Search results for: school security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5910

Search results for: school security

5370 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments

Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka

Abstract:

Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.

Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance

Procedia PDF Downloads 48
5369 Are Oral Health Conditions Associated with Children’s School Performance and School Attendance in the Kingdom of Bahrain - A Life Course Approach

Authors: Seham A. S. Mohamed, Sarah R. Baker, Christopher Deery, Mario V. Vettore

Abstract:

Background: The link between oral health conditions and school performance and attendance remain unclear among Middle Eastern children. The association has been studied extensively in the Western region; however, several concerns have been raised regarding the reliability and validity of measures, low quality of studies, inadequate inclusion of potential confounders, and the lack of a conceptual framework. These limitations have meant that, to date, there has been no detailed understanding of the association or of the key social, clinical, behavioural and parental factors which may impact the association. Aim: To examine the association between oral health conditions and children’s school performance and attendance at Grade 2 in Muharraq city in the Kingdom of Bahrain using Heilmann et al.’s (2015) life course framework for oral health. Objectives: To (1) describe the prevalence of oral health conditions among 7-8 years old schoolchildren in the city of Muharraq; (2) analyse the social, biological, behavioural, and parental pathways that link early and current life exposures with children’s current oral health status; (3) examine the association between oral health conditions and school performance and attendance among schoolchildren; (4) explore the early and current life course social, biological, behavioural and parental factors associated with children’s school outcomes. Design: A time-ordered-cross-sectional study was conducted with 466 schoolchildren aged 7-8 years and their parents from Muharraq city in KoB. Data were collected through parents’ self-administered questionnaires, children’s face-face interviews, and dental clinical examinations. Outcome variables, including school performance and school attendance data, were obtained from the parents and school records. The data were analysed using structural equation modelling (SEM). Results: Dental caries, the consequence of dental caries (PUFA/pufa), and enamel developmental defects (EDD) prevalence were 93.4%, 25.7%, and 17.2%, respectively. The findings from the SEM showed that children born in families with high SES were less likely to suffer from dentine dental caries (β= -0.248) and more likely to earn high school performance (β= 0.136) at 7-8 years of age in Muharraq. From the current life course of children, the dental plaque was associated significantly and directly with enamel caries (β= 0.094), dentine caries (β= 0.364), treated teeth (filled or extracted because of dental caries) (β= 0.121), and indirectly associated with dental pain (β= 0.057). Further, dentine dental caries was associated significantly and directly with low school performance (β= -0.155). At the same time, the dental plaque was indirectly associated with low school performance via dental caries (β = −0.044). Conversely, treated teeth were associated directly with high school performance (β= 0.100). Notably, none of the OHCs, biological, SES, behavioural, or parental conditions was related to school attendance in children. Conclusion: The life course approach was adequate to examine the role of OHCs on children’s school performance and attendance. Birth and current (7-8-year-olds) social factors were significant predictors of poor OH and poor school performance.

Keywords: dental caries, life course, Bahrain, school outcomes

Procedia PDF Downloads 103
5368 The Coauthorship Network Analysis of the Norwegian School of Economics

Authors: Ivan Belik, Kurt Jornsten

Abstract:

We construct the coauthorship network based on the scientific collaboration between the faculty members at the Norwegian School of Economics (NHH) and based on their international academic publication experience. The network structure is based on the NHH faculties’ publications recognized by the ISI Web of Science for the period 1950 – Spring, 2014. The given network covers the publication activities of the NHH faculty members (over six departments) based on the information retrieved from the ISI Web of Science in Spring, 2014. In this paper we analyse the constructed coauthorship network in different aspects of the theory of social networks analysis.

Keywords: coauthorship networks, social networks analysis, Norwegian School of Economics, ISI

Procedia PDF Downloads 430
5367 Predicting Mass-School-Shootings: Relevance of the FBI’s ‘Threat Assessment Perspective’ Two Decades Later

Authors: Frazer G. Thompson

Abstract:

The 1990s in America ended with a mass-school-shooting (at least four killed by gunfire excluding the perpetrator(s)) at Columbine High School in Littleton, Colorado. Post-event, many demanded that government and civilian experts develop a ‘profile’ of the potential school shooter in order to identify and preempt likely future acts of violence. This grounded theory research study seeks to explore the validity of the original hypotheses proposed by the Federal Bureau of Investigation (FBI) in 2000, as it relates to the commonality of disclosure by perpetrators of mass-school-shootings, by evaluating fourteen mass-school-shooting events between 2000 and 2019 at locations around the United States. Methods: The strategy of inquiry seeks to investigate case files, public records, witness accounts, and available psychological profiles of the shooter. The research methodology is inclusive of one-on-one interviews with members of the FBI’s Critical Incident Response Group seeking perspective on commonalities between individuals; specifically, disclosure of intent pre-event. Results: The research determined that school shooters do not ‘unfailingly’ notify others of their plans. However, in nine of the fourteen mass-school-shooting events analyzed, the perpetrator did inform the third party of their intent pre-event in some form of written, oral, or electronic communication. In the remaining five instances, the so-called ‘red-flag’ indicators of the potential for an event to occur were profound, and unto themselves, might be interpreted as notification to others of an imminent deadly threat. Conclusion: Data indicates that conclusions drawn in the FBI’s threat assessment perspective published in 2000 are relevant and current. There is evidence that despite potential ‘red-flag’ indicators which may or may not include a variety of other characteristics, perpetrators of mass-school-shooting events are likely to share their intentions with others through some form of direct or indirect communication. More significantly, implications of this research might suggest that society is often informed of potential danger pre-event but lacks any equitable means by which to disseminate, prevent, intervene, or otherwise act in a meaningful way considering said revelation.

Keywords: columbine, FBI profiling, guns, mass shooting, mental health, school violence

Procedia PDF Downloads 117
5366 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy

Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi

Abstract:

Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.

Keywords: terrorism, economy, Boko Haram, Nigeria

Procedia PDF Downloads 256
5365 Effects of Using Interactive Whiteboards at High School Mathematics Classrooms

Authors: Huseyin Demir

Abstract:

This article is the results of a quantitative research about the effects of using interactive whiteboards in high school mathematics classroom. The aim of this article is to investigate the effects of using interactive whiteboards in high school mathematics classrooms. During the article the following questions are answered: 'What can we do with an interactive whiteboard?' and 'Do we really need those properties of the interactive whiteboard?' For the research part of the article, two groups of lessons are executed in Private Demirel College. In the first 6 weeks, the topics are taught on a normal blackboard. Starting from seventh week, we have used interactive whiteboard in the mathematics lessons. At the end of an eight week lectures with interactive whiteboards, a questionnaire is prepared and executed for the students. In the questionnaire 10 questions were asked about the benefits and differences of using the interactive whiteboards in mathematics lessons. By looking at the conclusion of the results of questionnaire and some discussions with the students we found some useful benefits of the usage of interactive whiteboards in mathematics lessons. This article will be helpful for the high school mathematics teachers.

Keywords: mathematics education, interactive whiteboard, blackboard, using interactive whiteboard in mathematics lessons

Procedia PDF Downloads 215
5364 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 77
5363 Investigation of the Effect of Eye Exercises and Convergence Exercise on Visual Acuity in School-Age Children with Hypermetropia

Authors: Gulay Aras, Isil Kutluturk Karagoz, Z. Candan Algun

Abstract:

Background: Hypermetropia in school-age is a pathology that responds to treatment. In the literature, there has been no study of exercise practice in hypermetropia treatment. Objective: The purpose of this study was to investigate the effects of eye exercises and convergence exercise on visual acuity in school-age children with hypermetropia. Methods: Forty volunteer school-age children with hypermetropia (30 girls, 30 boys, between 7-17 years of age) were included in the study. Sociodemographic information and clinical characteristics were evaluated. 40 participants were randomly divided into two groups: eye exercises and convergence exercises. Home exercise protocols were given to all groups for six weeks, and regular phone calls were made once a week. Individuals performed eye exercises 10 times, convergence exercises 5 min. for two sessions per day for six weeks. The right and left eyes of all the subjects participating in the study were assessed separately by the eye doctor with a Snellen chart. The participants' quality of life was assessed using Pediatric Quality of Life Inventory Version 4.0. Physical health total score (PHTS) and scale total score (STS), which were obtained by evaluating Psychosocial health total score (PSHTS) school, emotional and social functioning, were calculated separately in the scores. At the end of the exercise program, the assessment tests applied at the beginning of the study were reapplied to all individuals. Results: There was no statistically significant difference between the pre- and post-Snellen chart measurements and quality of life in the eye exercises group (p > 0,05). There was a statistically significant difference in visual acuity of right and left eyes (p=0,004, p=0,014) and quality of life in PHTS, PSHTS and STS in the convergence exercise group (p=0,001, p=0,017, p=0,001). Conclusions: In school-age children, convergence exercises were found to be effective on visual acuity and health-related quality of life. Convergence exercises are recommended for the treatment of school-aged children with hypermetropia.

Keywords: convergence exercise, eye exercises, hypermetropia, school-age children

Procedia PDF Downloads 244
5362 Safety, Healthy, Intact, and Halal as New Indonesia Policy on Food Security and Safety to Support SDG'S: Sustainable Development Goals

Authors: Ramadhan Febriansyah, Sarah Novianti, Santi Agustini

Abstract:

Indonesia is a big country with Moslem population. The government must fulfill all needs of the people. However, we do not have a good policy yet especially on healthy, safety and halal food. We try to offer a new solution to overcome this with ASUH (Aman, Sehat, Utuh, Halal) or in English is SHIH (Safe, Healthy, Intact, Halal) as alternative Indonesian policy on food security. This policy is Indonesian Government’s commitment to support Sustainability Development Goals program for the zero hunger (end hunger, to achieve food security and improved nutrition for Indonesian people, of course, to promote sustainable agriculture). Hopefully, it not only can increasing quality on food especially on livestock goods (meat, egg, milk) but also to guarantee the halal food. However, this policy can be an example to others country especially Moslem countries to support SDG’s programs. This research conducted means of the descriptive method; the authors find compare the secondary data obtained from journals, textbook and scientific articles in order to determine the factors that influence food safety and food security. Relevant data used and contain a description of SDG’s as well as about the system food safety and food security that SHIH (Safe, Healthy, Intact and Halal) so these ideas can be implemented.

Keywords: food safety, food security, food sovereignty, halal SDG's

Procedia PDF Downloads 380
5361 Enhancing Maritime Governance in Africa: Challenges of Maritime Policy Development in the East African Community

Authors: Christantus Begealawuh Nchongayi

Abstract:

As clearly stated in goal 14 of sustainable development goals, global oceans greatly contribute to making the earth habitable for mankind. This explains why ocean governance is an important global concern today. The emerging maritime security problems and the impact of climate change on African oceans, evidenced by tropical cyclones as seen recently in the Southern region of Africa, is also an indication that maritime governance and policymaking are important elements of peace and security in Africa. Within the last decade, there have been commendable efforts towards maritime governance and policymaking in Africa, although implementation of existing maritime policies is still lacking. This paper provides a snapshot of the overall state of the maritime policymaking process in Africa. It specifically explores the challenges facing policymakers in developing national and regional maritime security strategy in the East African Community. For methodology, the paper relied on primary and secondary data. Primary data was collected from informal discussions with policymakers and key policy-making bodies in Africa, and from a survey of public opinions. The study found that the Africa Integrated Maritime Strategy (2050 AIMS) is a recent template for regional and national maritime security policymaking in Africa and that although maritime security has in the past not been prioritized in the security agenda of the East African Community, developing and aligning a regional maritime security strategy to the 2050 AIMS will result to positive regional integration outcomes in East Africa.

Keywords: 2050 Africa integrated maritime strategy, east African community, maritime policy-making, maritime security

Procedia PDF Downloads 212
5360 The Intention to Use E-Money Transaction: The Moderating Effect of Security in Conceptual Frammework

Authors: Husnil Khatimah, Fairol Halim

Abstract:

This research examines the moderating impact of security on intention to use e-money that adapted from some variables of the TAM (Technology Acceptance Model) and TPB (Theory of Planned Behavior). This study will use security as moderating variable and finds these relationship depends on customer intention to use e-money as payment tools. The conceptual framework of e-money transactions was reviewed to understand behavioral intention of consumers from perceived usefulness, perceived ease of use, perceived behavioral control and security. Quantitative method will be utilized as sources of data collection. A total of one thousand respondents will be selected using quota sampling method in Medan, Indonesia. Descriptive analysis and Multiple Regression analysis will be conducted to analyze the data. The article ended with suggestion for future studies.

Keywords: e-money transaction, TAM & TPB, moderating variable, behavioral intention, conceptual paper

Procedia PDF Downloads 448
5359 Linkages Between Climate Change, Agricultural Productivity, Food Security and Economic Growth

Authors: Jihène Khalifa

Abstract:

This study analyzed the relationships between Tunisia’s economic growth, food security, agricultural productivity, and climate change using the ARDL model for the period from 1990 to 2022. The ARDL model reveals a positive correlation between economic growth and lagged agricultural productivity. Additionally, the vector autoregressive (VAR) model highlights the beneficial impact of lagged agricultural productivity on economic growth and the negative effect of rainfall on economic growth. Granger causality analysis identifies unidirectional relationships from economic growth to agricultural productivity, crop production, food security, and temperature variations, as well as from temperature variations to crop production. Furthermore, a bidirectional causality is established between crop production and food security. The study underscores the impact of climate change on crop production and suggests the need for adaptive strategies to mitigate these climate effects.

Keywords: economic growth, agriculture, food security, climate change, ARDl, VAR

Procedia PDF Downloads 21
5358 School Context-Related Factors That Affect Principals’ Instructional Leadership Competence at Primary Schools in Tarcha Town, Ethiopia

Authors: Godaye Gobena Gomiole

Abstract:

The purpose of this study was to investigate school context-related factors that affect principals' instructional leadership competence in primary schools in Tarcha Town, Ethiopia. A qualitative case study research design was used. The data were collected through semi-structured interviews and document analysis. Twelve senior principals were included in the study through purposive sampling. Interviews were used to collect in-depth data. The data was analyzed thematically. The findings of the study indicated that primary school principals face both internal and external challenges. Internally, they face limited knowledge and skills, a lack of courage and commitment, and administrative work overload. Their external challenges included negative attitudes from parents and teachers, a lack of instructional materials, and little support from local education authorities. Consequently, they can't serve effectively as instructional leaders or resource people. Based on the findings, it is recommended that the Ministry of Education, South West Regional Education Bureau, Dawuro Zone Education Department, and Tarcha Town Administration Education Officers and Cluster Supervisors regularly monitor and support school leaders and prepare and provide pertinent teaching materials and training so that the principals can lead in the capacity that is appropriate for the position.

Keywords: instructional leadership, primary school, principals, school context related factors

Procedia PDF Downloads 46
5357 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector

Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid

Abstract:

For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.

Keywords: electricity, energy policy, energy security, Malaysia

Procedia PDF Downloads 301
5356 The Relationship between Selfesteem, Social Support, and Mental Health among High School Students in Iran

Authors: Mohsen Shahbakhti

Abstract:

The aim of this study was to examine the relationship between self-esteem, social support and mental health in a sample of government high school students in Eshtehard city in Alborz Province in Iran. Three hundred and eleven students (boys) were included in this study. All participants completed the General Health Questionnaire (GHQ 12), Multidimensional Scale of Perceived Social Support (MSPSS -12), and Self-Esteem Scale (SS-10). The results revealed that self-esteem was positively associated with social support. Self-esteem and social support negatively associated with psychological distress. Self-esteem and social support to influence on mental health.

Keywords: self-esteem, social support, mental health, high school students

Procedia PDF Downloads 478
5355 The Active Role of Teacher's in Managing Effective Classroom Environment for High School Students from the Viewpoint of the Teachers

Authors: Majda Ibrahim Aljaroudi, Jwaher Alburake

Abstract:

The study aimed to identify the active role of the teacher in the management of the effective classroom environment for high school students from the viewpoint of the teachers, and to identify whether there were statistically significant differences between the averages of the respondents regarding the active role of the high school teachers in managing effective classroom environment in Riyadh, and also the total score depending on the variables of the study (qualifications, years of experience, training and development programs). This study used the descriptive survey approach where a questionnaire has been built and consisted of (35) items about five areas as a tool to measure the teacher's role in the management of effective classroom environment for high school students. The study population consisted of (1313) high school teachers in the government schools in south of Riyadh. It consisted of (70) teachers who were selected randomly. It used the appropriate statistical methods to analyze data by using statistical packages (SPSS). The study found the following results: • Most of the study sample members agreed on their role in the effective classroom environment management for high school students in government schools in Riyadh with an average (3.91 out of 5), which falls in the fifth category of Quintet scale (from 3.41 to 4.20) that refers to the option "often". • There are statistically significant differences between the mean responses of the study sample about the active role of the teacher in the effective classroom environment management for high school students regarding the concept of order in the classroom depending on the variable of years of experience for the benefit of teachers who have over 10 years of experience. There are statistically significant differences between the mean responses of the study sample about the teacher's active role in the effective classroom environment management for high school students regarding the educational process for maintaining the order in the classroom depending on the variable of training and development programs for the benefit of the teachers who have more than (5) courses. Due to the results of the study the researcher recommended a number of recommendations to improve the teacher's role in the effective classroom environment management for high school students.

Keywords: effective management, active learning, educational sciences, pedagogical sciences

Procedia PDF Downloads 439
5354 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 319
5353 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 25
5352 Assessing Secondary School Curricula in the light of Developing Quality of Life Standards of High School Students

Authors: Othman Ali Alghtani, Yahya Abdul-Ekhalq Ali, Abdullah Abdul-Ekhalq Ali, Ahmed Al Sadiq Abdul Majeed, Najwa Attian Al-Mohammadi, Obead Mozel Alharbi, Sabri Mohamed Ismail, Omar Ibrahim Asiri

Abstract:

This study assessed the curricula of secondary schools given requirements to enhance the quality of life of students. The components of quality of life were described to build a list of standards and indicators. A questionnaire assessing the dimensions of mental (cognitive and emotional), physical, digital, and social health, and environmental awareness was prepared. A descriptive-analytical approach was used on a sample of 258 teachers and educational supervisors in Tabuk. The results indicated shortcomings in the secondary school curricula regarding developing standards and indicators of components of quality of life. Results also indicated that secondary school curricula incorporated few practices to improve student’s quality of life. No significant differences were found regarding the core subject, job, gender, and years of experience.

Keywords: assessing curricula, teacher practices, quality of life, teaching practices

Procedia PDF Downloads 260
5351 Practical Problems as Tools for the Development of Secondary School Students’ Motivation to Learn Mathematics

Authors: M. Rodionov, Z. Dedovets

Abstract:

This article discusses plausible reasoning use for solution to practical problems. Such reasoning is the major driver of motivation and implementation of mathematical, scientific and educational research activity. A general, practical problem solving algorithm is presented which includes an analysis of specific problem content to build, solve and interpret the underlying mathematical model. The author explores the role of practical problems such as the stimulation of students' interest, the development of their world outlook and their orientation in the modern world at the different stages of learning mathematics in secondary school. Particular attention is paid to the characteristics of those problems which were systematized and presented in the conclusions.

Keywords: mathematics, motivation, secondary school, student, practical problem

Procedia PDF Downloads 294
5350 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 112
5349 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 81
5348 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 92
5347 Learning-Oriented School Education: Indicator Construction and Taiwan's Implementation Performance

Authors: Meiju Chen, Chaoyu Guo, Chia Wei Tang

Abstract:

The present study's purpose is twofold: first, to construct indicators for learning-oriented school education and, second, to conduct a survey to examine how learning-oriented education has been implemented in junior high schools after the launch of the 12-year compulsory curriculum. For indicator system construction, we compiled relevant literature to develop a preliminary indicator list model and then conducted two rounds of a questionnaire survey to gain comprehensive feedback from experts to finalize our indicator model. In the survey's first round, 12 experts were invited to evaluate the indicators' appropriateness. Based on the experts' consensus, we determined our final indicator list and used it to develop the Fuzzy Delphi questionnaire to finalize the indicator system and each indicator's relative value. For the fact-finding survey, we collected 454 valid samples to examine how the concept of learning-oriented education is adopted and implemented in the junior high school context. We also used this data in our importance-performance analysis to explore the strengths and weaknesses of school education in Taiwan. The results suggest that the indicator system for learning-oriented school education must consist of seven dimensions and 34 indicators. Among the seven dimensions, 'student learning' and 'curriculum planning and implementation' are the most important yet underperforming dimensions that need immediate improvement. We anticipate that the indicator system will be a useful tool for other countries' evaluation of schools' performance in learning-oriented education.

Keywords: learning-oriented education, school education, fuzzy Delphi method, importance-performance analysis

Procedia PDF Downloads 140
5346 Canadian High School Students' Attitudes and Perspectives Towards People With Disabilities, Autism, and ADHD

Authors: Khodi Morgan, Kasey Crowe, Amanda Morgan

Abstract:

Canadian High School Students' Attitudes & Perspectives Towards People With Disabilities, Autism, and ADHD. Objective: To survey Canadian high school students' regarding their attitudes and perspectives towards people with disabilities and explore how age, gender, and personal experience with disability may impact these views. Methods A survey was developed using the standardized Attitude Toward Persons With Disability Scale as its base, with the addition of questions specifically about Autism and Attention Deficit Hyperactivity Disorder (ADHD). The survey also gathered information about the participants’ age and gender and whether or not they, or a close family member, had any disabilities. Participants were recruited at a public Canadian high school by fellow student researchers. Results A total of 219 (N=219) students ranging from 13 - 19 years old participated in the study (m= 15.9 years of age). Gender was equally split, with 44% male, 42% female and 14% undeclared. Experience with disability was common amongst participants, with 25% self-identifying as having a personal disability and 48% claiming to have a close family member with a disability. Exploratory trends indicated that females, and people with self-identified disabilities, and people with close family members with disabilities trended towards having more positive attitudes toward persons with disabilities. This poster will report upon these trends and explore in more depth how personal factors such as age, gender and personal disability status impact high school students attitudes toward persons with disability in general and in regards to Autism and ADHD specifically.

Keywords: disability, autism, ADHD, community research, acceptance, adolescence, high school

Procedia PDF Downloads 73
5345 A Study on Household Food Security and Dietary Diversity in Urban Centers of Thrissur

Authors: Sandra Thomas

Abstract:

This study tries to analyse the level of food security and dietary diversity among households of different socio-economic classes in the urban centers of Thrissur. The study revealed that there is no much difference in purchasing patterns of food articles among the socio-economic classes indicating a very high level of both physical and economic accessibility of food. On analysing the dietary diversity of the households none of the households scored below five and fifty-three per cent of the households scored eleven or twelve indicating higher diversity in diet. It was also found that income and education are the two important factors that influence the level of household food security.

Keywords: food security, dietary diversity, household level, socio-economic classes

Procedia PDF Downloads 120
5344 Internet of Things Professional Construction Building through the School-Enterprise Cooperation

Authors: Jumin Zhao, Na Li, Dengao Li, Yujuan Yan

Abstract:

As the rapid rise of the networking industry, the shortage of Internet of Things (IoT) talented people greatly stimulates the majority of colleges to speed up the pace of professional networking reform. Caused by the construction of the original specialty, many problems appear such as the vague specialty, the mixed theoretical, the poor practical ability and the different goal. To solve the issues above, we build a ‘theory-practice-theory-improvement’ four-step model of school-enterprise integration of personnel training. Besides, we integrate the advanced teaching philosophy: flip class and Mu class, making IoT teaching more professional and the ability of students more comprehensive.

Keywords: IoT, theory-practice-theory-promotion, major construction, school-enterprise cooperation

Procedia PDF Downloads 377
5343 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 298
5342 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 67
5341 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 286