Search results for: Arabic Fodio Nigeria security
4679 Assessing EU-China Security Interests from Contradiction to Convergence
Authors: Julia Gurol
Abstract:
Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security
Procedia PDF Downloads 2854678 Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla
Authors: Marco Antonio Lara De la Calleja, María Catalina Ovando Chico, Eduardo Lopez Ruiz
Abstract:
Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security.Keywords: community empowerment, food security, model, systemic approach
Procedia PDF Downloads 3724677 At the Crossroads of Education and Human Rights for Girls and Women in Nigeria: The Language Perspective
Authors: Crescentia Ugwuona
Abstract:
Appropriate language use has been central and critical in advancing education and human rights for women and girls in many countries the world over. Unfortunately, these lofty aims have often been violated by rural Igbo-Nigerians as they use stereotyping and dehumansing language in their cultural songs against women and girls. The psychological impact of the songs has a significant negative impact on education, human rights, quality of life, and opportunities for many rural Igbo-women and girls in Nigeria. This study, therefore, examines the forms, shades, and manifestations of derogatory and stereotypical language against women and girls the Igbo cultural songs; and how they impede education and human rights for females in Nigeria. Through Critical discourse analysis (CDA) of data collected via recording, the study identifies manifestations of women and girls’ stereotypes such as subjugations, male dominance, inequality in gender roles, suppression, and oppression, and derogatory use of the language against women and girls in the Igbo cultural songs. This study has a great promise of alerting the issues of derogatory and stereotypical language in songs, and contributes to an education aimed at gender equality, emancipator practice of appropriate language use in songs, equal education and human rights for both male and female, respect and solidarity in Nigeria and beyond.Keywords: gender stereotypes, cultural songs, women and girls, language use in Nigeria, critical discourse analysis, CDA, education
Procedia PDF Downloads 3434676 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 3074675 Adopting Home Nursing as a Remedy for Child Labour in Nigeria
Authors: T. O. Adeoye
Abstract:
In Nigeria prior to the arrival of the colonial masters, there used to be good family relationship, things were done through cooperation and community effort, even training and upbringing of a child was the responsibility of every member of the community. The advent of western education and civilization brought about movement of youths from rural to urban areas. Hence the tie that binds the village life is broken, community as a whole is no more responsible for the upbringing or home training of her children any more. The study investigates adoption of home nursing as a remedy for child labour in Nigeria, considered challenges like poverty, broken homes and illiteracy among others. For the purpose of verification, a survey in form of an opinion poll was conducted by means of interview using questionnaires for about 3000 respondents. However, out of the respondents that were interviewed as regard parental poverty and its resultant effect on a child only 14.2% of the respondent strongly disagreed that children work on the street because their parents are poor. The study shows that possible solutions of effective ways of controlling child labour is home nursing and also promoting and advocating for the policies against child labour in Nigeria.Keywords: child abuse, child labour, psychological problem, Street children
Procedia PDF Downloads 3354674 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain
Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani
Abstract:
The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.Keywords: blockchain, hyperledger fabric, internet of things, security, traceability
Procedia PDF Downloads 1494673 Evaluation of the Socio-Economic Impact of Marine Debris in Coastal Nigeria
Authors: Chibuzo Okoye Daniels, Gillian Glegg, Lynda Rodwell
Abstract:
Marine debris from fishing nets to medical equipment to food packaging that play major roles in boosting the economy and protecting human health is now more than an environmental problem that can be solved by legislation, law enforcement and technical solutions. It has also been identified as a cultural problem that can only be addressed by identifying instruments that can be used to change human attitudes and behaviors. This may be through management approaches, education and involvement of all sectors/interests, including the public. To contribute to the sustainable development of coastal Nigeria, two case study areas (Ikoyi and Victoria Islands of Lagos State) were used to evaluate the socio-economic impacts of marine debris problem in coastal Nigeria. The following methods were used: (1) semi-structured interviews with key stakeholders and businesses on beaches, waterfronts and waterways within the study areas and (2) observational study of beaches, waterfronts and waterways within the study areas. The results of the study have shown that marine debris is a cultural and multi-sectoral problem that poses great threat not only to the environmental sustainability of the study areas but also to the wellbeing of its citizens and the economy of coastal Nigeria. Current solid waste and marine debris management practices are inefficient due to inadequate knowledge of how to tackle the problem. To ensure environmental sustainability in coastal Nigeria and avoid waste of scarce financial resources, adequate, appropriate and cost effective solutions to the marine debris problem need to be identified and effectively transferred for implementation in the study areas.Keywords: sustainability, coastal Nigeria, study areas, aquaculture
Procedia PDF Downloads 5544672 Shifting of Global Energy Security: A Comparative Analysis of Indonesia and China’s Renewable Energy Policies
Authors: Widhi Hanantyo Suryadinata
Abstract:
Efforts undertaken by Indonesia and China to shift the strategies and security of renewable energy on a global stage involve approaches through policy construction related to rare minerals processing or value-adding in Indonesia and manufacturing policies through the New Energy Vehicles (NEVs) policy in China. Both policies encompass several practical regulations and policies that can be utilized for the implementation of Indonesia and China's grand efforts and ideas. Policy development in Indonesia and China can be analyzed using a comparative analysis method, as well as employing a pyramid illustration to identify policy construction phases based on the real conditions of the domestic market and implemented policies. This approach also helps to identify the potential integration of policies needed to enhance the policy development phase of a country within the pyramid. It also emphasizes the significance of integration policy to redefine renewable energy strategy and security on the global stage.Keywords: global renewable energy security, global energy security, policy development, comparative analysis, shifting of global energy security, Indonesia, China
Procedia PDF Downloads 694671 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes
Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv
Abstract:
As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment
Procedia PDF Downloads 2094670 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services
Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar
Abstract:
This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.Keywords: civil-id disclosure, awareness, linear regression, multiple regression
Procedia PDF Downloads 574669 Enhancing Metaverse Security: A Multi-Factor Authentication Scheme
Authors: R. Chinnaiyaprabhu, S. Bharanidharan, V. Dharsana, Rajalavanya
Abstract:
The concept of the Metaverse represents a potential evolution in the realm of cyberspace. In the early stages of Web 2.0, we observed a proliferation of online pseudonyms or 'nyms,' which increased the prevalence of fake accounts and made it challenging to establish unique online identities for various roles. However, in the era of Web 3.0, particularly in the context of the Metaverse, an individual's digital identity is intrinsically linked to their real-world identity. Consequently, actions taken in the Metaverse can carry significant consequences in the physical world. In light of these considerations, we propose the development of an innovative authentication system known as 'Metasec.' This system is designed to enhance security for digital assets, online identities, avatars, and user accounts within the Metaverse. Notably, Metasec operates as a password less authentication solution, relying on a multifaceted approach to security, encompassing device attestation, facial recognition, and pattern-based security keys.Keywords: metaverse, multifactor authentication, security, facial recognition, patten password
Procedia PDF Downloads 674668 Rethinking the Role of Small States in the Hybrid Era: Shifts in the Cypriot Foreign and Defence Policies, 2004-2019
Authors: Constantinos Adamides, Petros Petrikkos
Abstract:
In the era of growing hybrid threats, small states find themselves in need to re-evaluate existing foreign and defense policies. The pressure to establishing or maintain a status of a reliable partner in the community in which they belong to, vis-à-vis their multilateral relations with other organisations and entities, small states may need to shift their policies in the field to accommodate security needs that are not only pertinent to their security, but also to that of the organisations (bloc) in which they interact. Unlike potential shortcomings in a small state’s mainstream security and defence framework where the threat would be limited to the state itself, in more contemporary times with dominating hybrid threats, the small states’ security shortcomings may also become a security problem for the bloc in which these states belong to. An indicative example is small states like Cyprus and Malta, which belong and 'interact' in the European Union. As a result, the nature of hybrid threats can be utilised to hurt bigger states in a bloc by exploiting the small states’ vulnerabilities and security gaps. Inevitably, both the defensive and foreign policy collaborations of small states with bigger states have been and are constantly re-evaluated to tackle and prevent such problems. In essence, the goal of this ‘re-evaluation’ aims to achieve a twofold goal: The first is the small states’ quest to appear as a reliable partner within the bloc, while the second is to avoid being the weakest security link in the bloc’s defence against hybrid threats. Indeed, the hybrid arena is a security area where they can excel in the bloc, despite the potential and expected conventional military deficiencies. This new environment prompts us to think security from the perspective of small states differently and in relation to their role as members or big organisations. The paper focuses on the case of Cyprus following its accession to the European Union and examines how a country that has had a very focused security orientation –not least due to its ongoing security problems– altered its foreign and defence policies within the European Union to ensure compliance with the rest of the bloc, while at the same time maximizing its role as a security player. Specifically, it examines the methods through which the country shifted its policies as well as the challenges and opportunities that emerged from these security shifts.Keywords: Cyprus, defence, foreign policy, hybrid threats, ontological security, small states
Procedia PDF Downloads 1364667 Canonical Objects and Other Objects in Arabic
Authors: Safiah Ahmed Madkhali
Abstract:
The grammatical relation object has not attracted the same attention in the literature as subject has. Where there is a clearly monotransitive verb such as kick, the criteria for identifying the grammatical relation may converge. However, the term object is also used to refer to phenomena that do not subsume all, or even most, of the recognized properties of the canonical object. Instances of such phenomena include non-canonical objects such as the ones in the so-called double-object construction i.e. the indirect object and the direct object as in (He bought his dog a new collar). In this paper, it is demonstrated how criteria of identifying the grammatical relation object that are found in the theoretical and typological literature can be applied to Arabic. Also, further language-specific criteria are here derived from the regularities of the canonical object in the language. The criteria established in this way are then applied to the non-canonical objects to demonstrate how far they conform to, or diverge from, the canonical object. Contrary to the claim that the direct object is more similar to the canonical object than is the indirect object, it was found that it is, in fact, the indirect object rather than the direct object that shares most of the aspects of the canonical object in monotransitive clauses.Keywords: canonical objects, double-object constructions, cognate object constructions, non-canonical objects
Procedia PDF Downloads 2324666 Corporate Governance and Accountability: Nigeria Perspective
Authors: Obazee Osariere
Abstract:
Corporate governance has been an emerging subject of worldwide interest in the 21st century following the failure of going concerns that were hitherto thought to be financially stable before their collapse. Nigeria has had its fair share of corporate collapse, which has made it embrace and develop its corporate governance regime. This paper seeks to undertake an overview of corporate governance and accountability: Nigeria's perspective. This paper examines the various ways the concept has been viewed, its various dimensions, and its basic principles as a major instrument of ensuring corporate governance and accountability and confidence in the operations of organisations. The paper, which adopts a qualitative research method, however, provides an essential theoretical framework within which better practice of corporate governance and accountability can be evolved for appreciable corporate results in the Nigerian business environment. Thus, a historical perspective is adopted to understudy the evolution of corporate governance and accountability from its little beginning to the present time. The adoption of these strategies, it is argued, will engender participation by various principles, engender mutual understanding, build social support and ensure accountability and openness. Such strategies would also help in attitude and behavioural change required to instill in the operators of corporate organisations the best practice enshrined in corporate governance and accountability.Keywords: corporate governance, accountability, organisations, Nigeria, perspective
Procedia PDF Downloads 1214665 Factors Constraining the Utilization of Risk Management Strategies in the Execution of Public Construction Projects in North East Nigeria
Authors: S. U. Kunya, S. A. Mohammad
Abstract:
Construction projects in Nigeria are characterized with risks emanating from delays and accompanying cost-overruns. The aim of the study was to identify and assess factors constraining the utilization of risk management strategies in the execution of public construction project in North-East Nigeria. Data was collected with the aid of a well-structured questionnaire administered to three identified projects in the North-east. Data collected were analysed using the severity index. Findings revealed political involvement, selection of inexperienced contractors and lack of coordinated public sector strategy as the most severe factors constraining the utilization of risk management strategies. The study recommended that: formulation of laws to prevent negative political meddling in construction projects; selection of experienced, risk-informed contractors; and comprehensive risk assessment and planning on all public construction projects.Keywords: factors, Nigeria, north-east, public projects, risk management, strategies, utilization
Procedia PDF Downloads 5324664 Military Role of Russia beyond Its National Boundary
Authors: Nipuli Gajanayake
Abstract:
The Russian military role beyond its national frontier has become a debatable hot topic in the international political arena. It’s advanced, and strategic responses in combating regional and international security problems have always been a factor to debate and criticize. Under such critical circumstances, Russia is attentive to play its military role according to the provisions of the Military Doctrine of the Russian Federation. Most importantly, the legal basis of the doctrine has also consisted with the generally recognized principles and norms of international law. Therefore, Russian international military assistances are pledged to accomplish international peace and security. The expansion of Russian military participation in the United Nations Peacekeeping operations, and military- political, and technical cooperation have largely evident the great effort of Russia in maintaining and restoring international peace and security. Moreover, the conflict management diplomacy and the development of dialogue with nation states to confront military risks and threats can also identify as a part of preserving international peace and security. In addition, Russia strives to strengthen the system of collective security with regional and international organizations through the legal framework of the Collective Security Treaty Organization (CSTO). Maintaining cooperative ties with the Commonwealth of Independent States (CIS), the Organization for Security and Cooperation in Europe (OSCE) and the Shanghai Cooperation Organization (SCO) have highlighted the Russian deliberation on maintaining regional peace and security. Nevertheless, the extension of cordial relations with nation states and providing of military assistances during tensions and conflicts on their territories can also underscore as Russians commitments on maintaining international peace and security. Observing and recognizing the disparity between the West portrayed terms like ‘illegal Russian interventions’ and the comprehensive reality behind the ‘Russian military assistances’ are important to understand. However, a lopsided vision or a perspective towards the Russian international military role would not present a clear understanding about its valued and also dedicated hard work on maintaining international peace and security.Keywords: collective security, diplomacy, international military role of Russia, international peace and security
Procedia PDF Downloads 3014663 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption
Authors: Ajish Sreedharan
Abstract:
Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation
Procedia PDF Downloads 4374662 The Impact of Gender Differences on the Expressions of Refusal in Jordanian Arabic
Authors: Hanan Yousef, Nisreen Naji Al-Khawaldeh
Abstract:
The present study investigates the use of the expression of refusal by native speakers of Jordanian Arabic (NSsJA) in different social situations (i.e. invitations, suggestions, and offers). It also investigates the influence of gender on the refusal realization patterns within the Jordanian culture to provide a better insight into the relation between situations, strategies and gender in the Jordanian culture. To that end, a group of 70 participants, including 35 male and 35 female students from different departments at the Hashemite University (HU) participated in this study using mixed methods (i.e. Discourse Completion Test (DCT), interviews and naturally occurring data). Data were analyzed in light of a developed coding scheme. The results showed that NSsJA preferred indirect strategies which mitigate the interaction such as "excuse, reason and, explanation" strategy more than other strategies which aggravate the interaction such as "face-threatening" strategy. Moreover, the analysis of this study has revealed a considerable impact of gender on the use of linguistic forms expressing refusal among NSsJA. Significant differences in the results of the Chi-square test relating the effect of participants' gender indicate that both males and females were conscious of the gender of their interlocutors. The findings provide worthwhile insights into the relation amongst types of communicative acts and the rapport between people in social interaction. They assert that refusal should not be labeled as face threatening act since it does not always pose a threat in some cases especially where refusal is expressed among friends, relatives and family members. They highlight some distinctive culture-specific features of the communicative acts of refusal.Keywords: gender, Jordanian Arabic, politeness, refusals, speech act
Procedia PDF Downloads 1664661 Examining the Challenges Faced by Passengers Using Arik Air for International and Domestic Travel
Authors: Mahmud Hafsat Hussaini, Eldah Ephraim Eldah, Bata Zoakah Amina
Abstract:
This research work was aimed at examining the challenges faced by passengers using Arik air for domestic and international travels. Passengers do complain of delay flights, theft and rude behavior by Arik staff while on transit or in the process of travelling using the aircraft. Being the national carrier in Nigeria these behaviors have tarnished the image of the airline and makes travel experience to be challenging. Hundred survey questionnaires were administered to travellers who have used the airline for domestic and international flights. Findings show that the staff of the airline do lack customer care skills and are sometimes rude to customers. The airline does have different agents that book for international flights who delays confirming bookings even after payment. The website of the airline is mostly down and makes bookings difficult. Other findings related to the study are a delay of domestic flights within Nigeria. Passengers are sometimes kept for 8 hours in the airport due to delay of flights. The study, therefore, recommends that flight schedule should be adhered to and staff should be trained to meet of with passengers demand. The security of guest luggage at the airport should be put in place to avoid theft. An effective booking platform should be accessible to passengers for easy booking.Keywords: examining, challenges, domestic, international, travels
Procedia PDF Downloads 2164660 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism
Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe
Abstract:
National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.Keywords: counter-terrorism, discourse, Nigeria, security, terrorism
Procedia PDF Downloads 4864659 Job Satisfaction and Motivation as Predictors of Lecturers' Effectiveness in Nigeria Police Academy
Authors: Bibire Abdulkareem Hussein
Abstract:
Job satisfaction and motivation are considered as major tools in sustaining institutional development, they are also the machinery used to achieve an institutional goals and objectives. However, it has been observed that some institutions failed in motivating and stimulating their workers; in contrast, workers may be motivated but not satisfied with the job and failed to perform efficiently and effectively. It is hoped that the study of this nature would be of significance value to all stakeholders in education specifically, lecturers in higher institutions in Nigeria. Also it significances will enhance lecturers’ effectiveness and performance in discharging their duties. It is against this backdrop that, this study investigated whether job satisfaction and motivation predict lecturers’ effectiveness in Nigeria Police Academy, Wudil, KanoState. The correlational research method was adopted for the study while purposive sampling technique was used to choose the institution and the sampled lectures (70). Simple random sampling technique was used to select one hundred cadets across the academy. Two instruments were used to elicit information from both lecturers and cadets. These were job satisfaction and motivation; and lecturers’ effectiveness Questionnaires. The instruments were subjected to pilot testing and found to have reliability coefficient of 0.69 and 0.71 respectively. The results of the study revealed that there was a significance relationship among job satisfaction, motivation and lecturers effectiveness in Nigeria Police Academy, Job satisfaction had a Beta weight (β) of .125, t = 3.253, p<0.05, Job motivation had a Beta weight (β) of .185, t = 3.849, p<0.05. There was a significance relationship between job satisfaction and lecturers’ effectiveness in Nigeria Police Academy the cal r is 0.21 while the crt r is 0.19. at p<0.05 and; there was a significance relationship between job motivation and lecturers effectiveness in Nigeria Police Academy the cal r is 0.20 while the crt r is 0.19 at p<0.05This study therefore concluded that there was a significance relationship among job satisfaction, motivation and lecturers effectiveness in Nigeria Police Academy s,In view of the findings of this study, the paper recommends that lecturers should be more pro-active and more effective in their primary assignment (teaching) in order to make meaningful impacts and inputs in the life of cadets and boost the standard of the academy. In the same vein, it is recommended that management should intensify efforts to improve lecturers’ welfares by providing more motivational techniques to enhance more productivity.Keywords: academy, lecturers effectiveness, motivation, satisfaction
Procedia PDF Downloads 4714658 Investigating the Use of English Arabic Codeswitching in EFL classroom Oral Discourse Case study: Middle school pupils of Ain Fekroun, Wilaya of Oum El Bouaghi Algeria
Authors: Fadila Hadjeris
Abstract:
The study aims at investigating the functions of English-Arabic code switching in English as a foreign language classroom oral discourse and the extent to which they can contribute to the flow of classroom interaction. It also seeks to understand the views, beliefs, and perceptions of teachers and learners towards this practice. We hypothesized that code switching is a communicative strategy which facilitates classroom interaction. Due to this fact, both teachers and learners support its use. The study draws on a key body of literature in bilingualism, second language acquisition, and classroom discourse in an attempt to provide a framework for considering the research questions. It employs a combination of qualitative and quantitative research methods which include classroom observations and questionnaires. The analysis of the recordings shows that teachers’ code switching to Arabic is not only used for academic and classroom management reasons. Rather, the data display instances in which code switching is used for social reasons. The analysis of the questionnaires indicates that teachers and pupils have different attitudes towards this phenomenon. Teachers reported their deliberate switching during EFL teaching, yet the majority was against this practice. According to them, the use of the mother has detrimental effects on the acquisition and the practice of the target language. In contrast, pupils showed their preference to their teachers’ code switching because it enhances and facilitates their understanding. These findings support the fact that the shift to pupils’ mother tongue is a strategy which aids and facilitates the teaching and the learning of the target language. This, in turn, necessitates recommendations which are suggested to teachers and course designers.Keywords: bilingualism, codeswitching, classroom interaction, classroom discourse, EFL learning/ teaching, SLA
Procedia PDF Downloads 4784657 Improving Cost and Time Control of Construction Projects Management Practices in Nigeria
Authors: Mustapha Yakubu, Ahmed Usman, Hashim Ambursa
Abstract:
This paper presents the findings of a research which sought to investigate techniques used to improve cost and time control of construction projects management practice in Nigeria. However, there is limited research on issues surrounding the practical usage of these techniques. Data were collected through a questionnaire distributed to construction experts through a survey conducted on the 100 construction organisations and 50 construction consultancy firms in the Nigeria aimed at identifying common project cost and time control practices and factors inhibiting effective project control in practice. The study reveals that despite the vast application of control techniques a high proportion of respondents still experienced cost and time overruns on a significant proportion of their projects. Analysis of the survey results concluded that more effort should be geared at the management of the identified top project control inhibiting factors. This paper has outlined some measures for mitigating these inhibiting factors so that the outcome of project time and cost control can be improved in practice.Keywords: construction project, cost control, Nigeria, time control
Procedia PDF Downloads 3124656 What Nigeria Education Needs
Authors: Babatunde Joel Todowede
Abstract:
The challenges of nation building and sustainable development have continued to feature prominently in the general reckoning of problems of underdevelopment in the developing countries of the world. Thus, since the attainment of political independence from the British colonial administration in 1960, one of the critical thrusts of central governance in Nigeria has been the particular policy attention of the educational sector. Of course, education is perceived as the logical bridge between the two contrasting worlds of underdevelopment and development, hence, its fundamental importance. The various public policies and practices associated with the Nigerian educational sector are specifically elaborated and critically assessed in this paper. In the final analysis, it is concluded that the educational sector should be better configured and managed in ways that the wider challenges of nation-building and sustainable development are effectively tractable.Keywords: Nigeria education, educational need, educational plans and policies, educational challenges, corrective measures, emerging economy
Procedia PDF Downloads 3734655 Smart Grids Cyber Security Issues and Challenges
Authors: Imen Aouini, Lamia Ben Azzouz
Abstract:
The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.Keywords: smart grids, smart meters, home area network, neighbor area network
Procedia PDF Downloads 4244654 Impact of Social Crisis on Property Market Performance and Evolving Strategy for Improved Property Transactions in Crisis Prone Environment: A Case Study of North Eastern Nigeria
Authors: A. Yakub AbdurRaheem
Abstract:
Urban violence in the form of ethnic and religious conflicts have been on the increase in many African cities in the recent years of which most of them are the result of intense and bitter competition for political power, the control of limited economic, social and environmental resources. In Nigeria, the emergence of the Boko Haram insurgency in most parts of the northeastern parts have ignited violence, bloodshed, refugee exodus and internal migration. Not only do the persistent attacks of the sect create widespread insecurity and fear, but it has also stifled normal processes of trade and investments most especially real property investment which is acclaimed to accelerate the economic cycle, thus the need to evolve strategies for an improved property market in such areas. This paper, therefore, examines the impact of this social crisis on effective and efficient utilization of real properties as a resource towards the development of the economy, using a descriptive analysis approach where particular emphasis was based on trends in residential housing values; volume of estimated property transactions and real estate investment decisions by affected individuals. Findings indicate that social crisis in the affected areas have been a clog on the wheels of property development and investment as properties worth hundreds of millions have been destroyed thereby having great impact on property values. Based on these findings, recommendations were made to include the need to strategically continue investing in property during such times, the need for Nigerian government to establish an active conflict monitoring and management unit for the prompt response, encourage community and neighborhood policing to ameliorate security challenges in Nigeria.Keywords: social crisis, economy, resources, property market
Procedia PDF Downloads 2374653 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme
Authors: Cavidan Yakupoglu, Kurt Rohloff
Abstract:
In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE
Procedia PDF Downloads 1544652 Challenges of Online Education and Emerging E-Learning Technologies in Nigerian Tertiary Institutions Using Adeyemi College of Education as a Case Study
Authors: Oluwatofunmi Otobo
Abstract:
This paper presents a review of the challenges of e-learning and e-learning technologies in tertiary institutions. This review is based on the researchers observations of the challenges of making use of ICT for learning in Nigeria using Adeyemi College of Education as a case study; this is in comparison to tertiary institutions in the UK, US and other more developed countries. In Nigeria and probably Africa as a whole, power is the major challenge. Its inconsistency and fluctuations pose the greatest challenge to making use of online education inside and outside the classroom. Internet and its supporting infrastructures in many places in Nigeria are slow and unreliable. This, in turn, could frustrate any attempt at making use of online education and e-learning technologies. Lack of basic knowledge of computer, its technologies and facilities could also prove to be a challenge as many young people up until now are yet to be computer literate. Personal interest on both the parts of lecturers and students is also a challenge. Many people are not interested in learning how to make use of technologies. This makes them resistant to changing from the ancient methods of doing things. These and others were reviewed by this paper, suggestions, and recommendations were proffered.Keywords: education, e-learning, Nigeria, tertiary institutions
Procedia PDF Downloads 1984651 Arabic Fables in Contemporary Garbs: Ahmed Shawqī’s Reconstruction of Fables in the Modern Era
Authors: Monia Hejaiej
Abstract:
The fable has lent itself to memorable imitations and reinventions. The writing of fables, in prose and verse, was widely cultivated not only in pre-Islamic Arabia but also in the middle ages, reaching its culmination with the Egyptian poet and man of letters Ahmad Shawqī (1989-1932), who revived the ancient tradition, a relatively minor and unexploited genre in the modern era, and re-wrote rimed fables with an Arab Islamic flavor, articulating a set of modern ethico-political concepts and sensibilities such as a belief in good judgment in governance, individual liberty, democracy, a sense of the brotherhood of man and justice. This essay aims to restore the 20th Century poet to his rightful place in the international pantheon of literary achievement, and offers an examination of the Arabian fabulist tradition as it appears in Arabic literature, and a treatment of this genre re-visiting a few representative samples of Ahmad Shawqī collection of fables and their implications for contemporary politics in the Middle East.Keywords: fable, politcs, governace, democracy, ethics of care
Procedia PDF Downloads 6764650 Egg Hatching Inhibition Activity of Volatile Oils Extracted from Some Medicinal and Aromatic Plants against Root-Knot Nematode Meloidogyne hapla
Authors: Anil F. Felek, Mehmet M. Ozcan, Faruk Akyazi
Abstract:
Volatile oils of medicinal and aromatic plants are important for managing nematological problems in agriculture. In present study, volatile oils extracted from five medicinal and aromatic plants including Origanum onites (flower+steam+leaf), Salvia officinalis (leaf), Lippia citriodora (leaf+seed), Mentha spicata (leaf) and Mentha longifolia (leaf) were tested for egg hatching inhibition activity against root-knot nematode Meloidogyne hapla under laboratory conditions. The essential oils were extracted using water distillation method with a Clevenger system. For the homogenisation process of the oils, 2% gum arabic solution was used and 4 µl oils was added into 1ml filtered gum arabic solution to prepare the last stock solution. 5 ml of stock solution and 1 ml of M. hapla egg suspension (about 100 eggs) were added into petri dishes. Gum arabic solution was used as control. Seven days after exposure to oils at room temperature (26±2 °C), the cumulative hatched and unhatched eggs were counted under 40X inverted light microscope and Abbott’s formula was used to calculate egg hatching inhibition rates. As a result, the highest inhibition rate was found as 54% for O. onites. In addition, the other inhibition rates varied as 31.4%, 21.6%, 23.8%, 25.67% for the other plants, S. officinalis, M. longifolia, M. spicata and L. citriodora, respectively. Carvacrol was found as the main component (68.8%) of O. onites followed by Thujone 27.77% for S. officinalis, I-Menthone 76.92% for M. longifolia, Carvone 27.05% for M. spicata and Citral 19.32% for L. citriodora.Keywords: egg hatching, Meloidogyne hapla, medicinal and aromatic plants, root-knot nematodes, volatile oils
Procedia PDF Downloads 266