Search results for: security program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6511

Search results for: security program

5911 The Integrated Safety Promotion Program on Safety Work Behaviors Among Waste Collectors

Authors: Natnicha Wareesamarn, Waruntorn Jongrungrotsakul, Anon Wisutthananon

Abstract:

Occupational illnesses and injuries are the partial results of unsafe work behaviors. Safety training, an occupational health and safety standard, could either reduce or prevent such illnesses and injuries. This quasi-experimental research aimed to examine the effect of integrated safety training on safety work behaviors among 54 waste collectors working in the Su-ngai Kolok and Muang districts in Narathiwat Province. The workers were equally divided into an experimental or a control group (27 in each). The study was implemented from September to November 2021. The research instruments consisted of 1) an integrated safety promotion program on safety work behaviors which was developed based on the literature review, and 2) a questionnaire on safe working behaviors among waste collectors modified from a safety work behaviors questionnaire by Sitthichai Jaikhan et al. (2019). The content validity of the questionnaire was confirmed by experts with a content validity index of 0.97, while reliability was at an acceptable level (0.86 - 0.90). Data were analyzed using descriptive statistics and a t-test. The findings showed that after receiving the integrated safety promotion program on safety work behaviors, the mean scores for safety work behaviors among the experimental group (x ̅ = 73.89, S.D.=1.12) were significantly higher than those of the control group (x ̅ = 47.93, S.D.= 2.45) (p<.001). Furthermore, it was found that the mean score for safety work behaviors among the experimental group after receiving the integrated safety promotion program (x ̅=73.89, S.D.= 2.45) was significantly higher than that before receiving the program (x ̅=47.85, S.D.= 2.16) (p<.001). These findings indicate that occupational health nurses and related staff should place great concern on the application of integrated safety promotion programs into their own work. This is anticipated to enhance safe work behaviors, thereby reducing occupational illnesses and injuries, as well as enhancing the quality of working life among waste collectors.

Keywords: integrated safety promotion program, safety work behaviors, waste collectors, safety training

Procedia PDF Downloads 121
5910 Impacts of International Training Program in Pedagogy in Higher Education in the United States on Visiting Scholars in China

Authors: Yuliang Liu, Thomas Lavallee, Mary Weishaar, Gretchen Fricke, Huaibo Xin

Abstract:

The longitudinal study was designed to investigate the impacts of the International Training Program in Pedagogy (ITPP) at a midwestern institution in the United States on the visiting scholars from China from 2012-18. The study used the survey research method and involved 48 visiting scholars from Northwest Normal University in China in those eight ITPP cohorts. The results of both quantitative and qualitative data were critically examined and indicated both types of data sources revealed similar findings. It was found that the ITPP has significantly affected all scholars' instruction in China. International implications resulted from the study.

Keywords: international training program in pedagogy, visiting scholars, survey research method, International implications

Procedia PDF Downloads 214
5909 Reviews of Chief Complaints and Treatments [in an Early Street Medicine Program]

Authors: A. Hoppe, T. Kagele, B. Hall, A. Nichols, B. Messner

Abstract:

The Spokane Street Medicine (SSM) Program aims to deliver medical care to members of Spokane, Washington, experiencing homelessness. Street medicine is designed to function in a non-traditional setting to help deliver healthcare to the underserved homeless population. In this analysis, clinical charts from street and shelter encounters made by the Spokane Street Medicine Program in early 2021 were reviewed in order to better understand the healthcare inequities prevalent among people experiencing homelessness in Spokane, WA. Pain, wound-care, and follow-up efforts were predominant concerns among the homeless population. More than half of the conditions addressed were acute, and almost a quarter of all chief complaints involved chronic unmanaged conditions. This analysis gives reason for the priorities of the SSM Program to be focused on pain, wound-care, and follow-up efforts. Understanding the specific medical needs of this population will allow for better resource allocation and improved health outcomes among people experiencing homelessness.

Keywords: equity issues in public health, health disparities, health services accessibility, medical public health, street medicine

Procedia PDF Downloads 192
5908 Slums in Casablanca: A Conceptive Approach for Better Implementation of VSB Program, Case Study: ER-Hamna Slum

Authors: Sakina Boufarsi, Mehmet Emre Aysu, Behiye Isik Aksulu

Abstract:

Morocco appears to be on its way to eradicating all of the country's slums by assuring the resettlement and improvement of all affected households' living circumstances through the VSB “Villes sans Bidonvilles” program established in 2004 to eradicate the slums in Morocco. Although many attempts have been made to curb their growth none have proven to be a permanent accomplishment. In Morocco, resettlement projects through satellite towns are perceived as the answer to the problem of the slums. However, the new satellite towns are the good intention of the program VSB, but they are environmentally unsustainable, socially isolated and culturally inappropriate, such conditions imposed continuous readjustments of the slum upgrading program. Although slum research is ongoing, they primarily concentrated on two constructs: exploring socio-economic and policy problems and analyzing physical characteristics. Considering that the two constructs mentioned are crucial, this study will demonstrate that a more systematic approach is needed to eradicate them efficiently. The slums issues in Casablanca are a solution that the poor devise for themselves due to government bureaucracy and failing housing policies, they reflect governments' incapacity to respond to urban development’s requiring decent housing for the vulnerable population. This issue will be addressed by exploring the previous strategies and analyzing in detail the strengths and shortcomings of the recent VSB Program. In addition to a comprehensive overview of the slums' situations by combining the social and physical characteristics through Erhamna case study in Sidi Moumen district for a deeper understanding, and therefore to direct improved and valuable recommendations to address the slum problem at all levels.

Keywords: Casablanca slums, resettlement projects, eradication of slums, satellite town, VSB program

Procedia PDF Downloads 185
5907 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case

Authors: Azin Karami, Bahareh Heydari

Abstract:

There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.

Keywords: human rights, human security, national sovereignty, irregular immigrants

Procedia PDF Downloads 185
5906 Development of Infertility Prevention Psycho-Education Program for University Students and Evaluation of Its Effectiveness

Authors: Digdem M. Siyez, Bariscan Ozturk, Erol Esen, Ender Siyez, Yelda Kagnici, Bahar Baran

Abstract:

Infertility is a reproductive disease identified with the absence of pregnancy after regular unprotected sexual intercourse that has been lasting for 12 months or more. Some of the factors that cause infertility, which has been considered as a social and societal issue since the first days of the humankind, are preventable. These are veneral diseases, age, the frequency of the intercourse and its timing, drug use, bodyweight, environmental and professional conditions. Having actual information about the reproductive health is essential to take protective and preventive measures, and it is accepted as the most effective way to reduce the rate of infertility. However, during the literature review, it has been observed that there are so few studies that focus on the prevention of the infertility. The aim of this study is to develop a psycho-education program to reduce infertility among university students and also to evaluate the program’s effectiveness. It is believed that this program will increase the information level about infertility among the university students, help them to adopt healthy attitudes, develop life skills, create awareness about the risk factors and also contribute to the literature. Throughout the study, first, the contents of sexual/reproductive health programs developed for university students were examined by the researches. Besides, “Views about Reproductive Health Psycho-education Program Survey” was developed and applied to 10221 university students from 21 universities. In accordance with the literature and the university students’ views about reproductive health psycho-education program consisting of 9 sessions each of which lasts for 90 minutes was developed. The pilot program was carried out with 16 volunteer undergraduate students attending to a state university. During the evaluation of the pilot study, at the end of each session “Session Evaluation Form” and at the end of the entire program “Program Evaluation Form” were administered to the participants. Besides, one week after the end of the program, a focus group with half of the group, and individual interviews with the rest were conducted. Based on the evaluations, it was determined that the session duration is enough, the teaching methods meet the expectation, the techniques applied are appropriate and clear, and the materials are adequate. Also, an extra session was added to psycho-education program based on the feedbacks of the participants. In order to evaluate program’s effectiveness, Solomon control group design will be used. According to this design, the research has 2 experiment groups and 2 control groups. The participants who voluntarily participated in the research after the announcement of the psycho-education program were divided into experiment and control groups. In the experiment 1 and control 1 groups, “Personal Information Test”, “Infertility Information Test” and “Infertility Attitude Scale”, “Self Identification Inventory” and “Melbourne Decision Scale” were administered as a preliminary test. Currently, at the present stage, psycho-education still continues. After this 10-week program, the same tests will be administered again as the post-tests. The decision upon which statistical method will be applied in the analysis will be made afterwards according to whether the data meets the presuppositions or not.

Keywords: infertility, prevention, psycho-education, reproductive health

Procedia PDF Downloads 235
5905 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 132
5904 Tablet Computer Based Cognitive Rehabilitation Program, Injini, for Children with Cognitive Impairment

Authors: Eun Jae Ko, In Young Sung, Eui Soo Joeng

Abstract:

Cognitive impairment is commonly encountered problem in children with various clinical diseases, including Down syndrome, autism spectrum disorder, brain injury, and others. Cognitive impairment limits participation in education and society, and this further hinders development in cognition. However, young children with cognitive impairment tend not to respond well to traditional cognitive treatments, therefore alternative treatment choices are need. As a cognitive training program, touch screen technology can easily be applied to very young children by involving visual and auditory support. Injini was developed as tablet computer based cognitive rehabilitation program for young children or individuals with severe cognitive impairment, which targeted on cognitive ages of 18 to 36 months. The aim of this study was to evaluate the efficacy of a tablet computer based cognitive rehabilitation program (Injini) for children with cognitive impairment. 38 children between cognitive ages of 18 to 36 months confirmed by cognitive evaluations were recruited and randomly assigned to the intervention group (n=20) and the control group (n=18). The intervention group received tablet computer based cognitive rehabilitation program (Injini) for 30 minutes per session, twice a week, over a period of 12 weeks, in addition to the traditional rehabilitation program. The control group received traditional rehabilitation program only. Mental score of Bayley Scales of Infant Development II (BSID II), Pediatric Evaluation of Disability Inventory (PEDI), Laboratory Temperament Assessment Battery (Lab-TAB), Early Childhood Behavior Questionnaire (ECBQ), and Goal Attainment Scale (GAS) were evaluated before and after 12 weeks of therapeutic intervention. When comparing the baseline characteristics, there was no significant difference between the two groups in the measurements of cognitive function. After 12 weeks of treatment, both group showed improvements in all measurements. However, in comparison of improvements after treatment, the intervention group showed more improvements in the mental score of BSID II, social function domain of PEDI, observation domain of Lab-TAB, and GAS, as compared to the control group. Application of the tablet computer based cognitive rehabilitation program (Injini) would be beneficial for improvement of cognitive function in young children with cognitive impairment.

Keywords: cognitive therapy, computer-assisted therapy, early intervention, tablets

Procedia PDF Downloads 288
5903 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture

Authors: Mirad Böhm, Diede De Kok

Abstract:

It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.

Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder

Procedia PDF Downloads 333
5902 The Effect of 'Teachers Teaching Teachers' Professional Development Course on Teachers’ Achievement and Classroom Practices

Authors: Nuri Balta, Ali Eryilmaz

Abstract:

High-quality teachers are the key to improve student learning. Without a professional development of the teachers, the improvement of student success is difficult and incomplete. This study offers an in-service training course model for professional development of teachers (PD) entitled "teachers teaching teachers" (TTT). The basic premise of the PD program, designed for this study, was primarily aimed to increase the subject matter knowledge of high school physics teachers. The TTT course (the three hour long workshops), organized for this study, lasted for seven weeks with seventeen teachers took part in the TTT program at different amounts. In this study, the effect of the TTT program on teachers’ knowledge improvement was searched through the modern physics unit (MPU). The participating teachers taught the unit to one of their grade ten classes earlier, and they taught another equivalent class two months later. They were observed in their classes both before and after TTT program. The teachers were divided into placebo and the treatment groups. The aim of Solomon four-group design is an attempt to eliminate the possible effect of pre-test. However, in this study the similar design was used to eliminate the effect of pre teaching. The placebo group teachers taught their both classes as regular and the treatment group teachers had TTT program between the two teachings. The class observation results showed that the TTT program increased teachers’ knowledge and skills in teaching MPU. Further, participating in the TTT program caused teachers to teach the MPU in accordance with the requirements of the curriculum. In order to see any change in participating teachers’ success, an achievement test was applied to them. A large effect size (dCohen=.93) was calculated for the effect of TTT program on treatment group teachers’ achievement. The results suggest that staff developers should consider including topics, attractive to teachers, in-service training programs (a) to help teachers’ practice teaching the new topics (b) to increase the participation rate. During the conduction of the TTT courses, it was observed that teachers could not end some discussions and explain some concepts. It is now clear that teachers need support, especially when discussing counterintuitive concepts such as modern physics concepts. For this reason it is recommended that content focused PD programs be conducted at the helm of a scholarly coach.

Keywords: high school physics, in-service training course, modern physics unit, teacher professional development

Procedia PDF Downloads 201
5901 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 388
5900 Environmental Education and Sustainable Development: the Contribution of Eco-Schools Program

Authors: Sara Rute Monteiro Silva Sousa

Abstract:

Since the second half of the 20th century, environmental problems began to generate deep concern around the world. The harmful effects of human's irresponsible actions are increasingly evident, profoundly affecting biodiversity and even human health. Given the seriousness of this human footprint, governments, organizations, and civil society must all be more proactive and adopt more effective measures to solve environmental problems and promote sustainable development. This can be achieved through different tools, namely through a more efficient education that enables current and future generations to meet their needs in an integrated approach to the economic, social, and environmental dimensions of sustainable development. In this context, schools play a key role, being responsible for educating today's students and tomorrow's leaders, decision makers, intellectuals, managers, politicians, employers, and parents. Aware of this crucial role of education and schools, the Foundation for Environmental Education created the Eco-Schools program in 1992, ensuring that schools develop a whole-school approach to environmental and sus-tainable education. This research aims to increase knowledge and information about the efficiency of the Eco-Schools program as a promoter of more sustainable schools and communities. This research study analyses a specific case of a Portuguese higher education institution in the area of management, accounting, and administration. A description, reflection, and discussion are made on some of the main measures implemented in the last academic year of 2021/22 within the scope of the Eco-Schools program, concluding that, despite some implementation difficulties, the program was successfully developed, involving the participation of students, teachers, staff, and outside school community members, being awarded with the Green Flag as a recognition of its key contribution to a more sustainable society.

Keywords: sustainable development, environmental education, eco-schools program, higher education institutions, portugal

Procedia PDF Downloads 240
5899 New Employee on-Boarding Program: Effective Tool for Reducing the Prevalence of Workplace Injuries/Accidents

Authors: U. Ugochukwu, J. Lee, P. Conley

Abstract:

According to a recent survey by the UT Southwestern Workplace Safety Committee, the three most common on-the-job injuries reported by workers at the medical center are musculoskeletal injuries, slip-and-fall injuries and repetitive motion injuries. Last year alone, of the 650 documented workplace injuries and accidents, 45% were seen in employees in their first-two years of employment. UT Southwestern New Employee On-Boarding program was created and modeled to follows OSHA’s model that consist of: determining if training is needed, identifying training needs, identifying goals and objectives, developing learning activities, conducting the training, evaluating program effectiveness, and improving the program. The hospital’s management best practices were recreated to limit and control workplace injuries and accidents. Regular trainings and workshops on workplace safety and compliance were initiated for new employees. Various computer workstations were evaluated and recommendations were made to reduce musculoskeletal disorders. Post exposure protocols and workers protection programs were remodeled for infectious agents and chemicals used in the hospital, and medical surveillance programs were updated, for every emerging threat, to ensure they are in compliance with the US policy, regulatory and standard setting organizations. If ignorance of specific job hazards and of proper work practices is to blame for this higher injury rate, then training will help to provide a solution. Use of this program in training activities is just one of many ways UT Southwestern complied with the OSHA standards that relate to training while enhancing the safety and health of their employees.

Keywords: ergonomics, hazard, on-boarding, surveillance, workplace

Procedia PDF Downloads 335
5898 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 400
5897 Effects of the Gratitude Program on the Gratitude, Well-Being, Perceived Stress, and Stress Coping of Nurses

Authors: Yu H. Chen, Li C. Chen, Hsiang Y. Wu, Wan Y. Chen, Yin S. Lai, Sarah S. Chen

Abstract:

Little has been done to customize an appropriate program on gratitude for nurses, who work in high-stress environments. The purpose of this study is to design an appropriate program on gratitude for nurses and to investigate the effects of the program. Based on research done by Kaohsiung Medical University’s Positive Psychology Center, the only one of its kind in Taiwan, one of the top five strengths of nurses is gratitude. Instead of adapting from an older model created from past research, the Gratitude Workshop is developed from a quasi-experimental approach and designed with five additional dimensions that emphasize gratitude: thanking others, thanking one's surroundings, cherishing what one has, appreciating hardships, and appreciating the present. A sample of 84 nurses was randomly selected from the Kaohsiung Municipal Ta-Tung Hospital; 43 of who participated in the nine-hour Gratitude Workshop that spanned over three weeks, while the other 41 were part of the waitlist control group. The pretest and posttest included five questionnaires: Inventory of Undergraduates' Gratitude, The Gratitude Questionnaire-6, Mental Health Continuum‐Short Form, Perceived Stress Scale, and the Stress Coping Strategies Questionnaire. Results of the research showed that the Gratitude Workshop elevates gratitude, well-being, and perceived stress on the nurses; however, it was also found in the Stress Coping Strategies Questionnaire that the Gratitude Workshop only heightened the regulation of emotions.

Keywords: gratitude, nurses, positive psychology, well-being

Procedia PDF Downloads 389
5896 Stakeholder Engagement to Address Urban Health Systems Gaps for Migrants

Authors: A. Chandra, M. Arthur, L. Mize, A. Pomeroy-Stevens

Abstract:

Background: Lower and middle-income countries (LMICs) in Asia face rapid urbanization resulting in both economic opportunities (the urban advantage) and emerging health challenges. Urban health risks are magnified in informal settlements and include infectious disease outbreaks, inadequate access to health services, and poor air quality. Over the coming years, urban spaces in Asia will face accelerating public health risks related to migration, climate change, and environmental health. These challenges are complex and require multi-sectoral and multi-stakeholder solutions. The Building Health Cities (BHC) program is funded by the United States Agency for International Development (USAID) to work with smart city initiatives in the Asia region. BHC approaches urban health challenges by addressing policies, planning, and services through a health equity lens, with a particular focus on informal settlements and migrant communities. The program works to develop data-driven decision-making, build inclusivity through stakeholder engagement, and facilitate the uptake of appropriate technology. Methodology: The BHC program has partnered with the smart city initiatives of Indore in India, Makassar in Indonesia, and Da Nang in Vietnam. Implementing partners support municipalities to improve health delivery and equity using two key approaches: political economy analysis and participatory systems mapping. Political economy analyses evaluate barriers to collective action, including corruption, security, accountability, and incentives. Systems mapping evaluates community health challenges using a cross-sectoral approach, analyzing the impact of economic, environmental, transport, security, health system, and built environment factors. The mapping exercise draws on the experience and expertise of a diverse cohort of stakeholders, including government officials, municipal service providers, and civil society organizations. Results: Systems mapping and political economy analyses identified significant barriers for health care in migrant populations. In Makassar, migrants are unable to obtain the necessary card that entitles them to subsidized health services. This finding is being used to engage with municipal governments to mitigate the barriers that limit migrant enrollment in the public social health insurance scheme. In Indore, the project identified poor drainage of storm and wastewater in migrant settlements as a cause of poor health. Unsafe and inadequate infrastructure placed residents of these settlements at risk for both waterborne diseases and injuries. The program also evaluated the capacity of urban primary health centers serving migrant communities, identifying challenges related to their hours of service and shortages of health workers. In Da Nang, the systems mapping process has only recently begun, with the formal partnership launched in December 2019. Conclusion: This paper explores lessons learned from BHC’s systems mapping, political economy analyses, and stakeholder engagement approaches. The paper shares progress related to the health of migrants in informal settlements. Case studies feature barriers identified and mitigating steps, including governance actions, taken by local stakeholders in partner cities. The paper includes an update on ongoing progress from Indore and Makassar and experience from the first six months of program implementation from Da Nang.

Keywords: informal settlements, migration, stakeholder engagement mapping, urban health

Procedia PDF Downloads 122
5895 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 411
5894 Multi-Sensory Coding as Intervention Therapy for ESL Spellers with Auditory Processing Delays: A South African Case-Study

Authors: A. Van Staden, N. Purcell

Abstract:

Spelling development is complex and multifaceted and relies on several cognitive-linguistic processes. This paper explored the spelling difficulties of English second language learners with auditory processing delays. This empirical study aims to address these issues by means of an intervention design. Specifically, the objectives are: (a) to develop and implement a multi-sensory spelling program for second language learners with auditory processing difficulties (APD) for a period of 6 months; (b) to assess the efficacy of the multi-sensory spelling program and whether this intervention could significantly improve experimental learners' spelling, phonological awareness, and processing (PA), rapid automatized naming (RAN), working memory (WM), word reading and reading comprehension; and (c) to determine the relationship (or interplay) between these cognitive and linguistic skills (mentioned above), and how they influence spelling development. Forty-four English, second language learners with APD were sampled from one primary school in the Free State province. The learners were randomly assigned to either an experimental (n=22) or control group (n=22). During the implementation of the spelling program, several visual, tactile and kinesthetic exercises, including the utilization of fingerspelling were introduced to support the experimental learners’ (N = 22) spelling development. Post-test results showed the efficacy of the multi-sensory spelling program, with the experimental group who were trained in utilising multi-sensory coding and fingerspelling outperforming learners from the control group on the cognitive-linguistic, spelling and reading measures. The results and efficacy of this multi-sensory spelling program and the utilisation of fingerspelling for hearing second language learners with APD open up innovative perspectives for the prevention and targeted remediation of spelling difficulties.

Keywords: English second language spellers, auditory processing delays, spelling difficulties, multi-sensory intervention program

Procedia PDF Downloads 140
5893 Teaching Religious Education: The Ethics and Religious Culture Program as Case Study for Social Change

Authors: Sabrina N. Jafralie, Arzina Zaver

Abstract:

Responding to religious diversity and the need for social change, the Ethics and Religious Culture (ERC) Program was introduced as a mandatory subject for all students in Quebec, Canada. Now that the Quebec provincial government has announced the end of the ERC program, it time to discuss and assess both challenges and successes in it's implementation especially its impact on social change. Though many studies have been written around the wider concepts of religious education and religious literacy in the public system, few studies have included voices from educators. Jafralie and Zaver's qualitative research study examines the potentials and struggles of the ERC Program, and by doing so, raise important considerations around the effective teaching of.  The findings point to several consistent themes that teachers grapple with in regards to curriculum and pedagogy and highlights that in-service teachers are not thoroughly prepared to teach about ethics and religion, nor are teacher education programs effectively preparing pre-service teachers entering the field to deal with the complexities of teaching about religion or social change in their classrooms. The authors suggest avenues in which teacher education for teachers can look like in order for students and teachers to engage meaningfully with religious diversity and be agents of social change. 

Keywords: Pedagogy, Professional Development, Quebec, Teaching

Procedia PDF Downloads 148
5892 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 339
5891 Physiotherapy Program for Frozen Shoulder Related to Onset of Symptom, Range of Motions and Obtaining Modalities

Authors: Narupon Kunbootsri, P. Sirasaporn

Abstract:

Frozen shoulder is a common problem present by pain and limit range of motion. The prevalence of frozen shoulder showed 18-31% of population. The effect of frozen shoulder lead to limit activities daily living life, high medical care cost and so on. Physiotherapy is one of the treatments for frozen shoulder but there was no data about the treatment of physiotherapy. Moreover, it is question about onset of symptom relate to physiotherapy program and obtaining physical modalities and delayed start physiotherapy program lead to delayed improvement. Thus the aim of this study was to investigate physiotherapy program for frozen shoulder relate to onset of symptom, range of motion and obtaining physical modalities. A retrospective study design was conducted. 182 medical records of patients with frozen shoulder were reviewed. These frozen shoulders were treated at physiotherapy unit, department of Rehabilitation last 3 years (January, 2014- December, 2016). The data consist of onset of symptom, range of motion and obtaining physical modalities were recorded. There was a statistically significant increase in shoulder flexion [mean difference 38.88 with 95%CI were [16.00-61.77], shoulder abduction [mean difference 48.47 with 95%CI were 16.07-90.59], shoulder internal rotation [mean difference 22.36 with 95%CI were 2.81-37.18] and shoulder external rotation [mean difference 32.12 with 95%CI were [(-2.47)-(46.91)]. In addition, the onset of symptom was 76.42±46.90 days. And the physical modalities used frequently were hot pack 14.8% and ultrasound diathermy 13.7%. In conclusion, the physiotherapy program including, hot pack and ultrasound diathermy seem to be useful for frozen shoulder. But onset of symptom is too long to start physiotherapy programs.

Keywords: frozen shoulder, range of motions, onset of symptom, physiotherapy, physical modality

Procedia PDF Downloads 290
5890 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration

Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu

Abstract:

This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.

Keywords: migration, border, security, memory effect

Procedia PDF Downloads 95
5889 A Case Study: Teachers Education Program in a Global Context

Authors: In Hoi Lee, Seong Baeg Kim, Je Eung Jeon, Gwang Yong Choi, Joo Sub Lee, Ik Sang Kim

Abstract:

Recently, the interest of globalization in the field of teacher education has increased. In the U.S., the government is trying to enhance the quality of education through a global approach in education. To do so, the schools in the U.S. are recruiting teachers with global capability from countries like Korea where competent teachers are being trained. Meanwhile, in the case of Korea, although excellent teachers have been cultivated every year, due to a low birth rate it is not easy to become a domestic teacher. To solve the trouble that the two countries are facing, the study first examines the demand and necessity of globalization in the field of teacher education between Korea and the U.S. Second, we propose a new project, called the ‘Global Teachers University (GTU)’ program to satisfy the demands of both countries. Finally, we provide its implications to build the future educational cooperation for teacher training in a global context.

Keywords: educational cooperation, globalization, teachers education program, teacher training institutions

Procedia PDF Downloads 510
5888 Detecting Impact of Allowance Trading Behaviors on Distribution of NOx Emission Reductions under the Clean Air Interstate Rule

Authors: Yuanxiaoyue Yang

Abstract:

Emissions trading, or ‘cap-and-trade', has been long promoted by economists as a more cost-effective pollution control approach than traditional performance standard approaches. While there is a large body of empirical evidence for the overall effectiveness of emissions trading, relatively little attention has been paid to other unintended consequences brought by emissions trading. One important consequence is that cap-and-trade could introduce the risk of creating high-level emission concentrations in areas where emitting facilities purchase a large number of emission allowances, which may cause an unequal distribution of environmental benefits. This study will contribute to the current environmental policy literature by linking trading activity with environmental injustice concerns and empirically analyzing the causal relationship between trading activity and emissions reduction under a cap-and-trade program for the first time. To investigate the potential environmental injustice concern in cap-and-trade, this paper uses a differences-in-differences (DID) with instrumental variable method to identify the causal effect of allowance trading behaviors on emission reduction levels under the clean air interstate rule (CAIR), a cap-and-trade program targeting on the power sector in the eastern US. The major data source is the facility-year level emissions and allowance transaction data collected from US EPA air market databases. While polluting facilities from CAIR are the treatment group under our DID identification, we use non-CAIR facilities from the Acid Rain Program - another NOx control program without a trading scheme – as the control group. To isolate the causal effects of trading behaviors on emissions reduction, we also use eligibility for CAIR participation as the instrumental variable. The DID results indicate that the CAIR program was able to reduce NOx emissions from affected facilities by about 10% more than facilities who did not participate in the CAIR program. Therefore, CAIR achieves excellent overall performance in emissions reduction. The IV regression results also indicate that compared with non-CAIR facilities, purchasing emission permits still decreases a CAIR participating facility’s emissions level significantly. This result implies that even buyers under the cap-and-trade program have achieved a great amount of emissions reduction. Therefore, we conclude little evidence of environmental injustice from the CAIR program.

Keywords: air pollution, cap-and-trade, emissions trading, environmental justice

Procedia PDF Downloads 157
5887 Applications of Multi-Path Futures Analyses for Homeland Security Assessments

Authors: John Hardy

Abstract:

A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.

Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning

Procedia PDF Downloads 139
5886 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 80
5885 The Utility and the Consequences of Counter Terrorism Financing

Authors: Fatemah Alzubairi

Abstract:

Terrorism financing is a theme that dramatically evolved post-9/11. Supra-national bodies, above all UN Security Council and the Financial Action Task Form (FATF), have established an executive-like mechanism, which allows blacklisting individuals and groups, freezing their funds, and restricting their travel, all of which have become part of states’ anti-terrorism frameworks. A number of problems arise from building counter-terrorism measures on the foundation of a vague definition of terrorism. This paper examines the utility and consequences of counter-terrorism financing with considering the lack of an international definition of terrorism. The main problem with national and international anti-terrorism legislation is the lack of a clear objective definition of terrorism. Most, if not all, national laws are broad and vague. Determining what terrorism remains the crucial underpinning of any successful discussion of counter-terrorism, and of the future success of counter-terrorist measures. This paper focuses on the legal and political consequences of equalizing the treatment of violent terrorist crimes, such as bombing, with non-violent terrorism-related crimes, such as funding terrorist groups. While both sorts of acts requires criminalization, treating them equally risks wrongfully or unfairly condemning innocent people who have associated with “terrorists” but are not involved in terrorist activities. This paper examines whether global obligations to counter terrorism financing focus on controlling terrorist groups more than terrorist activities. It also examines the utility of the obligations adopted by the UN Security Council and FATF, and whether they serve global security; or whether the utility is largely restricted to Western security, with little attention paid to the unique needs and demands of other regions.

Keywords: counter-terrorism, definition of terrorism, FATF, security, terrorism financing, UN Security Council

Procedia PDF Downloads 328
5884 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm

Authors: Fairouz Beggas

Abstract:

Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.

Keywords: arabic data, encryption, playfair, symmetric algorithm

Procedia PDF Downloads 92
5883 Games behind Bars: A Longitudinal Study of Inmates Pro-Social Preferences

Authors: Mario A. Maggioni, Domenico Rossignoli, Simona Beretta, Sara Balestri

Abstract:

The paper presents the results of a Longitudinal Randomized Control Trial implemented in 2016 two State Prisons in California (USA). The subjects were randomly assigned to a 10-months program (GRIP, Guiding Rage Into Power) aiming at undoing the destructive behavioral patterns that lead to criminal actions by raising the individual’s 'mindfulness'. This study tests whether the participation to this program (treatment), based on strong relationships and mutual help, affects pro-social behavior of participants, in particular with reference to trust and inequality aversion. The research protocol entails the administration of two questionnaires including a set of behavioral situations ('games') - widely used in the relevant literature in the field - to 80 inmates, 42 treated (enrolled in the program) and 38 controls. The first questionnaire has been administered before treatment and randomization took place; the second questionnaire at the end of the program. The results of a Difference-in-Differences estimation procedure, show that trust significantly increases GRIP participants to compared to the control group. The result is robust to alternative estimation techniques and to the inclusion of a set of covariates to further control for idiosyncratic characteristics of the prisoners.

Keywords: behavioral economics, difference in differences, longitudinal study, pro-social preferences

Procedia PDF Downloads 398
5882 Prevention of Road Accidents by Computerized Drowsiness Detection System

Authors: Ujjal Chattaraj, P. C. Dasbebartta, S. Bhuyan

Abstract:

This paper aims to propose a method to detect the action of the driver’s eyes, using the concept of face detection. There are three major key contributing methods which can rapidly process the framework of the facial image and hence produce results which further can program the reactions of the vehicles as pre-programmed for the traffic safety. This paper compares and analyses the methods on the basis of their reaction time and their ability to deal with fluctuating images of the driver. The program used in this study is simple and efficient, built using the AdaBoost learning algorithm. Through this program, the system would be able to discard background regions and focus on the face-like regions. The results are analyzed on a common computer which makes it feasible for the end users. The application domain of this experiment is quite wide, such as detection of drowsiness or influence of alcohols in drivers or detection for the case of identification.

Keywords: AdaBoost learning algorithm, face detection, framework, traffic safety

Procedia PDF Downloads 158