Search results for: cyber security education
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9823

Search results for: cyber security education

9163 Quality and Quantity in the Strategic Network of Higher Education Institutions

Authors: Juha Kettunen

Abstract:

The study analyzes the quality and the size of the strategic network of higher education institutions and the concept of fitness for purpose in quality assurance. It also analyses the transaction costs of networking that have consequences on the number of members in the network. Empirical evidence is presented from the Consortium on Applied Research and Professional Education, which is a European strategic network of six higher education institutions. The results of the study support the argument that the number of members in the strategic network should be relatively small to provide high-quality results. The practical importance is that networking has been able to promote international research and development projects. The results of this study are important for those who want to design and improve international networks in higher education.

Keywords: higher education, network, research and development, strategic management

Procedia PDF Downloads 338
9162 Gender, Tutoring, and Track in Egyptian Education

Authors: Eman Shady, Ray Langsten

Abstract:

In Egypt, girls have traditionally been educationally disadvantaged. This disadvantage, however, has been focused on the failure to enter school. Increasingly it is recognized that girls who ever-enroll are at least as likely to complete primary and secondary education as boys. Still the belief persists that girls, especially those from poor families, will be disadvantaged in terms of school expenditures and the transitions to secondary and higher education. We use data from the 2005-06 Egypt Household Education Survey to examine expenditures on tutoring during the final year of preparatory school, and the transition to specific tracks of secondary education. Tests during the last year of preparatory largely determine a student’s educational future. Results show that girls, even girls from poor families, are not disadvantaged in terms of expenditures, whether for tutoring, fees or general expenses. Moreover, girls are more likely than boys to advance to general secondary education, the track that leads to higher education.

Keywords: gender, tutoring, track, Egypt

Procedia PDF Downloads 381
9161 Increasing Health Education Tools Satisfaction in Nursing Staffs

Authors: Lu Yu Jyun

Abstract:

Background: Health education is important nursing work aiming to strengthen patients’ self-caring ability and family members. Our department educates through three methods, including speech education, flyer and demonstration video education. The satisfaction rate of health education tool use is 54.3% in nursing staff. The main reason is there hadn’t been a storage area for flyers, causing extra workload in assessing flyers. The satisfaction rate of health education in patients and families is 70.7%. We aim to improve this situation between 13th April and 6th June 2021. Method: We introduce the ECRS method to erase repetitive and redundant actions. We redesign the health education tool usage workflow to improve nursing staffs’ efficiency and further enhance nursing staffs care quality and working satisfaction. Result: The satisfaction rate of health education tool usage in nursing staff elevated from 54.3% to 92.5%. The satisfaction rate of health education in patients and families elevated from 70.7% to 90.2%. Conclusion: The assessment time of health care tools dropped from 10minutes to 3minutes. This significantly reduced the nursing staffs’ workload. 1213 paper is saved in one month and 14,556 a year in the estimate; we save the environment via this action. Health education map implemented in other nursing departments since October due to its’ high efficiency and makes health care tools more humanize.

Keywords: health, education tools, satisfaction, nursing staff

Procedia PDF Downloads 141
9160 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications

Authors: Chieh-Fu Chang, Wan-Hsin Hsieh

Abstract:

We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.

Keywords: security, IWE, cliff effect, space communications

Procedia PDF Downloads 416
9159 Analyzing the Attitudes of Prep-Class Students at Higher Education towards Computer-Based Foreign Language Education

Authors: Sakine Sincer

Abstract:

In today’s world, the borders between countries and globalization are getting faster. It is an undeniable fact that this trend mostly results from the developments and improvements in technology. Technology, which dominates our lives to a great extent, has turned out to be one of the most important resources to be used in building an effective and fruitful educational atmosphere. Nowadays, technology is a significant means of arranging educational activities at all levels of education such as primary, secondary or tertiary education. This study aims at analyzing the attitudes of prep-class students towards computer-based foreign language education. Within the scope of this study, prep-class students at a university in Ankara, Turkey in 2013-2014 Academic Year participated in this study. The participants were asked to fill in 'Computer-Based Educational Attitude Scale.' The data gathered in this study were analyzed by means of using statistical devices such as means, standard deviation, percentage as well as t-test and ANOVA. At the end of the analysis, it was found out that the participants had a highly positive attitude towards computer-based language education.

Keywords: computer-based education, foreign language education, higher education, prep-class

Procedia PDF Downloads 428
9158 Prevention of Ragging and Sexual Gender Based Violence (SGBV) in Higher Education Institutions in Sri Lanka

Authors: Anusha Edirisinghe

Abstract:

Sexual Gender based violence is a most common social phenomenon in higher education institutions. It has become a hidden crime of the Universities. Masculinities norms and attitudes are more influential and serve as key drivers and risk for ragging and SGBV. This research will reveal that in Sri Lankan universities, SGBV takes from the violence and murder of women students, assault and battery coerced sex, sexual harassment including harassment via information technology. This study focus is to prevention of ragging and SGBV in University system. Main objective of this paper describes and critically analyses of plight of ragging and SGBV in higher education institutions and legal and national level policy implementation to prevent these crimes in society. This paper is with special reference to ragging case from University of Kelaniya 2016. University Grant commission introduced an Act for the prevention of Ragging and gender standing committee established in Sri Lanka in 2016. And each university has been involved in the prevention of SGBV and ragging in higher education institutions. Case study from first year female student, reported sexual harassment was reported to the police station in May in 2016. After this case, the university has been implementing emergency action plan, short term and long term action plan. Ragging and SGBV task force was established and online complaint center opened to all students and academic and non- academics. Under these circumstances student complained to SGBV and other harassment to the university. University security system was strong support with police and marshals, and vigilant committees including lecturers. After this case all universities start to several programmes to stop violence in university

Keywords: higher Education, ragging, sexual gender-based violence, Sri Lanka

Procedia PDF Downloads 375
9157 Pedagogical Tools In The 21st Century

Authors: M. Aherrahrou

Abstract:

Moroccan education is currently facing many difficulties and problems due to traditional methods of teaching. Neuro -Linguistic Programming (NLP) appears to hold much potential for education at all levels. In this paper, the major aim is to explore the effect of certain Neuro -Linguistic Programming techniques in one educational institution in Morocco. Quantitative and Qualitative methods are used. The findings prove the effectiveness of this new approach regarding Moroccan education, and it is a promising tool to improve the quality of learning.

Keywords: learning and teaching environment, Neuro- Linguistic Programming, education, quality of learning

Procedia PDF Downloads 350
9156 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income

Authors: M. Koray Cetin, Mehmet Mert

Abstract:

The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.

Keywords: exchange rate, panel data analysis, security, tourism revenues

Procedia PDF Downloads 344
9155 A Quantitative Study on the Effects of School Development on Character Development

Authors: Merve Gücen

Abstract:

One of the aims of education is to educate individuals who have embraced universal moral principles and transform universal moral principles into moral values. Character education aims to educate behaviors of individuals in their mental activities to transform moral principles into moral values in their lives. As the result of this education, individuals are expected to develop positive character traits and become morally indifferent individuals. What are the characteristics of the factors that influence character education at this stage? How should character education help individuals develop positive character traits? Which methods are more effective? These questions come to mind when studying character education. Our research was developed within the framework of these questions. The aim of our study is to provide the most effective use of the education factor that affects character. In this context, we tried to explain character definition, character development, character education and the factors affecting character education using qualitative research methods. At this stage, character education programs applied in various countries were examined and a character education program consisting of Islamic values was prepared and implemented in an International Imam Hatip High School in Istanbul. Our application was carried out with the collaboration of school and families. Various seminars were organized in the school and participation of families was ensured. In the last phase of our study, we worked with the students and their families on the effectiveness of the events held during the program. In this study, it was found that activities such as storytelling and theater in character education programs were effective in recognizing wrong behaviors in individuals. It was determined that our program had a positive effect on the quality of education. It was seen that applications of this educational program affected the behavior of the employees in the educational institution.

Keywords: character development, family activities, values education, education program

Procedia PDF Downloads 164
9154 The Efficacy of Psycho-Education in Improving the Emotional Well-Being of Visually Impaired Adolescents in Nigeria

Authors: Janet Tolulope Olaseni

Abstract:

Emotional well-being in adolescents is an important psychological factor that can enhance positive living, but if it is not well groomed, it can have adverse impacts on their development. Therefore, the present study examined the efficacy of psycho-education on the emotional well-being of adolescents who are visually impaired in Nigeria. A total of twenty-eight (28) participants, which comprisednineteen (19) males and nine (9) females (M=15.82, SD=2.23) from a Nigerian School for the Blind, participated in the quasi-experimental study. Randomized clinical trial designwas used to assigned the participants into three (Complete Psycho-education, Incomplete Psycho-education, and No Psycho-education) groups. Standardized scales were used to gather data from the respondents. The formulated hypotheses were tested using Dependent T-Test and Analysis of Co-Variance. The results showed that there was a significant effect of Psycho-education on the emotional well-being of the Visually Impaired Adolescents. Those who received complete Psycho-educationhad the highest level of emotional well-being compared to those in the other groups. In order to enhance the emotional well-being of the Visually Impaired Adolescents, the study recommended that complete Psycho-education programme should be incorporated into the school activities of the Visually Impaired Adolescents.

Keywords: emotional well-being, psycho-education, visually impaired adolescents, Nigeria

Procedia PDF Downloads 99
9153 The Relations among Business Model, Higher Education, University and Entrepreneurship Education: An Analysis of Academic Literature of 2009-2019 Period

Authors: Elzo Alves Aranha, Marcio M. Araki

Abstract:

Business model (BM) is a term that has been receiving the attention of scholars and practitioners and has been consolidating itself as a field of study and research. Although there is no agreement in the academic literature on the definition of BM, at least there is an explicit agreement: BM defines a logical structure of how an organization creates value, capture value and delivers value for the customers and stakeholders. The lack of understanding about connections and elements among BM and higher education, university, and entrepreneurship education opens a gap in the academic literature. Thus, it is interesting to analyze how BM has been approached by the literature and applied in higher education, university, and entrepreneurship education aimed to know the main streams of research. This is because higher education institutions are characterized by innovation, leading to a greater acceptance of new and modern concepts such as BM. Our research has the main motivation to fill the gap in the academic literature, making it possible to increase the power of understanding about connections and aspects among BM and higher education, university, and entrepreneurship education. The objective of the research is to analyze the main aspects among BM and higher education, university, and entrepreneurship education in academic literature. The research followed the systematic literature review (SLR). The SLR is based on three main factors: clarity, validity, and auditability. 82 academic papers were found in the past 10 years, from 2009-2019. The search was carried out in Science Direct and Periodicos Capes databases. The main findings indicate that there are links between BM and higher education, BM and university, BM, and entrepreneurship education. The main findings are inserted within seven aspects. The findings are innovative and contribute to increase the power of understanding about the connection among BM and higher education, university, and entrepreneurship education in academic literature. The research findings addressed to the gap exposed in academic literature. The research findings have several practical implications, and we highlight only two main ones. First, researchers will be able to use the research findings to mitigate a BM research agenda involving connections between BM and higher education, BM and university, and BM and entrepreneurship education. Second, directors, deans, and university leaders will be able to carry out BM awareness programs, BM professors training programs, and makers planning for the inclusion of BM, as one of the components of the curricula of the undergraduate and graduate courses.

Keywords: business model, entrepreneurship education, higher education, university

Procedia PDF Downloads 173
9152 Effects of Merging Personal and Social Responsibility with Sports Education Model on Students' Game Performance and Responsibility

Authors: Yi-Hsiang Pan, Chen-Hui Huang, Wei-Ting Hsu

Abstract:

The purposes of the study were to understand these topics as follows: 1. To explore the effect of merging teaching personal and social responsibility (TPSR) with sports education model on students' game performance and responsibility. 2. To explore the effect of sports education model on students' game performance and responsibility. 3. To compare the difference between "merging TPSR with sports education model" and "sports education model" on students' game performance and responsibility. The participants include three high school physical education teachers and six physical education classes. Every teacher teaches an experimental group and a control group. The participants had 121 students, including 65 students in the experimental group and 56 students in the control group. The research methods had game performance assessment, questionnaire investigation, interview, focus group meeting. The research instruments include personal and social responsibility questionnaire and game performance assessment instrument. Paired t-test test and MANCOVA were used to test the difference between "merging TPSR with sports education model" and "sports education model" on students' learning performance. 1) "Merging TPSR with sports education model" showed significant improvements in students' game performance, and responsibilities with self-direction, helping others, cooperation. 2) "Sports education model" also had significant improvements in students' game performance, and responsibilities with effort, self-direction, helping others. 3.) There was no significant difference in game performance and responsibilities between "merging TPSR with sports education model" and "sports education model". 4)."Merging TPSR with sports education model" significantly improve learning atmosphere and peer relationships, it may be developed in the physical education curriculum. The conclusions were as follows: Both "Merging TPSR with sports education model" and "sports education model" can help improve students' responsibility and game performance. However, "Merging TPSR with sports education model" can reduce the competitive atmosphere in highly intensive games between students. The curricular projects of hybrid TPSR-Sport Education model is a good approach for moral character education.

Keywords: curriculum and teaching model, sports self-efficacy, sport enthusiastic, character education

Procedia PDF Downloads 310
9151 Integrated Approach of Knowledge Economy and Society in the Perspective of Higher Education Institutions

Authors: S. K. Ashiquer Rahman

Abstract:

Innovation, sustainability, and higher education are vital issues of the knowledge economy and society. In fact, the concentration on these issues, educators and researchers convinced the learners to prepare productive citizens for the knowledge economy and society, and many initiatives have been launched worldwide. The concept of a knowledge economy requires simultaneous and balanced progress in three dimensions (Innovation, Education and Sustainability) which are totally interdependent and correlated. The paper discusses the importance of an integrated approach to the knowledge economy and society from the perspective of higher education institutions. It remarks on the advent of a knowledge-based economy and society and the need for the combination of Innovation, sustainability, and education. This paper introduces nine (9) important issues or challenges of higher education institutions that have emphasized, cross-linked each other, and combined in a new education system that can form a new generation for the completive world as well as able to manage the knowledge-based economy and societal system. Moreover, the education system must be the foundation for building the necessary knowledge-based economy and society, which must manage the innovation process through a more sustainable world. In this viewpoint, Innovation, sustainability and higher education are becoming more and more central in our economy and society, and it is directly associated with the possibility of global wealth distribution to the economy and society. The objective of this research is to demonstrate the knowledge-based economy and social paradigm in order to create the opportunity for higher education institutions' development. The paper uses the collective action methodologies to examine “the mechanisms and strategies” used by higher education institutions’ authority to accommodate an integrated pattern as per connecting behaviors of knowledge economy and society. The paper accomplishes that the combination of Innovation, sustainability and education is a very helpful approach to building a knowledge-based economy and society for practicing the higher education institution’s challenges.

Keywords: education, innovation, knowledge economy, sustainability

Procedia PDF Downloads 95
9150 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 372
9149 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 82
9148 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment

Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 458
9147 Labor Welfare and Social Security

Authors: Shoaib Alvi

Abstract:

Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.

Keywords: labor welfare, internal social responsibility, social security, international conventions

Procedia PDF Downloads 565
9146 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 237
9145 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures

Authors: Zeinab Ranjbar

Abstract:

Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.

Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security

Procedia PDF Downloads 375
9144 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 142
9143 Cooperative Jamming for Implantable Medical Device Security

Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed

Abstract:

Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.

Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing

Procedia PDF Downloads 101
9142 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria

Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba

Abstract:

As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.

Keywords: food, accessibility, availability, security

Procedia PDF Downloads 366
9141 Data-Driven Decision Making: Justification of Not Leaving Class without It

Authors: Denise Hexom, Judith Menoher

Abstract:

Teachers and administrators across America are being asked to use data and hard evidence to inform practice as they begin the task of implementing Common Core State Standards. Yet, the courses they are taking in schools of education are not preparing teachers or principals to understand the data-driven decision making (DDDM) process nor to utilize data in a much more sophisticated fashion. DDDM has been around for quite some time, however, it has only recently become systematically and consistently applied in the field of education. This paper discusses the theoretical framework of DDDM; empirical evidence supporting the effectiveness of DDDM; a process a department in a school of education has utilized to implement DDDM; and recommendations to other schools of education who attempt to implement DDDM in their decision-making processes and in their students’ coursework.

Keywords: data-driven decision making, institute of higher education, special education, continuous improvement

Procedia PDF Downloads 379
9140 Quality Education as a Tool for Global Poverty Alleviation

Authors: Ibrahim Auwalu

Abstract:

The main thrust of this paper is the examination of Quality Education as opposed to low level knowledge acquisition in the promotion of quality of life, health, individual and national growth and development. The paper reviews the role education plays in developed, developing and third world economies. It further explores the real meaning of poverty in the context it exists. That is poverty in terms of its dimensions– shortened lives, illiteracy, social exclusion and lack of material means to improve family circumstances. The paper concludes that education not only helps individuals escape poverty by developing the skills needed to improve their livelihoods, but also generates productivity gains that fuel economic growth.

Keywords: quality, education, global, poverty alleviation

Procedia PDF Downloads 317
9139 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 111
9138 Lines for a Different Approach in Music Education: A Review of the Concept of Musicality

Authors: Emmanuel Carlos De Mata Castrejón

Abstract:

Music education has shown to be connected to many areas of sciences and arts, it has also been associated with several facets of human life. The many aspects around the study of music and education, make very difficult for the music educator to find a way through, even though there are lots of methods of teaching music to young children, they are different between one another and so are the students. For the music to help improve children’s development, it is necessary for the children to explore their musicality as they explore their creativity; it must be a challenging, playful, and enjoyable activity. The purpose of this investigation is to focus the music education not in the music, nor the teaching, but the children to be guided through their own musicality. The first approach to this kind of music education comes from the Active learning methods during the nineteenth century, most of which are still used around the world, sometimes with modifications to fit a certain place or type of students. This approach on children’s musicality requires some knowledge of music, pedagogy, and developmental psychology at least, but more important than the theory or the method used for music education, the focus should be on developing the student’s musicality, considering the complexity of this concept. To get this, it is needed, indeed, far more research in the topic, so this is a call for collaborative research and for interdisciplinary teams to emerge. This is a review of authors and methods in music education trying to trace a line pointing to transdisciplinary work and pursuing the development of children’s musicality.

Keywords: children, methods, music education, musicality

Procedia PDF Downloads 327
9137 Data Security in Cloud Storage

Authors: Amir Rashid

Abstract:

Today is the world of innovation and Cloud Computing is becoming a day to day technology with every passing day offering remarkable services and features on the go with rapid elasticity. This platform took business computing into an innovative dimension where clients interact and operate through service provider web portals. Initially, the trust relationship between client and service provider remained a big question but with the invention of several cryptographic paradigms, it is becoming common in everyday business. This research work proposes a solution for building a cloud storage service with respect to Data Security addressing public cloud infrastructure where the trust relationship matters a lot between client and service provider. For the great satisfaction of client regarding high-end Data Security, this research paper propose a layer of cryptographic primitives combining several architectures in order to achieve the goal. A survey has been conducted to determine the benefits for such an architecture would provide to both clients/service providers and recent developments in cryptography specifically by cloud storage.

Keywords: data security in cloud computing, cloud storage architecture, cryptographic developments, token key

Procedia PDF Downloads 287
9136 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance

Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz

Abstract:

The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.

Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor

Procedia PDF Downloads 62
9135 Critical Pedagogy in the Philippine K-12 Grade 8 Values Education Curriculum and Textbook

Authors: Raymon Maac, Michael Arthus Muega, Joyce Ann Calingasan, Elva Maureen Gorospe

Abstract:

Critical pedagogy is known for its advocacy of humanistic and liberating education. Its far-reaching approach helps students to understand and analyze their own situations and the realities happening in their society. However, this pedagogy together with its promising features is not well-known in the Philippines. This paper determines the place of critical pedagogy in the new values education curriculum and analyzes its features in the K-12 Values Education curriculum and textbook. The study examines the position of critical pedagogy in the Philippine K-12 Values Education curriculum by closely studying and comparing their features; and scrutinizes the Grade 8 Values Education textbook specifically modules 4, 8, 10 and 13 which comprises 25% of the total 16 modules. The said modules are concerned with the role of the family in the preservation of social justice, which is one of the objectives of critical pedagogy. The findings in this research were based on the pieces of evidence gathered from the curriculum and textbook itself. Based on the evaluation done, the study found out that the ideas of critical pedagogy were the same with that of the objectives of K-12 Values Education Curriculum. Due to this, values education teachers can utilize critical pedagogy in their subject. In addition, the K-12 Values Education curriculum exhibits some of the features of critical pedagogy such as authentic student empowerment and critical thinking. Lastly, some features of critical pedagogy are also evident in some of the general parts and recommended activities in the K-12 Values Education textbook while other activities need to be fully developed by both teacher and students to reflect the genuine critical pedagogy.

Keywords: authentic student empowerment, critical pedagogy, critical thinking, liberating education

Procedia PDF Downloads 337
9134 Status of Hospitality and Tourism Management Progam of Selected Private Higher Education Institutions: Basis for Internationalization

Authors: Ruth Estrada Javier - Reyes

Abstract:

The study assessed the status of HTM program of selected private higher education institutions for internationalization across the eleven regions of the country. The descriptive survey method of research was used in this study. A devised survey questionnaire was utilized to gather information about the status of Philippine Higher Education Institutions’ internationalization of hospitality and tourism management education programs. The respondents were 12 administrators, 17 deans and program heads, 104 faculty members and 860 HTM students. Frequency, percentage, mean, standard deviation, t-test and F-test were used to treat the data. The results of the study are as follows: HEIs’ HTM education had complied with the policies/standards of CHED as per CMO No. 30 S. 2006. The respondents of the HTM education program were qualified for internationalization as assessed both by administrators and faculty. The private HEIs are ready to apply for international certification of their HTM education programs. The curriculum of HTM education programs in private HEIs are enriched by internationalization requirements. The administrators and faculty of HTM education programs are qualified educators but have limited participation in collaborative international research and linkages. The HEIs are qualified to apply for the internationalization of the Hospitality and Tourism Management education program in preparation to the ASEAN 2015.

Keywords: status, Hospitality and Tourism Management Program, internationalization, Private Higher Education Institutions

Procedia PDF Downloads 410