Search results for: school security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5770

Search results for: school security

5200 Analysing Stem Student Interests in Developing Critical Thinking Skills in Pakistan

Authors: Muhammad Ramzan

Abstract:

STEM Education and Critical Thinking Skills are important 21st-century skills. STEM Education is necessary to promote secondary school students’ critical thinking skills. These skills are critical for teachers to respond to students. Pakistan is in the preliminary stages of integrating STEM Education in institutions like other developing countries. Unfortunately, most secondary school students in Pakistan are unaware of STEM Education and teachers are not applying critical thinking skills in classrooms. The study's objectives mainly deal with; to identify the importance of STEM Education in the teaching-learning process; to find out the factors affecting critical thinking skills that can develop interest in students in STEM Education and suggestions on how to improve critical thinking skills in students regarding STEM Education. This study was descriptive. The population of the study was secondary school students. Data was collected from 200 secondary school students through a questionnaire. The research results show that critical thinking skills develop interest in students towards STEM Education.

Keywords: STEM education, teachers, students, critical thinking skills, teaching and learning process

Procedia PDF Downloads 12
5199 The Development and Evaluation of the Reliability and Validity of the Science Flow Experience Scale

Authors: Wen-Wei Chiang

Abstract:

In this study, the researcher developed a scale for use in measuring the degree to which high school students experience a state of flow. The researcher then verified its reliability and validity in an actual classroom setting. The ultimate objective was to identify feasible methods by which to promote the experience of a flow state among high school students engaged in the study of science. The nine indices identified in this study to assess the engagement of high school students focus primarily on the study of science-related topics; however, the principles on which they are based are applicable to a wide range of learning situations. Teachers must outline the goals of each lesson clearly and provide unambiguous feedback. They must also look for ways to make the lessons more fun and appealing.

Keywords: flow experience, positive psychology, questionnaire, science learning

Procedia PDF Downloads 101
5198 Assessing the Leadership Succession Plan in Faith-Based Senior High Schools in Ghana and Its Associated Challenges

Authors: J. E. Cobbinah

Abstract:

One of the most challenging issues confronting schools is good leadership succession planning. Experts argue that, although the idea of leadership succession planning is one of the strategies or practices that can help sustain improvement and promote continuity of good leadership, seem to have been neglected in many schools over the years. Appointment of head teachers in senior high schools is based on long service or one’s ability to demonstrate his/her competence in a leadership selection interview. There is no clear and well-structured leadership succession plan, before leadership position is filled, while school leadership succession planning seem to be an issue that nobody talks about. In faith-based schools the issue is even worse, because religious groups impose whoever they consider strong in the faith on schools as leaders, irrespective of the individual competence, ability to take up challenges associated with individuals’ preparedness to take up leadership position. Therefore, the present study examined the nature (including type) of leadership succession plans in faith-based senior high schools and its associated challenges. Convergent mixed method design was employed to effectively achieve the objectives of the study. The data collection strategies involved the use of interviews, questionnaires, and reviews of secondary data. The data was gathered from students, school leaders (head teachers, deputy heads, and head of departments), selected parents teachers associated members, school management committee members and members from school governors. The results show that governors of faith-based schools are making efforts to enhance education quality, by making school leadership accountable, the absence and the neglect of clear, and well-structured leadership succession plan has some negative outcomes. Unsustainable students’ academic performance, lack of support from existing staffs and senior leaders and lack of support in the implementation of school improvement plan. It would be concluded that, faith-based schools should focus on leadership competence and abilities in the selection process of potential school leaders to achieve a good succession plan rather than appointing leaders who are affiliates of one’s faith.

Keywords: school leadership, succession planning, faith-based schools, school governors

Procedia PDF Downloads 418
5197 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 80
5196 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 65
5195 Canadian High School Students' Attitudes and Perspectives Towards People with Disabilities, Autism and Attention Deficit Hyperactivity Disorder (ADHD)

Authors: Khodi Morgan, Kasey Crowe, Amanda Morgan

Abstract:

Canadian High School Students' Attitudes & Objective: To survey Canadian high school students regarding their attitudes and perspectives towards people with disabilities and explore how age, gender, and personal experience with a disability may impact these views. Methods: A survey was developed using the standardized Attitude Toward Persons With Disability Scale as its base, with the addition of questions specifically about Autism and Attention Deficit Hyperactivity Disorder (ADHD). The survey also gathered information about the participant’s age and gender and whether or not they, or a close family member, had any disabilities. Participants were recruited at a public Canadian high school by fellow student researchers. Results: A total of 219 (N=219) students ranging from 13 - 19 years old participated in the study (m= 15.9 years of age). Gender was equally split, with 44% male, 42% female and 14% undeclared. Experience with a disability was common amongst participants, with 25% self-identifying as having a personal disability and 48% claiming to have a close family member with a disability. Exploratory trends indicated that females, people with self-identified disabilities, and people with close family members with disabilities trended towards having more positive attitudes toward persons with disabilities.

Keywords: disability, autism, ADHD, high school, adolescence, community research, acceptance

Procedia PDF Downloads 61
5194 Mural Exhibition as a Promotive Strategy to Proper Hygiene and Sanitation Practices among Children: A Case Study from Urban Slum Schools in Nairobi, Kenya

Authors: Abdulaziz Kikanga, Kellen Muchira, Styvers Kathuni, Paul Saitoti

Abstract:

Background: Provision of adequate levels of water, sanitation, and hygiene in schools is a strategic objective in achieving universal primary education among children in low and middle-income countries. However, lack of proper sanitation and hygiene practices in schools, especially those in informal settlement has resulted to an increased rate of school absenteeism thereby affecting the education and health outcomes of the children in those setting. Intervention or Response: Catholic Relief Services in Kenya supports five schools in informal settlements of Nairobi by painting of key hygiene messages on school walls to promote proper hygiene and sanitation practices among the school children. The mural exhibitions depict the essence of proper hygiene practices, proper latrine use, and hand washing after visiting the latrine. The artwork is context specific and its aimed at improving the uptake of proper hygiene and sanitation practices among the school children. Review of project related documents was conducted including interviews with the school children. Thematic analysis was used to interpret the qualitative information generated. Results and Lessons Learnt: 12 school children have interviewed on proper hygiene and sanitation practices and the exercise revealed that painted murals were the best communication platforms for creating awareness on proper sanitation on issues relating to water, sanitation, and hygiene in schools. The painting mural provided a strong knowledge base for the formation of healthy habits in both the school and informal settlement. In addition, these sanitation messages on the school walls empower the children to share these practices with their siblings, parents, and other family members thereby acting as agents of change to proper hygiene and sanitation in those informal settlements. The findings revealed that by adopting proper sanitation and hygiene practices, there has been a reduction of school absenteeism due to a decrease in disease related to inadequate sanitation and hygiene in schools. Conclusion: The adoption of proper sanitation in schools entails more than just a painted mural wall. Insights revealed that to have a lasting sanitation and hygiene intervention, there is a need to invest in effective hygiene educational programming that encourages the formation of proper hygiene habits and promotes changes in behavior.

Keywords: education outcomes, informal settlement, mural exhibition, school hygiene and sanitation

Procedia PDF Downloads 228
5193 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 78
5192 A Study on Household Food Security and Dietary Diversity in Urban Centers of Thrissur

Authors: Sandra Thomas

Abstract:

This study tries to analyse the level of food security and dietary diversity among households of different socio-economic classes in the urban centers of Thrissur. The study revealed that there is no much difference in purchasing patterns of food articles among the socio-economic classes indicating a very high level of both physical and economic accessibility of food. On analysing the dietary diversity of the households none of the households scored below five and fifty-three per cent of the households scored eleven or twelve indicating higher diversity in diet. It was also found that income and education are the two important factors that influence the level of household food security.

Keywords: food security, dietary diversity, household level, socio-economic classes

Procedia PDF Downloads 106
5191 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 283
5190 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 54
5189 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 264
5188 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 282
5187 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 403
5186 Comparative Analysis of Teachers’ Performance in Private and Public Primary Schools in Oyo State

Authors: Babajide Solomon Faloore

Abstract:

This study on the comparative analysis of the performance of teachers in private and public schools was carried out in Ibadan North West Local Government Area of Oyo State. This study examined the justification for the claim that there is a difference in the performance of teachers in private and public primary schools and at the same time identified factors responsible for the difference in the performance of these teachers. A descriptive survey research design was used for the study. Data generated were analyzed using t-test and regression analysis. The findings of the study revealed that there is significance difference in the performance of teachers in private and private primary schools in Ibadan North West Local Government Area of Oyo State( t=64.09; df=459; p,.05). The findings also revealed that the method of teaching in private primary schools is significantly different from the method of teaching in public primary schools in Ibadan North West Local Government Area of Oyo State (t=73.08; df=459; p,.05). Findings revealed that school leadership and management have a significant contribution on the performance of private and public primary school teachers in Ibadan North West Local Area of Oyo State. Based on the finding, the following recommendations were made: Primary school teachers need to be motivated and rewarded for excellent performance. Primary schools should be properly equipped with teaching–aid facilities, laboratories, and libraries. The government should use the findings of this study to improve on teaching materials provided to the primary school teachers in Nigeria. Public primary schools should be designed by education planners, administrators, and government. Headmasters, proprietors, and teachers of primary schools should look inward and give a performance appraisal and evaluation of themselves from time to time based on the subject they taught. Finally, school administrators should be conscious of the way they manage the teachers in schools not only in informal situations but also in formal settings.

Keywords: private education, public education, school leadership, school management, teachers performance

Procedia PDF Downloads 364
5185 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 304
5184 Prosocial Behavior and Satisfaction with School Life in Elementary Children: From the Perspective of Classroom Environment

Authors: Takuma Yamamoto

Abstract:

Present study investigated the relationship between elementary school children’s prosocial behavior in classroom and satisfaction with school life (approval and victimization from other children) with considering from the perspective of classroom social goal structures (prosocial and compliance goal structures). Participants were 755 elementary school children (393 boys, 362 girls, mean range= 10-12, 5th grader and 6th grader) who were living in Chugoku District, Japan. They filled up questionnaire which was consisted of Murakami, Nishimura and Sakurai’s (2016) prosocial behavior toward friend scale, Kawamura and Tagami’s (1997) satisfaction in classroom scale and Ohtani, Okada, Nakaya and Ito’s (2016) classroom social goal structures scale. Regression lines that satisfaction in classroom is dependent variable and prosocial behavior is independent variable for each class were drawn. There were two types of classroom which children’s prosocial behavior correlated with satisfaction positively and did not. Then one-way MANOVA was conducted to further describe two types of classroom which prosocial behavior increased satisfaction in classroom (type 1) and prosocial behavior decreased satisfaction (type 2). MANOVA for Prosocial goal structure was significant, type 1 > type 2. There were two key findings from this study. First, MANOVA for prosocial goal structure was significant. Second, high score of prosocial goal structure was not necessary condition for the classroom type which children’s prosocial behavior correlated with satisfaction. The implications from these key findings were: (1) in the low prosocial goal structure classroom, children will not behave prosocially because of their negative expectation for the effect of prosocial behavior, (2) this study can be a contribution for classroom management that teachers need to consider about the negative possibilities of prosocial behavior when they try to increase the amount of children’s positive behavior.

Keywords: elementary school children, classroom social goal structure, satisfaction with school life, prosocial behavior

Procedia PDF Downloads 223
5183 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 136
5182 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 74
5181 Self-Regulation and School Adjustment of Students with Autism Spectrum Disorder in Hong Kong

Authors: T. S. Terence Ma, Irene T. Ho

Abstract:

Conducting adequate assessment of the challenges students with ASD (Autism Spectrum Disorder) face and the support they need is imperative for promoting their school adjustment. Students with ASD often show deficits in communication, social interaction, emotional regulation, and self-management in learning. While targeting these areas in intervention is often helpful, we argue that not enough attention has been paid to weak self-regulation being a key factor underlying their manifest difficulty in all these areas. Self-regulation refers to one’s ability to moderate their behavioral or affective responses without assistance from others. Especially for students with high functioning autism, who often show problems not so much in acquiring the needed skills but rather in applying those skills appropriately in everyday problem-solving, self-regulation becomes a key to successful adjustment in daily life. Therefore, a greater understanding of the construct of self-regulation, its relationship with other daily skills, and its role in school functioning for students with ASD would generate insights on how students’ school adjustment could be promoted more effectively. There were two focuses in this study. Firstly, we examined the extent to which self-regulation is a distinct construct that is differentiable from other daily skills and the most salient indicators of this construct. Then we tested a model of relationships between self-regulation and other daily school skills as well as their relative and combined effects on school adjustment. A total of 1,345 Grade1 to Grade 6 students with ASD attending mainstream schools in Hong Kong participated in the research. In the first stage of the study, teachers filled out a questionnaire consisting of 136 items assessing a wide range of student skills in social, emotional and learning areas. Results from exploratory factor analysis (EFA) with 673 participants and subsequent confirmatory factor analysis (CFA) with another group of 672 participants showed that there were five distinct factors of school skills, namely (1) communication skills, (2) pro-social behavior, (3) emotional skills, (4) learning management, and (5) self-regulation. Five scales representing these skill dimensions were generated. In the second stage of the study, a model postulating the mediating role of self-regulation for the effects of the other four types of skills on school adjustment was tested with structural equation modeling (SEM). School adjustment was defined in terms of the extent to which the student is accepted well in school, with high engagement in school life and self-esteem as well as good interpersonal relationships. A 5-item scale was used to assess these aspects of school adjustment. Results showed that communication skills, pro-social behavior, emotional skills and learning management had significant effects on school adjustment only indirectly through self-regulation, and their total effects were found to be not high. The results indicate that support rendered to students with ASD focusing only on the training of well-defined skills is not adequate for promoting their inclusion in school. More attention should be paid to the training of self-management with an emphasis on the application of skills backed by self-regulation. Also, other non-skill factors are important in promoting inclusive education.

Keywords: autism, assessment, factor analysis, self-regulation, school adjustment

Procedia PDF Downloads 91
5180 Correlation between Physical Fitness and Performance and Grade of Table Tennis of Middle School Students

Authors: Yisong Cong, Mingming Guo, Xiaozan Wang, Yizhi Zhang, Qingqing Yuan

Abstract:

This study is to test the correlation between the Physical Fitness (PF) of middle school students and their performance and sports grade of table tennis. Methods: 398 middle school students from Shanghai Tongji No.2 Middle School participated in the study, including 232 boys and 166 girls. Each participant participated in the Chinese Students’ Physical Fitness Test (CSPFT), including BMI, 50-meter running, vital capacity, sitting body flexion, standing long jump, 800-meter running, 1000-meter running, pull-ups, and sit-ups. Test scores were converted to a percentage score according to the CSPFT guidelines. In addition, each student participated in the Nation Junior Table Tennis grade test, and completed the table tennis sports grade assessment of 1-9. Results: There is a significant positive correlation between the scores of multiple PF tests and the total scores of table tennis, such as BMI (r = 0.15, p < 0.01), standing long jump (r = 0.15, p < 0.05), 800-meter run (r = 0.02, p <0.01); The scores of multiple PF are positively correlated with table tennis grade, such as vital capacity (r = 0.1, p < 0.01) and 50-meter running (r = 0.18, p < 0.05). At the same time, the sit-ups performance showed a significant negative correlation with the table tennis performance (r = -0.08, p < 0.01); There is no significant correlation between the other PF indicators and the performance and grade of table tennis. Conclusions: This study shows that there is a corresponding relationship between some PF indicators of middle school students and their table tennis performance and table tennis grade,but the specific form and reason of the relationship need to be further explored.

Keywords: middle school students, physical fitness, table tennis grade, table tennis performance

Procedia PDF Downloads 139
5179 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 546
5178 Authority and Responsibility of Turkish Physical Education Teachers

Authors: Mufide Cotuk, Muslim Bakir

Abstract:

National education in Turkey aims to provide superior education opportunities to students in order to develop their intellectual abilities in accordance with contemporary pedagogy. Physical education (PE) plays an important role in this context. Various factors affect the quality and efficiency of the process of PE. Factors related to governance are crucially important, especially those of authority and responsibility. For educational institutions at high school level, the factors affecting authority and responsibility have not been clearly delineated. Therefore, the aim of this study was to examine authority and responsibility of PE teachers as the balance between them. The study sample consisted of 60 PE teachers (19 women, 41 men) at 57 high schools in Istanbul (65% state and 35% private institutions). All PE teachers completed the study questionnaire collecting demographic and institutional data as knowledge and attitudes regarding authority and responsibility issues. The determination of authority and responsibility of PE teachers has been grounded on the law for government officials, course-passing regulations, and school sports regulations. The PE teachers declared as the primary source of their authority and responsibility ‘school sports regulations’ (56,7% of PE teachers), ‘course-passing regulations’ (36,7% of PE teachers) and ‘the law for government officials’ (30,0% of PE teachers). The PE teachers mentioned that the school administration burdened them with additional responsibilities (58,3% of PE teachers). Such ‘additional’ responsibilities were primarily related to ‘disciplinary regulations’ (21,7% of PE teachers) and ‘maintenance of school order’ (16,0% of PE teachers). In conclusion, authority and responsibility of PE teachers were not well balanced. As authority issues were not clearly stated, ‘compulsory’ responsibilities increased causing this imbalance.

Keywords: authority, PE teacher, responsibility, sport management

Procedia PDF Downloads 324
5177 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 456
5176 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 52
5175 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 367
5174 Teacher Culture Inquiry of Classroom Observation at an Elementary School in Taiwan

Authors: Tsai-Hsiu Lin

Abstract:

Three dimensions of teacher culture hinder educational improvement: individualism, conservatism and presentism. To promote the professional development of teachers, these three aspects in teacher culture should be eliminated. Classroom observation may be a useful method of eliminating individualism. The Ministry of Education in Taiwan has attempted to reduce the isolation of teachers to promote their professional growth. Because classroom observation discourse varies, teachers are generally unwilling to allow their teaching to be observed. However, classroom observations take place in the country in the form of school evaluations. The main purpose of this study was to explore the differences in teachers’ conservatism, individualism and presentism after classroom observations had been conducted at an elementary school in Taiwan. The research method was a qualitative case study involving interviews with the school principal, the director of academic affairs, and two classroom teachers. The following conclusions were drawn: (1) Educators in different positions viewed classroom observations differently; (2) The classroom teachers did not highly value classroom observation; (3) There was little change in the teachers’ conservatism, individualism and presentism after classroom observation.

Keywords: classroom observation, Lortie’s Trinity, teacher culture, teacher professional development

Procedia PDF Downloads 286
5173 Academic Skills Enhancement in Secondary School Students Undertaking Tertiary Studies

Authors: Richard White, Anne Drabble, Maureen O’Neill

Abstract:

The University of the Sunshine Coast (USC) offers secondary school students in the final two years of school (Years 11 and 12, 16 – 18 years of age) an opportunity to participate in a program which provides an accelerated pathway to tertiary studies. Whilst still at secondary school, the students undertake two first year university subjects that are required subjects in USC undergraduate degree programs. The program is called Integrated Learning Pathway (ILP) and offers a range of disciplines, including business, design, drama, education, and engineering. Between 2010 and 2014, 38% of secondary students who participated in an ILP program commenced undergraduate studies at USC following completion of secondary school studies. The research reported here considers “before and after” literacy and numeracy competencies of students to determine what impact participation in the ILP program has had on their academic skills. Qualitative and quantitative data has been gathered via numeracy and literacy testing of the students, and a survey asking the students to self-evaluate their numeracy and literacy skills, and reflect on their views of these academic skills. The research will enable improved targeting of teaching strategies so that students will acquire not only course-specific learning outcomes but also collateral academic skills. This enhancement of academic skills will improve undergraduate experience and improve student retention.

Keywords: academic skills enhancement, accelerated pathways, improved teaching, student retention

Procedia PDF Downloads 289
5172 Cigarette Smoking and Alcohol Use among Mauritian Adolescents: Analysis of 2017 WHO Global School-Based Student Health Survey

Authors: Iyanujesu Adereti, Tajudeen Basiru, Ayodamola Olanipekun

Abstract:

Background: Substance abuse among adolescents is of public health concern globally. Despite being the most abused by adolescents, there are limited studies on the prevalence of alcohol use and cigarette smoking among adolescents in Mauritius. Objectives: To determine the prevalence of cigarette smoking, alcohol use and associated correlates among school-going adolescents in Mauritius. Methodology: Data obtained from 2017 WHO Global School-based Student Health Survey (GSHS) survey of 3,012 school-going adolescents in Mauritius was analyzed using STATA. Descriptive statistics were used to obtain prevalence. Bivariate and multivariate logistic regression analysis was used to evaluate predictors of cigarette smoking and alcohol use. Results: Prevalence of alcohol consumption and cigarette smoking were 26.0% and 17.1%, respectively. Smoking and alcohol use was more prevalent among males, younger adolescents, and those in higher school grades (p-value <.000). In multivariable logistic regression, male gender was associated with a higher risk of cigarette smoking (adjusted Odds Ratio (aOR) [95%Confidence Interval (CI)]= 1.51[1.06-2.14]) but lower risk of alcohol use (aOR[95%CI]= 0.69[0.53-0.90]) while older age (mid and late adolescence) and parental smoking were found to be associated with increased risk of alcohol use (aOR[95%CI]= 1.94[1.34-2.99] and 1.36[1.05-1.78] respectively). Marijuana use, truancy, being in a fight and suicide ideation were associated with increased odds of alcohol use (aOR[95%CI]= 3.82[3.39-6.09]; 2.15[1.62-2.87]; 1.83[1.34-2.49] and 1.93[1.38-2.69] respectively) and cigarette smoking (aOR[95%CI]= 17.28[10.4 - 28.51]; 1.73[1.21-2. 49]; 1.67[1.14-2.45] and 2.17[1.43-3.28] respectively) while involvement in sexual activity was associated with reduced risk of alcohol use (aOR[95%CI]= 0.50[0.37-0.68]) and cigarette smoking (aOR[95%CI]= 0.47[0.33-0.69]). Parental support and parental monitoring were uniquely associated with lower risk of cigarette smoking (aOR[95%CI]= 0.69[0.47-0.99] and 0.62[0.43-0.91] respectively). Conclusion: The high prevalence of alcohol use and cigarette smoking in this study shows the need for the government of Mauritius to enhance policies that will help address this issue putting into accounts the various risk and protective factors.

Keywords: adolescent health, alcohol use, cigarette smoking, global school-based student health survey

Procedia PDF Downloads 221
5171 Social Skills as a Significant Aspect of a Successful Start of Compulsory Education

Authors: Eva Šmelová, Alena Berčíková

Abstract:

The issue of school maturity and readiness of a child for a successful start of compulsory education is one of the long-term monitored areas, especially in the context of education and psychology. In the context of the curricular reform in the Czech Republic, the issue has recently gained importance. Analyses of research in this area suggest a lack of a broader overview of indicators informing about the current level of children’s school maturity and school readiness. Instead, various studies address partial issues. Between 2009 and 2013 a research study was performed at the Faculty of Education, Palacký University Olomouc (Czech Republic) focusing on children’s maturity and readiness for compulsory education. In this study, social skills were of marginal interest; the main focus was on the mental area. This previous research is smoothly linked with the present study, the objective of which is to identify the level of school maturity and school readiness in selected characteristics of social skills as part of the adaptation process after enrolment in compulsory education. In this context, the following research question has been formulated: During the process of adaptation to the school environment, which social skills are weakened? The method applied was observation, for the purposes of which the authors developed a research tool – record sheet with 11 items – social skills that a child should have by the end of preschool education. The items were assessed by first-grade teachers at the beginning of the school year. The degree of achievement and intensity of the skills were assessed for each child using an assessment scale. In the research, the authors monitored a total of three independent variables (gender, postponement of school attendance, participation in inclusive education). The effect of these independent variables was monitored using 11 dependent variables. These variables are represented by the results achieved in selected social skills. Statistical data processing was assisted by the Computer Centre of Palacký University Olomouc. Statistical calculations were performed using SPSS v. 12.0 for Windows and STATISTICA: StatSoft STATISTICA CR, Cz (software system for data analysis). The research sample comprised 115 children. In their paper, the authors present the results of the research and at the same time point to possible areas of further investigation. They also highlight possible risks associated with weakened social skills.

Keywords: compulsory education, curricular reform, educational diagnostics, pupil, school curriculum, school maturity, school readiness, social skills

Procedia PDF Downloads 231