in the United States. Different types of sport were studied, including territorial games (e.g., American football, basketball, volleyball), endurance/cyclical (athletics/track and field, swimming), and artistic (e.g., gymnastics and synchronized swimming). Results of the study showed positive effects on the participants’ performance and health, particularly for those who used the program for more than two years and especially in reducing spinal disorders and in enabling to perform new training tasks which previously caused back pain.

Keywords: lifelong fitness, injury prevention, prolonging sport participation, improving performance and health

Procedia PDF Downloads 136
5789 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 317
5788 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 102
5787 A Folk’s Theory of the MomConnect (mHealth) Initiative in South Africa

Authors: Eveline Muika Kabongo, Peter Delobelle, Ferdinand Mukumbang, Edward Nicol

Abstract:

Introduction: Studies have been conducted to establish the effect of the MomConnect program in South Africa, but these studies did not focus on the stakeholders' and implementers' perspectives and the underlying program theory of the MomConnect initiative program. We strived to obtain stakeholders’ perspectives and assumptions on the MomConnect program and develop an initial program theory (IPT) of how the MomConnect initiative was expected to work. Methods: A realist-informed explanatory design used. The interviewer was performed with 10 key informants selected purposively among MomConnect key informants at the a national level of NDoH South Africa. The interview was done via zoom and lasted for 30 to 60 minutes. Introduction and abduction inferencing approaches were applied. The deductive and inductive approaches were performed during the analysis. ICAMO hereustic framework was used to analysed the data in order to get key informants expectations on how the MomConnect will work or not. Results: We developed three folk’s theories illustrating how the key informants’ expected the MomConnect to work. These theories showed that the MomConnect intended to provide users with health information and education that will empower and motivate them with knowledge which will allow the improvement of health services delivery among HCPs and improvement of the uptake of MCH services among pregnant women and mothers and decrease the rate of maternal and child mortality in the country. The lack of an updated mechanism to link women to the outcome was an issue. Another problem enlightened was the introduction of the WhatsApp program instead of SMS messaging, which was free of charge to women. Conclusion: The Folk’s theory developed from this study provided an insight into how the MomConnect was expected to work and what did not work. The folk’s theory will be merged with information from candidate theories on synthesis review and document review to develop our initial program theory of the MomConnect initiative.

Keywords: mHealth, MomConnect program, realist evaluation, maternal and child health, maternal and child health services, introduction, theory-driven

Procedia PDF Downloads 158
5786 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 663
5785 Rehabilitation Approach for Cancer Patients: Indication, Management and Outcome

Authors: Juliani Rianto, Emma Lumby, Tracey Smith

Abstract:

Cancer patients’ survival are growing with the new approach and therapy in oncology medicine. Cancer is now a new chronic disease, and rehabilitation program has become an ongoing program as part of cancer care. The focus of Cancer rehabilitation is maximising person’s physical and emotional function, stabilising general health and reducing unnecessary hospital admission. In Australia there are 150000 newly diagnosed cancer every year, and the most common Cancer are prostate, Breast, Colorectal, Melanoma and Lung Cancer. Through referral from the oncology team, we recruited cancer patient into our cancer rehabilitation program. Patients are assessed by our multi-disciplinary team including rehabilitation specialist, physiotherapist, occupational therapist, dietician, exercise physiologist, and psychologist. Specific issues are identified, including pain, side effect of chemo and radiation therapy and mental well-being. The goals were identified and reassessed every fortnight. Common goals including nutritional status, improve endurance and exercise performance, working on balance and mobility, improving emotional and vocational state, educational program for insomnia and tiredness, and reducing hospitalisation are identified and assessed. Patients are given 2 hours exercise program twice a week for 6 weeks with focus on aerobic and weight exercises and education sessions. Patients are generally benefited from the program. The quality of life is improved, support and interaction from the therapist has played an important factor in directing patient for their goals.

Keywords: cancer, exercises, benefit, mental health

Procedia PDF Downloads 38
5784 The Effects of a Circuit Training Program on Muscle Strength, Agility, Anaerobic Performance and Cardiovascular Endurance

Authors: Wirat Sonchan, Pratoom Moungmee, Anek Sootmongkol

Abstract:

This study aimed to examine the effects of a circuit training program on muscle strength, agility, anaerobic performance and cardiovascular endurance. The study involved 24 freshmen (age 18.87+0.68 yr.) male students of the Faculty of Sport Science, Burapha University. They sample study were randomly divided into two groups: Circuit Training group (CT; n=12) and a Control group (C; n=12). Baseline data on height, weight, muscle strength (hand grip dynamometer and leg strength dynamometer), agility (agility T-Test), and anaerobic performance (Running-based Anaerobic Sprint Test) and cardiovascular endurance (20 m Endurance Shuttle Run Test) were collected. The circuit training program included one circuit of eight stations of 30/60 seconds of work/rest interval with two cycles in Week 1-4, and 60/90 seconds of work/rest interval with three cycles in Week 5-8, performed three times per week. Data were analyzed using paired t-tests and independent sample t-test. Statistically significance level was set at 0.05. The results show that after 8 weeks of a training program, muscle strength, agility, anaerobic capacity and cardiovascular endurance increased significantly in the CT Group (p < 0.05), while significant increase was not observed in the C Group (p < 0.05). The results of this study suggest that the circuit training program improved muscle strength, agility, anaerobic capacity and cardiovascular endurance of the study subjects. This program may be used as a guideline for selecting a set of exercise to improve physical fitness.

Keywords: circuit training, physical fitness, cardiovascular endurance, anaerobic performance

Procedia PDF Downloads 475
5783 Developing Artistic Concepts for Kindergarten Children in Egypt Using Graphic Activities

Authors: Mona Yacoub, Ahmed Amin Mousa

Abstract:

The current work presents a program for children in Egypt. This program involved a collection of artistic activities that purposes to improve some language, artistic skills of kindergarten children. The researchers have prepared a questionnaire for the link between the target group and the content. The questionnaire has been presented to experts for adjudicating. The program was applied to a group of 30 children. Another questionnaire has been prepared by the researchers for measuring the activities’ effect on the children. The second questionnaire was considered as the pre-test and post-test. Finally, after applying the activities and the questionnaire, the researchers detected a significant difference in favor of the post-test results.

Keywords: Developing, concepts, kindergarten, children, graphic activities

Procedia PDF Downloads 131
5782 Status of Hospitality and Tourism Management Progam of Selected Private Higher Education Institutions: Basis for Internationalization

Authors: Ruth Estrada Javier - Reyes

Abstract:

The study assessed the status of HTM program of selected private higher education institutions for internationalization across the eleven regions of the country. The descriptive survey method of research was used in this study. A devised survey questionnaire was utilized to gather information about the status of Philippine Higher Education Institutions’ internationalization of hospitality and tourism management education programs. The respondents were 12 administrators, 17 deans and program heads, 104 faculty members and 860 HTM students. Frequency, percentage, mean, standard deviation, t-test and F-test were used to treat the data. The results of the study are as follows: HEIs’ HTM education had complied with the policies/standards of CHED as per CMO No. 30 S. 2006. The respondents of the HTM education program were qualified for internationalization as assessed both by administrators and faculty. The private HEIs are ready to apply for international certification of their HTM education programs. The curriculum of HTM education programs in private HEIs are enriched by internationalization requirements. The administrators and faculty of HTM education programs are qualified educators but have limited participation in collaborative international research and linkages. The HEIs are qualified to apply for the internationalization of the Hospitality and Tourism Management education program in preparation to the ASEAN 2015.

Keywords: status, Hospitality and Tourism Management Program, internationalization, Private Higher Education Institutions

Procedia PDF Downloads 391
5781 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 65
5780 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 440
5779 The Effects of an Intervention Program on Psychosocial Factors and Consequences during the COVID-19 Pandemic in a Chilean Technology Services Company: A Quasi-Experimental Study

Authors: Julio Lavarello-Salinas, Verónica Kramm-Vergara, Pedro Gil-La Orden

Abstract:

During the COVID-19 pandemic, mental health became a relevant factor in people’s performance within organizations. The aim of this study was to analyze the effects of an organizational intervention program on the psychosocial factors of demands, resources, and the consequences of psychosocial risks in a technology services company during the COVID-19 pandemic. A quasi-experimental study was carried out with 105 employees who took part in an eight-week intervention program divided into two large stages. Pre- and post- measurements were collected using the UNIPSICO Questionnaire, considering its factors of demands, resources, and consequences of psychosocial risks. The Spanish Burnout Inventory (SBI) was also included. The results showed significant improvements in the perception of some psychosocial demand factors, all the resource factors, and all the consequences of psychosocial risks, except the guilt dimension of the SBI. Thus, we can conclude that the program was effective and that the study limitations should be improved in future studies.

Keywords: UNIPSICO questionnaire, occupational health, work stress, work psychosocial risk

Procedia PDF Downloads 78
5778 Exercise program’s Effectiveness on Hepatic Fat Mobilization among Nonalcoholic Fatty Liver Patients

Authors: Taher Eid Shaaban Ahmed Mousa

Abstract:

Non-Alcoholic fatty liver disease (NAFLD) is a major cause of multiple liver disorders, which strongly linked to a poor lifestyle. This study aiming to elucidate the exercise program’s effectiveness on hepatic fat mobilization among nonalcoholic fatty liver patients. Subjects: A purposive sample of 150 adult male & female patients. Setting: National institute of liver out patient's clinics of Menoufia University. Tools: three tools I: An interviewing structured questionnaire, II: International Physical Activity Questionnaire, III: compliance assessment sheet. Results: There was statistically significant difference pre and post exercise program regarding total body weight, physical activity level and compliance that prevent new fat development with resolution of existing one. Conclusion: regular exercise is the best implemented approach as an initial step for the prevention, treatment and management of NAFLD. Recommendation: It is highly important to unravel the mechanism and dose by which each exercise specifically resolve various stages of liver diseases.

Keywords: exercise program, hebatic fat mobilization, nonalcoholic fatty liver patients, sport science

Procedia PDF Downloads 51
5777 Implications on the Training Program for Clinical Psychologists in South Korea

Authors: Chorom Baek, Sungwon Choi

Abstract:

The purpose of this study is to analyze the supervision system, and the training and continuing education of mental health professionals in USA, UK, Australia (New Zealand), Japan, and so on, and to deduce the implications of Korean mental health service system. In order to accomplish the purpose of this study, following methodologies were adopted: review on the related literatures, statistical data, the related manuals, online materials, and previous studies concerning issues in those countries for the past five years. The training program in Korea was compared with the others’ through this literature analysis. The induced matters were divided with some parts such as training program, continuing education, educational procedure, and curriculum. Based on the analysis, discussion and implications, the conclusion and further suggestion of this study are as follows: First, Korean Clinical Psychology of Association (KCPA) should become more powerful health main training agency for quality control. Second, actual authority of health main training agency should be a grant to training centers. Third, quality control of mental health professionals should be through standardization and systemization of promotion and qualification management. Fourth, education and training about work of supervisors and unification of criteria for supervision should be held. Fifth, the training program for mental health license should be offered by graduate schools. Sixth, legitimated system to protect the right of mental health trainees is needed. Seventh, regularly continuing education after licensed should be compulsory to keep the certification. Eighth, the training program in training centers should meet KCPA requirement. If not, KCPA can cancel the certification of the centers.

Keywords: clinical psychology, Korea, mental health system, training program

Procedia PDF Downloads 207
5776 Developing a Health Promotion Program to Prevent and Solve Problem of the Frailty Elderly in the Community

Authors: Kunthida Kulprateepunya, Napat Boontiam, Bunthita Phuasa, Chatsuda Kankayant, Bantoeng Polsawat, Sumran Poontong

Abstract:

Frailty is the thin line between good health and illness. The syndrome is more common in the elderly who transition from strong to weak. (Vulnerability). Fragility can prevent and promote healthy recovery before it goes into disability. This research and development aim to analyze the situation analysis of frailty of the elderly, develop a program, and evaluate the effect of a health promotion program to prevent and solve the problem of frailty among the elderly. The research consisted of 3 phases: 1) analysis of the frailty situation, 2) development of a model, 3) evaluation of the effectiveness of the model. Samples were 328, 122 elderlies using the multi-stage random sampling method. The research instrument was a frailty questionnaire use of the five symptoms, the main characteristics were muscle weakness, slow walking, low physical activity. Fatigue and unintentional weight loss, criteria frailty use more than or equal to three or more symptoms are frailty. Data were analyzed by descriptive and t-test dependent test statistics. The findings showed three parts. First, frailty in the elderly was 23.05 percentage and 56.70% pre-frailty. Second, it was development of a health promotion program to prevent and solve the problem of frailty the elderly with a combination of Nine-Square Exercise, Elastic Band Exercise, Elastic Coconut Shell. Third, evaluation of the effectiveness of the model by comparison of the elderly's get up and go test, the average time before using the program was 14.42 and after using the program was 8.57. It was statistically significant at the .05 level. In conclusion, the findings can used to develop guidelines to promote the health of the frailty elderly.

Keywords: elderly, fragile, nine-square exercise, elastic coconut shell

Procedia PDF Downloads 80
5775 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 495
5774 Learning Academic Skills through Movement: A Case Study in Evaluation

Authors: Y. Salfati, D. Sharef Bussel, J. Zamir

Abstract:

In this paper, we present an Evaluation Case Study implementing the eight principles of Collaborative Approaches to Evaluation (CAE) as designed by Brad Cousins in the past decade. The focus of this paper is sharing a rich experience in which we achieved two main goals. The first was the development of a valuable and meaningful new teacher training program, and the second was a successful implementation of the CAE principles. The innovative teacher training program is based on the idea of including physical movement during the process of teaching and learning academic themes. The program is called Learning through Movement. This program is a response to a call from the Ministry of Education, claiming that today children sit in front of screens and do not exercise any physical activity. In order to contribute to children’s health, physical, and cognitive development, the Ministry of Education promotes learning through physical activities. Research supports the idea that sports and physical exercise improve academic achievements. The Learning through Movement program is operated by Kaye Academic College. Students in the Elementary School Training Program, together with students in the Physical Education Training Program, implement the program in collaboration with two mentors from the College. The program combines academic learning with physical activity. The evaluation began at the beginning of the program. During the evaluation process, data was collected by means of qualitative tools, including interviews with mentors, observations during the students’ collaborative planning, class observations at school and focus groups with students, as well as the collection of documentation related to the teamwork and to the program itself. The data was analyzed using content analysis and triangulation. The preliminary results show outcomes relating to the Teacher Training Programs, the student teachers, the pupils in class, the role of Physical Education teachers, and the evaluation. The Teacher Training Programs developed a collaborative approach to lesson planning. The students' teachers demonstrated a change in their basic attitudes towards the idea of integrating physical activities during the lessons. The pupils indicated higher motivation through full participation in classes. These three outcomes are indicators of the success of the program. An additional significant outcome of the program relates to the status and role of the physical education teachers, changing their role from marginal to central in the school. Concerning evaluation, a deep sense of trust and confidence was achieved, between the evaluator and the whole team. The paper includes the perspectives and challenges of the heads and mentors of the two programs as well as the evaluator’s conclusions. The evaluation unveils challenges in conducting a CAE evaluation in such a complex setting.

Keywords: collaborative evaluation, training teachers, learning through movement

Procedia PDF Downloads 122
5773 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 99
5772 Influence of Javascript Programming on the Developement of Web and Mobile Application

Authors: Abdul Basit Kiani

Abstract:

Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.

Keywords: java script, react, nodejs, htmlcsss

Procedia PDF Downloads 78