Search results for: physical security
7989 Problems Arising in Visual Perception
Authors: K. A. Tharanga, K. H. H. Damayanthi
Abstract:
Perception is an epistemological concept discussed in Philosophy. Perception, in other word, vision, is one of the ways that human beings get empirical knowledge after five senses. However, we face innumerable problems when achieving knowledge from perception, and therefore the knowledge gained through perception is uncertain. what we see in the external world is not real. These are the major issues that we face when receiving knowledge through perception. Sometimes there is no physical existence of what we really see. In such cases, the perception is relative. The following frames will be taken into consideration when perception is analyzed illusions and delusions, the figure of a physical object, appearance and the reality of a physical object, time factor, and colour of a physical object.seeing and knowing become vary according to the above conceptual frames. We cannot come to a proper conclusion of what we see in the empirical world. Because the things that we see are not really there. Hence the scientific knowledge which is gained from observation is doubtful. All the factors discussed in science remain in the physical world. There is a leap from ones existence to the existence of a world outside his/her mind. Indeed, one can suppose that what he/she takes to be real is just anmassive deception. However, depending on the above facts, if someone begins to doubt about the whole world, it is unavoidable to become his/her view a scepticism or nihilism. This is a certain reality.Keywords: empirical, perception, sceptisism, nihilism
Procedia PDF Downloads 937988 Weapon Collection Initiatives and the Threat of Small Arms and Light Weapons Proliferation in Volatile Areas of North-Eastern Nigeria as a Way Forward for National Security and Development
Authors: Halilu Babaji, Adamu Buba
Abstract:
The proliferation of small arms and light weapons (SALW) and its illicit trafficking in West Africa and Nigeria in particular, pose a major threat to peace, security and development in the Sub-region. The high circulation of these weapons in the region is a product of the interplay of several factors, which derives principally from the internal socio-economic and political dynamics compounded by globalization. The process of globalization has congealed both time and space making it easier for ideas, goods, persons, services, information, products and money to move across borders with fewer restrictions. And this has a negative effect in the entire region making it easier for arms, ammunition, insurgents, criminal and drugs to flow within national boundaries. The failure of public security in most parts of Nigeria has lead communities to indulge in different forms of ‘self-help ‘security measures, ranging from vigilante groups to community-owned arms stockpiling. Having lost confidence in the Nigerian state, parties to some of these conflicts have become entangled in a security dilemma. The quest to procure more arms to guarantee personal and community protection from perceived and real enemies is fuelling the ‘domestic arms race ‘. Therefore, as small arms remain-and proliferate – development is impeded. The impact of SALW on economic well being and national development in Nigeria is of vast significant. Therefore the need to collect these arms in circulation in Nigeria particularly the volatile area of North-east is of very important. This will hopefully contribute to government effort in building a free, secured and peaceful society.Keywords: arms, development, proliferation, security
Procedia PDF Downloads 3257987 Importance of Hardware Systems and Circuits in Secure Software Development Life Cycle
Authors: Mir Shahriar Emami
Abstract:
Although it is fully impossible to ensure that a software system is quite secure, developing an acceptable secure software system in a convenient platform is not unreachable. In this paper, we attempt to analyze software development life cycle (SDLC) models from the hardware systems and circuits point of view. To date, the SDLC models pay merely attention to the software security from the software perspectives. In this paper, we present new features for SDLC stages to emphasize the role of systems and circuits in developing secure software system through the software development stages, the point that has not been considered previously in the SDLC models.Keywords: SDLC, SSDLC, software security, software process engineering, hardware systems and circuits security
Procedia PDF Downloads 2617986 Addressing Supply Chain Data Risk with Data Security Assurance
Authors: Anna Fowler
Abstract:
When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.Keywords: security by design, data security architecture, cybersecurity framework, data security assurance
Procedia PDF Downloads 887985 Cryptocurrency-Based Mobile Payments with Near-Field Communication-Enabled Devices
Authors: Marko Niinimaki
Abstract:
Cryptocurrencies are getting increasingly popular, but very few of them can be conveniently used in daily mobile phone purchases. To solve this problem, we demonstrate how to build a functional prototype of a mobile cryptocurrency-based e-commerce application the communicates with Near-Field Communication (NFC) tags. Using the system, users are able to purchase physical items with an NFC tag that contains an e-commerce URL. The payment is done simply by touching the tag with a mobile device and accepting the payment. Our method is constructive: we describe the design and technologies used in the implementation and evaluate the security and performance of the solution. Our main finding is that the analysis and measurements show that our solution is feasible for e-commerce.Keywords: cryptocurrency, e-commerce, NFC, mobile devices
Procedia PDF Downloads 1847984 The Role of Physical Education and Fitness for Active Ageing
Authors: A. Lakshya
Abstract:
The main aim of this paper is to interpret physical education for children from 5 to 18 years. Schools have the ability to promote positive mental health by developing physical education, which helps to build individual growth, goal setting, decision making, helps in muscular development, self-discipline, stresses relief, leadership qualities that can arise with new skills, prosocial behavior and problem-solving skills. But mostly the children at these early ages ought to hold the disorders as heart attack, diabetes and obesity disorders may increase in large number. The data of P.E has got a very least place, where children are with feeble minds and they acquired a state of inactiveness. Globally, 81% of adolescents aged 11-18 years were insufficiently physically active in the year 2016. Adolescent girls were less active than boys, with the percentage of 85% vs. 78% as well. A recent study of California schools found that students are sedentary most of the time during PE classes, with just four minutes of every half-hour spent in vigorous physical activity. Additionally, active PE time decreases with larger class sizes. Students in classes with more than forty-five students are half as active as students in smaller class sizes. The children in adolescence age they acquire more creative ideas hence they create new hairstyles, cooking styles and dressing styles. Instead, all the children are engaging themselves to TV (television) and video games. The development of physical quality not only improves students ’ physical fitness but is also conducive to the psychological development of the students. Physical education teaching should pay more attention to the training of physical quality in the future.Keywords: physical education, prosocial behavior, leadership, goal setting
Procedia PDF Downloads 1377983 Effect of the Food Distribution on Household Food Security Status in Iran
Authors: Delaram Ghodsi, Nasrin Omidvar, Hassan Eini-Zinab, Arash Rashidian, Hossein Raghfar
Abstract:
Food supplementary programs are policy approaches that aim to reduce financial barriers to healthy diets and tackle food insecurity. This study aimed to evaluate the effect of the supportive section of Multidisciplinary Supplementary Program for Improvement of Nutritional Status of Children (MuPINSC) on households’ food security status and nutritional status of mothers. MuPINSC is a national integrative program in Iran that distributes supplementary food basket to malnourished or growth retarded children living in low-income families in addition to providing health services, including sanitation, growth monitoring, and empowerment of families. This longitudinal study is part of a comprehensive evaluation of the program. The study participants included 359 mothers of children aged 6 to 72 month under coverage of the supportive section of the program in two provinces of Iran (Semnan and Qazvin). Demographic and economic characteristics of families were assessed by a questionnaire. Data on food security of family was collected by locally adapted Household Food Insecurity Access Scale (HFIAS) at the baseline of the study and six month thereafter. Weight and height of mothers were measured at the baseline and end of the study and mother’s BMI was calculated. Data were analysed, using paired t-test, GEE (Generalized Estimating Equation), and Chi-square tests. Based on the findings, at the baseline, only 4.7% of families were food-secure, while 13.1%, 38.7% and, 43.5% were categorized as mild, moderate and severe food insecure. After six months follow up, the distribution of different levels of food security changed significantly (P<0.001) to 7.9%, 11.6%, 42.6%, and 38%, respectively. At the end of the study, the chance of food insecurity was significantly 20% lower than the beginning (OR=0.796; 0.653-0.971). No significant difference was observed in maternal BMI based on food security (P>0.05). The findings show that the food supplementary program for children improved household food security status in the studied households. Further research is needed to assess other factors that affect the effectiveness of this large scale program on nutritional status and household’s food security.Keywords: food security, food supplementary program, household, malnourished children
Procedia PDF Downloads 4017982 Impact of HIV/AIDS on Food Security in Pala Sub-Location, Bondo District, Kenya
Authors: S. B. Otieno, Were Fred, E. W. Kabiru, K. Waza
Abstract:
Background: HIV/AIDS is leading to the loss of labor through sickness and subsequent death, this is leading to the neglect of farm and off-farm activities, with the subsequent loss of potential income and food security. The situation is sensitive to seasonal labour peaks in agriculture. This study was done to determine the impact of high HIV prevalence in farming systems and food security in Pala Bondo District, Kenya. Methods: In this study, 386 respondents were randomly chosen in Pala Sub-Location. The respondents and key informants were interviewed using structured questionnaire. The data were entered and analyzed using SPSS version 16. Results: It was established that majority of respondents (67%) were between 18 and 35 years {χ2 = (1, N = 386) = 13.430, p = 0.000} (chimney effect). The study also established that 83.5% of respondents were married {χ2 = (1, N= 370) = 166.277 p = 0.000} and predominant occupation being farming and fishing (61%), while 52.8% of farm labour was by hand, 26% by oxen, and 4.9% mechanized. 73.2% of respondents only farm 0.25 to 2 acres, 48% mentioned lack of labour in land preparation {χ2 ((1,N = 321) = 113.146, p = 0.000), in planting {χ2 (1, N = 321) = 29.28, p = 0.000}. Majority of respondents lack food from January to June, during which 93% buy food. Conclusion: The high HIV prevalence in Pala has affected the farm labour leading to food insecurity.Keywords: food security, HIV, AIDS, labour
Procedia PDF Downloads 2697981 Protecting Right to Life and Combating Terrorism through the Instrument of Law in Nigeria
Authors: Oyekan Kolawole Jamiu
Abstract:
The right to life is a moral principle based on the belief that a human being has the right to life and, in particular, should not be unjustly killed by another human being. However, the most worrisome security challenge in Nigeria which has cut short the lives of innocent Nigerians is the activities of the dreaded terrorist group known as Boko Haram (which means Western Education is a sin). Between 2004 till date, over 15000 people have been gruesomely murdered by this terrorist group. However, despite the facts that suspected terrorists are arrested and paraded almost on a daily basis, cases of terrorism in our courts in Nigeria today have not been expeditiously dealt with by the judiciary. This paper examines the concept of right to life. The right to life is an inherent right for each and every person. From his or her birth; the individual is considered a living being that must be protected. The right to life connotes also right to live and grow in a healthy environment where there is appropriate health care, qualitative education and adequate security of lives and property. The paper also examines the fight against terrorism and the duty of the government to protect right to life of every individual even in the midst of the fight against terrorism. The paper further reviews the Terrorism Act 2011(as amended) and the clogs in the wheel of prosecution of suspected terrorists. The paper concludes that since terrorism is a new security challenge, to prevent conflict of interest, only one security agency should be trained and saddled with the responsibility of prosecuting suspected terrorist, Law should be enacted to compel intelligent gathering and sharing of information among security agencies and in addition, a special court should be established to deal expeditiously with cases of terrorism in Nigeria.Keywords: terrorism, intelligent gathering, right to life, prosecution
Procedia PDF Downloads 3497980 The Relation between Physical Health and Mental Health in Women of Reproductive Age
Authors: Hannah Yael Ephraim
Abstract:
During reproductive age (between 15 and 44), women are particularly susceptible to psychiatric illness. Depression and anxiety disorders are especially common for women during reproductive age. Women of reproductive age are also at greater risk for multiple physical conditions during this time. Existing literature focuses on the impact of mental health on physical health, showing that people with anxiety and depression repeatedly show greater physical health risk among those with developing chronic medical illness. However, there is limited research on the impact physical health has on mental health in women of reproductive age, a large and vulnerable population. For this reason, the current study seeks to ask the following questions: are women of reproductive age with a diagnosis of a chronic physical condition more likely to experience symptoms of mental illness than women without a diagnosis of a chronic physical condition? Does the type of physical illness relate to signs and symptoms of depression and anxiety? A quasi-experimental research design was implemented to compare the mental health outcomes of women with the diagnosis of chronic medical conditions and women without the diagnosis of a chronic medical condition. Quantitative data was collected through an anonymous ten-minute Qualtrics survey. The survey was sent out through multiple online platforms. The sample includes two groups of women: one group with the diagnosis of a chronic medical illness, and one group without a diagnosis and/or symptoms (N = 541). Participants identify as a woman and are between the ages of 15 and 44. A comparison of women with a diagnosis of a chronic physical condition and those without a diagnosis will be conducted to explore differences in depression and anxiety symptoms between women with and without a chronic medical diagnosis. The impact race, SES, and occupation will also be addressed in relation to anxiety and/or depression in women of reproductive age. This study will further the understanding of the relationship between mental illness in women of reproductive age with chronic medical conditions. The results of this study will have implications for the integration of mental health care in women’s health centers and perhaps training of clinicians and physicians providing psychological and medical care to women of reproductive age.Keywords: mental health, physical health, reproductive age, women
Procedia PDF Downloads 3157979 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria
Authors: Anyaogu Paul
Abstract:
The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.Keywords: child labour, family income, national security, survey research
Procedia PDF Downloads 4247978 Prevalence of Life Style Diseases and Physical Activities among Older in India
Authors: Vaishali Chaurasia
Abstract:
Ageing is the universal phenomenon that is associated with deteriorating health status. As the human becomes old, certain changes take place in an organism leading to morbidities, disabilities, and event death. Furthermore, older people are more vulnerable for the various kinds of diseases and health problem. Due to the some unhealthy conventions like smoking, drinking and unhealthy foods is the genesis of the lifestyle diseases. These diseases associated with the way a person or group of people lives. The main purpose of the study is to determine the prevalence of lifestyle diseases and its association with physical activity as well as the risk factors associated with it among the adult population in India. Longitudinal Aging Study in India and Study on Global Aging and Adult Health in India were used in the study. We will take population aged 50 and older, began in 1935, and regularly refreshed at younger ages with new birth cohorts. Life style diseases are more prominent in 65+ age group. The study finds an association between prevalence of life style diseases and life style risk factors. The lifestyle disease prevalence is more among higher age group people, female, richest quintile, and doing lesser physical activity. A higher prevalence of lifestyle diseases associated with the multiple risk factors. The occurrence of three and four risk factors was more prevalent in India. The frequency of different type of life style disease is higher among those who hardly or never do any physical activity as compare to those who do physical activity every day. The pattern remains the same in Moderate as well as vigorous physical activity. Those who are regularly doing physical activities have lesser percentage of having any disease and those who hardly ever or never do any physical activities and equally involve with some risk factors have higher percentage of having all type of diseases.Keywords: lifestyle disease, morbidity, disability, physical activity
Procedia PDF Downloads 3457977 Effect of Physical and Breathing Exercises on Quality of Life and Psychophysical Status among Haemodialysis Patients: A Scoping Review
Authors: Noof Eid Al Shammari
Abstract:
Background: Living with haemodialysis (HD) can impose several physical and social restrictions on the lives of individuals. Usually, the patient has three dialysis sessions per week that each run for three to four hours. This limits the social life of patients and causes a lower quality of life, in conjunction with the fact that people with chronic kidney disease must follow strict fluid and food regimens and use multiple medications. Given these factors, patients undergoing HD generally need psychological support. Objective: This scoping review study aims to evaluate the effectiveness of physical and breathing exercises on quality of life (QOL) and psychophysical status in patients undergoing HD. Methodology: Searches for relevant studies were performed in four databases (MEDLINE, CINAHL, Google Scholar, and PubMed) for articles published between 2011 and 2021. Out of all the searched literature, ten studies met the inclusion criteria (8 randomised controlled trials, one quasi-experimental study, and one pilot study), with a total of 588 patients. Different types of physical and breathing exercises were used (breathing, cardiopulmonary, and physical exercises). Results: All included studies in this scoping review revealed that most of the aerobic or anaerobic exercises, as well as breathing exercises, had a positive effect and significantly improved patients’ QOL, physical functioning, and psychological status. Conclusions: In this review, most of the articles demonstrated a positive effect of physical and breathing exercises on the QOL and psychophysical status of HD patients. Based on the findings of these studies, physical and breathing exercises were shown to improve muscle strength and other health-related aspects of QOL, including sexual, social, cognitive, and physical functions. However, more studies will need to be conducted with a larger sample to determine the best intervention that could be implemented and standardised in nursing care for patients undergoing HD.Keywords: physical exercise, breathing exercises, quality of life, depression, hemodialysis
Procedia PDF Downloads 1097976 Client Hacked Server
Authors: Bagul Abhijeet
Abstract:
Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Procedia PDF Downloads 2517975 Secure Optical Communication System Using Quantum Cryptography
Authors: Ehab AbdulRazzaq Hussein
Abstract:
Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).
Procedia PDF Downloads 4057974 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study
Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly
Abstract:
In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions
Procedia PDF Downloads 827973 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment
Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan
Abstract:
In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.Keywords: border security, sensors, abnormal activity detection, ontologies
Procedia PDF Downloads 4817972 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors
Authors: M. S. Razana, Z. W. Shafiuddin
Abstract:
Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification
Procedia PDF Downloads 2357971 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women
Authors: Abeer Al Kalbani
Abstract:
Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.Keywords: food security, household food security, utilization, role of women
Procedia PDF Downloads 4057970 Teachers Influence on Encouraging Physical Activity and Recreation in Township Schools in the City of Tshwane
Authors: Rapuane Eric Jan Pule
Abstract:
Sport participation plays a significant role in learners’ well-being and lifestyle. Learners spend most of their time in the school environment, where they are monitored, guided and advised by teachers. Teachers have a good relationship with the learners, therefore they can play a major role in promoting and influencing learners to participate in physical activities, both competitive and recreational purposes. Their influence and involvement could assist in increasing the number learners' involvement in physical activities, sport and recreation at Township schools. The national sport and recreation plan in South Africa, recommends that promotion of sport and physical activities at primary and secondary schools should play an important role in helping learners commit to a live-long participation in sport, recreational and physical activities. Schoolteachers could play an influential role in ensuring that learners spent their leisure time productively through physical and recreational activities. However, the role and the influence of teachers in promoting physical and recreational activities have been previously overlooked in the literature. Part of this study focuses on the in-depth challenges encountered by primary and secondary school teachers at Township schools in promoting and influencing learners’ involvement in sport, recreation and physical activities. 109 primary and secondary teachers at Township schools agreed to participate in the study through the provision of informed consent. The participants consisted of 49 primary school teachers and 60 secondary school teachers. Quantitative approach was followed using validated structured questionnaire comprising 12 close-ended items were used. Findings indicated that teachers' can play a significant role in influencing and encouraging learners to participate in sport, recreation or physical activities. Teachers view physical activity as an important developmental component for learners. Primary school teachers believe that they have a significant role to play in encouraging and promoting physical activities, sport and recreation, as compared to the secondary school teachers. Both group of teachers at primary and secondary schools, believe that infrastructure development, financial support, and extra incentives could motivate them to promote physical, recreational and sporting activities at schools. Teachers also acknowledge that schools are facing challenges in implementing and coordinating physical activities and recreational programmes as required by the Department of sport and recreation South Africa. It is recommended that the Department of Basic Education and Sport and Recreation South Africa revise their policies regarding the role of teachers in promoting and administering physical and recreational activities at schools.Keywords: township, physical activities, sport and recreation participation, learners, teachers, primary and secondary schools, physical education
Procedia PDF Downloads 3537969 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 967968 Factors Affecting Physical Activity among University Students of Different Fields of Study
Authors: Robert Dutkiewicz, Monika Szpringer, Mariola Wojciechowska
Abstract:
Physical activity is one of the factors greatly influencing healthy lifestyle. The recent research into physical activity of the Polish society reveals that contribution of physical culture to healthy lifestyle is insufficient. Students, regardless of age, spend most of free-time in front of a TV or computer. The research attempted to identify the level of physical activity and healthy lifestyle among students of medical sciences and other students doing their teaching degrees. The findings of physical activity research conducted in 2014, which covered 364 students of medical sciences and future teachers from the University of Jan Kochanowski in Kielce were analysed. The research involved the method of diagnostic survey based on a questionnaire. It attempted to establish to what extent such factors as the field of studies, the place of residence and BMI affect students’ physical activity. Empirical material was analysed by means of SPSS/PC, the leading statistical software. The field of study significantly influences physical activity of the respondents. The students of physiotherapy and public health tend to be more physically active than students of biology and geography: 46.8% students of geography and 51.8 % biology students seldom take up physical activity. Obesity and overweight are currently serious problems of university students: 6.6% of them are obese and 19% overweight. It is alarming that these students are not willing to find ways to be more physically active. Most of the obese and overweight respondents study biology or geography and live in a rural area. Unequal chances in terms of youth physical culture are determined by the differences between rural and urban environments. Young people living in rural areas are less physically active, particularly in terms of the frequency and the amount of time devoted to physical activity. This is caused by poor infrastructure to perform physical activity, the lack of or limited number of sports clubs and centres. It is thought-provoking that most of the students claim that they do not have enough time to do sports or other activities, but at the same time they spend a lot of time at a computer or watching TV.Keywords: BMI, healthy lifestyle, sports activity, students
Procedia PDF Downloads 4997967 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 4557966 Experimental Study on the Effectiveness of Functional Training for Female College Students' Physical Fitness and Sport Skills
Authors: Yangming Zhu, Mingming Guo, Xiaozan Wang
Abstract:
Introduction: The purpose of this study is to integrate functional training into physical education to test the effectiveness of functional training in improving the physical fitness (PF) and sport skills (SS) of female college students. Methods: A total of 54 female college students from East China Normal University were selected for this study (27 in the experimental group and 27 in the control group), and 13 weeks of the experimental intervention was conducted during the semester. During the experimental period, the experimental group was functionally trained for 1 hour per week. The control group performed one-hour weekly sports (such as basketball, football, etc.) as usual. Before and after the experiment, the national students' physical fitness test was used to test the PF of the experimental group and the control group, and the SS of the experimental group and the control group were tested before and after the intervention. Then using SPSS and Excel to organize and analyze the data. Results: The independent sample T-test showed that there was no significant difference in the PF and SS between the experimental group and the control group before the experiment (T PF=71.86, p PF> 0.05, Tₛₛ=82.41,pₛₛ > 0.05); After the experiment, the PF of the experimental group was significantly higher than that of the control group (T Improve=71.86, p Improve < 0.05); after the experiment, the SS of the experimental group was significantly higher than that of the control group (Tₛₛ = 1.31, pₛₛ <0.01) Conclusions: Integrating functional training into physical education can improve the PF of female college students. At the same time, the integration of functional training into physical education can also effectively improve the SS of female college students. Therefore, it is suggested that functional training be integrated into the daily physical education of female college students so as to improve their PF and SS.Keywords: functional training, physical fitness, sport skills, female college students
Procedia PDF Downloads 1317965 Sustainable Food Systems and the Importance of Food Safety in Ensuring Sustainability
Authors: Özlem Turan, Şule Turhan
Abstract:
About 1 billion people in the world are suffering from hunger. Approximately 1.3 billion tons of produced food is wasted each year as well. While the waste of industrialized countries is 670 million tons per year, the waste per year in developing countries is estimated as 630 million tons. When evaluated in this respect, the importance of sustainability and food security can be seen clearly. Food safety is defined as taking the necessary measures and eliminating all risk arising from food. The goal of sustainable food security is, protection of consumer health, development of safe food and beverages trade nationally and internationally and to ensure reliable fair trade schemes. In this study, this study will focus on sustainable food systems and food security, by examining the food wastage and losses from environmental and economic point of views and the precautions that need to be taken will be discussed.Keywords: food, food safety, food systems, sustainability
Procedia PDF Downloads 3867964 The Relationship between Physical Fitness and Academic Performance among University Students
Authors: Bahar Ayberk
Abstract:
The study was conducted to determine the relationship between physical fitness and academic performance among university students. A far-famed saying ‘Sound mind in a sound body’ referring to the potential quality of increased physical fitness in the intellectual development of individuals seems to be endorsed. There is a growing body of literature the impact of physical fitness on academic achievement, especially in elementary and middle-school aged children. Even though there are numerous positive effects related to being physically active and physical fitness, their effect on academic achievement is not very much clear for university students. The subjects for this study included 25 students (20 female and 5 male) enrolled in Yeditepe University, Physiotherapy and Rehabilitation Department of Health Science Faculty. All participants filled in a questionnaire about their socio-demographic status, general health status, and physical activity status. Health-related physical fitness testing, included several core components: 1) body composition evaluation (body mass index, waist-to-hip ratio), 2) cardiovascular endurance evaluation (queen’s college step test), 3) muscle strength and endurance evaluation (sit-up test, push-up test), 4) flexibility evaluation (sit and reach test). Academic performance evaluation was based on student’s Cumulative Grade Point Average (CGPA). The prevalence of the subjects participating physical activity was found to be 40% (n = 10). CGPA scores were significantly higher among students having regular physical activity when we compared the students having regular physical activities or not (respectively 2,71 ± 0.46, 3.02 ± 0.28 scores, p = 0.076). The result of the study also revealed that there is positive correlation relationship between sit-up, push up and academic performance points (CGPA) (r = 0.43, p ≤ 0.05 ) and negative correlation relationship between cardiovascular endurance parameter (Queen's College Step Test) and academic performance points (CGPA) (r = -0.47, p ≤ 0.05). In conclusion, the findings confirmed that physical fitness level was generally associated with academic performance in the study group. Cardiovascular endurance and muscle strength and endurance were associated with student’s CGPA, whereas body composition and flexibility were unrelated to CGPA.Keywords: academic performance, health-related physical fitness, physical activity, physical fitness testing
Procedia PDF Downloads 1647963 The Impact of Vocal and Physical Attractiveness on the Employment Interview
Authors: Alexandra Roy
Abstract:
This research examines how physical and vocal attractiveness affect impressions of an applicant and whether these impressions are affected by gender or job type. Findings, based on two samples, indicate that individuals with less attractiveness voice and physical appearance were viewed as less suitable job applicants and as possessing more negative characteristics than those others. These negative impressions were pervasive and unaffected by either applicant gender or job type. Specifically, we found that job candidates with an attractive voice or physique were perceived as more extroverted, less agreeable, less conscientious, less trustworthy less competent, less sociable and less recruitable. Results are robust to various sensitivity checks.Keywords: discrimination, nonverbal, hiring, attractiveness
Procedia PDF Downloads 2247962 Money Laundering and Financing of Terrorism
Authors: Covadonga Mallada Fernández
Abstract:
Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.Keywords: control of financial flows, money laundering, terrorism, financing of terrorism
Procedia PDF Downloads 4547961 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things
Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala
Abstract:
In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.Keywords: embedded computing, internet of things, mobile computing, wireless technologies
Procedia PDF Downloads 3167960 Challenges of Domestic Water Security for Sustainable Development in North Central Belt of Nigeria
Authors: Samuel Ibbi Ibrahim, Isaiah Ndalassan Ibrahim
Abstract:
Accessibility and availability of good quality water have become a major concern among different users. This paper examines the caustic importance of water security in relation to people’s desire for survival. It observed the democratic ideology of national policy on domestic water supply and demand and its implementation for national and societal development. It used analogy on equilibrium approach to ascertain the household water security. In most communities, it is glaring that several public water management in operation for several years are hardly performing efficiently to reach equilibrium demand. Moreover most settlements being rural or urban lack effective public water system that could ensure regular supplies to the population. The terrain and gradual declining of efficient rainfall northward poses great challenge to the region in managing water supply and demand adequately. This study itemized the need for the government to get clear strategy for a sustainable development on better water efficiency. Partnership in providing workable policy on water security is considered apparently important. It is also suggested that water plant treatment should be established in every medium-sized towns in the country.Keywords: good quality of water, water accessibility, water availability, water sustainable
Procedia PDF Downloads 527