Search results for: public attitudes security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9247

Search results for: public attitudes security

8527 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 296
8526 The Identity of the Cairene Public Space: Manifestations of Social and Architectural Heritage in the City Square of Medieval Cairo

Authors: Muhammad Emad Feteha

Abstract:

Cairo has been famous for the unique identity of its medieval architecture, which was formed by multiple dynasties that ruled Egypt. However, only a few researches were done on the identity of its public space. This paper links both the architectural and the socio-political aspects of the Cairene public space and studies how they affected each other. The subject of the study is Maydan Salah al-Din, the main city square of medieval Cairo, which reveals a quite useful information, not only about the architectural identity of the Cairene public space but also about the socio-political patterns that operated within. The analytical framework is based on Lefebvre’s theory, the ‘production of space’, in which he applied 'the Hegelian dialectic' in order to understand how the social practice forms the space, and how, in turn, the space forms the social practice. This framework offers a comprehensive understanding of the identity of the Cairene public space, which does not separate architecture from the social practice.

Keywords: architectural identity, Cairene public space, Islamic architectural history, production of space

Procedia PDF Downloads 354
8525 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 65
8524 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 282
8523 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 295
8522 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 422
8521 Evidence of Conditional and Unconditional Cooperation in a Public Goods Game: Experimental Evidence from Mali

Authors: Maria Laura Alzua, Maria Adelaida Lopera

Abstract:

This paper measures the relative importance of conditional cooperation and unconditional cooperation in a large public goods experiment conducted in Mali. We use expectations about total public goods provision to estimate a structural choice model with heterogeneous preferences. While unconditional cooperation can be captured by common preferences shared by all participants, conditional cooperation is much more heterogeneous and depends on unobserved individual factors. This structural model, in combination with two experimental treatments, suggests that leadership and group communication incentivize public goods provision through different channels. First, We find that participation of local leaders effectively changes individual choices through unconditional cooperation. A simulation exercise predicts that even in the most pessimistic scenario in which all participants expect zero public good provision, 60% would still choose to cooperate. Second, allowing participants to communicate fosters conditional cooperation. The simulations suggest that expectations are responsible for around 24% of the observed public good provision and that group communication does not necessarily ameliorate public good provision. In fact, communication may even worsen the outcome when expectations are low.

Keywords: conditional cooperation, discrete choice model, expectations, public goods game, random coefficients model

Procedia PDF Downloads 301
8520 Analysis and Evaluation of the Public Responses to Traffic Congestion Pricing Schemes in Urban Streets

Authors: Saeed Sayyad Hagh Shomar

Abstract:

Traffic congestion pricing in urban streets is one of the most suitable options for solving the traffic problems and environment pollutions in the cities of the country. Unlike its acceptable outcomes, there are problems concerning the necessity to pay by the mass. Regarding the fact that public response in order to succeed in this strategy is so influential, studying their response and behavior to get the feedback and improve the strategies is of great importance. In this study, a questionnaire was used to examine the public reactions to the traffic congestion pricing schemes at the center of Tehran metropolis and the factors involved in people’s decision making in accepting or rejecting the congestion pricing schemes were assessed based on the data obtained from the questionnaire as well as the international experiences. Then, by analyzing and comparing the schemes, guidelines to reduce public objections to them are discussed. The results of reviewing and evaluating the public reactions show that all the pros and cons must be considered to guarantee the success of these projects. Consequently, with targeted public education and consciousness-raising advertisements, prior to initiating a scheme and ensuring the mechanism of the implementation after the start of the project, the initial opposition is reduced and, with the gradual emergence of the real and tangible benefits of its implementation, users’ satisfaction will increase.

Keywords: demand management, international experiences, traffic congestion pricing, public acceptance, public reactions, public objection

Procedia PDF Downloads 239
8519 Psychosocial Determinants of School Violent Behavior and the Efficacy of Covert Sensitization in Combination with Systematic approach Therapy among Male Students in Lagos Metropolis: Implications for Student Counselors

Authors: Fidel O. Okopi, Aminu Kazeem Ibrahim

Abstract:

The study investigated psychosocial determinants ‘attitudes and self-esteem’ of school violent behaviors and the efficacy of covert sensitization therapy in combination with systematic approach therapy among male students in Lagos metropolis. Ex-post facto experimental research design was adopted for the study. The samples consisted of 39 school violent behavior students identified through the School Disciplinary Record Books and another 39 non-school violent behavior students identified through randomization. The two groups were from four randomly selected Public Senior Secondary Schools. School Violent Behavior Attitudes Scale (SVBAS) and School Violent Behavior Self-Esteem Scale (SVBSES) were used to collect data for the study. Face and Content validity with the Reliability coefficient of 0.772 for SVBAS and 0.813 for SVBSES were obtained. The results showed that the attitude of school violent behavior students do not significantly differ from that of school non-violent behavior students; the self-esteem of school violent behavior students differs significantly from that of school non-violent behavior students and that Covert Sensitization therapy in combination with Systematic Approach therapy were effective in modifying the self-esteem and attitude of school violent behavior students as surf iced in the pre-test and post-test analysis of school violent behavior students’ responses. The School counselors can modify male school violent behaviors that are traced to attitude and self-esteem with Covert Sensitization therapy in combination with Systematic Approach therapy in metropolitan areas.

Keywords: psychosocial determinants, violent behavior, covert sensitization therapy, systematic approach therapy

Procedia PDF Downloads 394
8518 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 323
8517 Understanding How Posting and Replying Behaviors in Social Media Differentiate the Social Capital Cultivation Capabilities of Users

Authors: Jung Lee

Abstract:

This study identifies how the cultivation capabilities of social capital influence the overall attitudes of social media users and how these influences differ across user groups. First, the cultivation capabilities of social capital are identified from three aspects, namely, social capital accessibility, potentiality and sensitivity. These three types of social capital acquisition capabilities collectively represent how the social media users perceive the social media environment in terms of possibilities for social capital creation. These three capabilities are hypothesized to influence social media satisfaction and continuing use intention. Next, two essential activities in social media are identified, namely, posting and replying, to categorise social media users based on behavioral patterns. Various social media activities consist of the combinations of these two basic activities. Posting represents the broadcasting aspect of social media, whereas replying represents the communicative aspect of social media. We categorize users into four from communicators to observers by using these two behaviors to develop usage pattern matrix. By applying the usage pattern matrix to the capability model, we argue that posting behavior generally has a positive moderating effect on the attitudes of social media users, whereas replying behavior occasionally exhibits the negative moderating effect. These different moderating effects of posting and replying behavior are explained based on the different levels of social capital sensitivity and expectation of individuals. When a person is highly expecting social capital from social media, he or she would post actively. However, when one is highly sensitive to social capital, he or she would actively respond and reply to postings of other people because such an act would create a longer and more interactive relationship. A total of 512 social media users are invited to answer the survey. They were asked about their attitudes toward the social media and how they expect social capital through this practice. They were asked to check their general social media usage pattern for user categorization. Result confirmed that most of the hypotheses were supported. Three types of social capital cultivation capabilities are significant determinants of social media attitudes, and two social media activities (i.e., posting and replying) exhibited different moderating effects on attitudes. This study provides following discussions. First, three types of social capital cultivation capabilities were identified. Despite the numerous concerns about social media, such as whether it is a decent and real environment that produces social capital, this study confirms that people explicitly expect and experience social capital values from social media. Second, posting and replying activities are two building blocks of social media activities. These two activities are useful in explaining different the attitudes of social media users and predict future usage.

Keywords: social media, social capital, social media satisfaction, social media use intention

Procedia PDF Downloads 186
8516 Mitigating the Cost of Empty Container Repositioning through the Virtual Container Yard: An Appraisal of Carriers’ Perceptions

Authors: L. Edirisinghe, Z. Jin, A. W. Wijeratne, R. Mudunkotuwa

Abstract:

Empty container repositioning is a fundamental problem faced by the shipping industry. The virtual container yard is a novel strategy underpinning the container interchange between carriers that could substantially reduce this ever-increasing shipping cost. This paper evaluates the shipping industry perception of the virtual container yard using chi-square tests. It examines if the carriers perceive that the selected independent variables, namely culture, organization, decision, marketing, attitudes, legal, independent, complexity, and stakeholders of carriers, impact the efficiency and benefits of the virtual container yard. There are two major findings of the research. Firstly, carriers view that complexity, attitudes, and stakeholders may impact the effectiveness of container interchange and may influence the perceived benefits of the virtual container yard. Secondly, the three factors of legal, organization, and decision influence only the perceived benefits of the virtual container yard. Accordingly, the implementation of the virtual container yard will be influenced by six key factors, namely complexity, attitudes, stakeholders, legal, organization and decision. Since the virtual container yard could reduce overall shipping costs, it is vital to examine the carriers’ perception of this concept.

Keywords: virtual container yard, imbalance, management, inventory

Procedia PDF Downloads 189
8515 Exploring Reading Attitudes among Iranian English Language Teachers

Authors: Narges Nemati, Mohammadreza Fallahpour, Hossein Bozorgian

Abstract:

Reading is one of the receptive skills which has an important role in improving other skills like writing and speaking. Furthermore, language learners can acquire plenty of vocabularies and become more acquainted with written expression through reading. Also, negative attitudes toward reading can cause negligible reading comprehension, which could prompt poor performance in the English language. Considering the fact that reading instruction was discussed as a low priority skill in the field of EFL teacher education, this study attempted to investigate EFL teachers’ attitudes toward reading instruction. Therefore, to serve the purpose of this study, a mixed-method approach was utilized by inviting 100 Iranian EFL teachers who taught at English language institutes of Iran to fill out a validated questionnaire on teachers’ attitude toward reading. Subsequently, 10 participants were randomly selected for further observations and interview sessions to evaluate the differences between their stated attitude and their actual practices. The findings from analyzing questionnaires, observations, and interviews revealed that EFL teachers’ stated attitude toward reading instruction was positive; whereas, due to some reasons like lack of time, scarcity of interesting passages, and lack of interest in reading long passages, teachers did not show positive actual attitude toward teaching reading skill.

Keywords: English as foreign language classroom, English language, reading skill, teachers' attitude

Procedia PDF Downloads 146
8514 Is More Inclusive More Effective? The 'New Style' Public Distribution System in India

Authors: Avinash Kishore, Suman Chakrabarti

Abstract:

In September 2013, the parliament of India enacted the National Food Security Act (NFSA) which entitles two-thirds of India’s population to five kilograms of rice, wheat or coarse cereals per person per month at one to three rupees per kilogram. Five states in India—Andhra Pradesh, Chhattisgarh, Tamil Nadu, Odisha and West Bengal—had already implemented somewhat similar changes in the TPDS a few years earlier using their own budgetary resources. They made rice—coincidentally, all five states are predominantly rice-eating—available in fair price shops to a majority of their population at very low prices (less than Rs.3/kg). This paper tries to account for the changes in household consumption patterns associated with the change in TPDS policy in these states using data from household consumption surveys by the National Sample Survey Organization (NSSO). NSS data show improvement in the coverage of TPDS and average off-take of grains from fair price shops between 2004-05 and 2009-10 across all states of India. However, the increase in coverage and off-take was significantly higher in four out of these five states than in the rest of India. An average household in these states purchased three kilos more rice per month from fair price shops than its counterpart in non-treated states as a result of more generous TPDS policies backed by administrative reforms. The increase in consumption of PDS rice was the highest in Chhattisgarh, the poster state of PDS reforms. Households in Chhattisgarh used money saved on rice to spend more on pulses, edible oil, vegetables and sugar and other non-food items. We also find evidence that making TPDS more inclusive and more generous is not enough unless it is supported by administrative reforms to improve grain delivery and control diversion to open markets.

Keywords: public distribution system, social safety-net, national food security act, diet quality, Chhattisgarh

Procedia PDF Downloads 370
8513 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 150
8512 Study on the Governance of Riverside Public Space in Mountainous Cities from the Perspective of Health and Safety

Authors: Chenxu Fang, Qikai Guan

Abstract:

Riverside public space in mountainous cities has unique scenic resources and humanistic connotations and is an important place indispensable to the activities of urban residents. In recent years, with the continuous development of society and the expansion of the city, the public space along the riverside has been affected to a certain extent. Based on this, this study is based on the concept of health and safety through the study of riverfront space in the local section of Jialing River in Chongqing City; according to the actual use function of riverfront public space, the riverfront public space in mountainous cities is categorized into leisure and recreational riverfront space, ecological conservation waterfront space, and composite function waterfront space. Starting from the health and safety elements affecting the environment in the riverfront public space, the health and safety influencing factors of the riverfront public space are categorized into three major categories, namely, material, non-material, and social, and through the field research and questionnaire collection, combined with the analysis of the Likert scale, the important levels of the health and safety influencing factors of different types of the riverfront public space of the mountainous cities are clarified. We summarize the factors affecting the health and safety of mountainous riverside spaces, map their importance levels to the design of different types of riverside spaces, and put forward three representative paths for the governance of the safety and health of mountainous riverside public space.

Keywords: health and safety, mountain city, riverfront public space, spatial governance, Chongqing Jialing River

Procedia PDF Downloads 41
8511 Traditional Practices of Conserving Biodiversity: A Case Study around Jim Corbett National Park, Uttarakhand, India

Authors: Rana Parween, Rob Marchant

Abstract:

With the continued loss of global biodiversity despite the application of modern conservation techniques, it has become crucial to investigate non-conventional methods. Accelerated destruction of ecosystems due to altered land use, climate change, cultural and social change, necessitates the exploration of society-biodiversity attitudes and links. While the loss of species and their extinction is a well-known and well-documented process that attracts much-needed attention from researchers, academics, government and non-governmental organizations, the loss of traditional ecological knowledge and practices is more insidious and goes unnoticed. The growing availability of 'indirect experiences' such as the internet and media are leading to a disaffection towards nature and the 'Extinction of Experience'. Exacerbated by the lack of documentation of traditional practices and skills, there is the possibility for the 'extinction' of traditional practices and skills before they are fully recognized and captured. India, as a mega-biodiverse country, is also known for its historical conservation strategies entwined in traditional beliefs. Indigenous communities hold skillsets, knowledge, and traditions that have accumulated over multiple generations and may play an important role in conserving biodiversity today. This study explores the differences in knowledge and attitudes towards conserving biodiversity, of three different stakeholder groups living around Jim Corbett National Park, based on their age, traditions, and association with the protected area. A triangulation designed multi-strategy investigation collected qualitative and quantitative data through a questionnaire survey of village elders, the general public, and forest officers. Following an inductive approach to analyzing qualitative data, the thematic content analysis was followed. All coding and analysis were completed using NVivo 11. Although the village elders and some general public had vast amounts of traditional knowledge, most of it was related to animal husbandry and the medicinal value of plants. Village elders were unfamiliar with the concept of the term ‘biodiversity’ albeit their way of life and attitudes ensured that they care for the ecosystem without having the scientific basis underpinning biodiversity conservation. Inherently, village elders were keen to conserve nature; the superimposition of governmental policies without any tangible benefit or consultation was seen as detrimental. Alienating villagers and consequently the village elders who are the reservoirs of traditional knowledge would not only be damaging to the social network of the area but would also disdain years of tried and tested techniques held by the elders. Forest officers advocated for biodiversity and conservation education for women and children. Women, across all groups, when questioned about nature conservation, showed more interest in learning and participation. Biodiversity not only has an ethical and cultural value, but also plays a role in ecosystem function and, thus, provides ecosystem services and supports livelihoods. Therefore, underpinning and using traditional knowledge and incorporating them into programs of biodiversity conservation should be explored with a sense of urgency.

Keywords: biological diversity, mega-biodiverse countries, traditional ecological knowledge, society-biodiversity links

Procedia PDF Downloads 100
8510 Public Art as Social Critique to Shape Urban-Scape

Authors: Po-Ching Wang

Abstract:

Public art may be regarded as a social agenda. It is assumed that public art acts as an intermediate form that contributes significantly to community resurgence. That is, public art may be regarded as a verb/process or social intervention. It functions as a vanguard form, attacking boundaries and providing a sensibility for social strategy. Public art in tradition is generally expected to bring aesthetic pleasure to public. Contemporary public art, however, not only focuses on art installation, but it also often offers a process that aims to comment on, question, and challenge the socio-cultural status quo. During the last few decades, accelerated changes in the values and expectations brought to bear on varied urban issues, together with the destruction of the hegemony of traditional art and of museum authorities, has begun to contribute to freer and more democratic representations of public art. It is said that part of a public artwork’s role is to ruffle sacred feathers. In many cases, public art is created to address the dynamic social contradictions and mutability of public life; and artists and community participants approach public art from a variety of social critical perspectives and methodologies. Urban issues, such as social and environmental justice, health problems, violence, and political statements, provide plentiful source materials that fuel the performance of public art in many different settings. Further, public artworks have been extensively adopted to express social identity, make political statements, and/or to remedy social and environmental crises. Many murals on urban walls, for instance, reflect social conflicts and address civic rights, and these projects are usually the work of artists who though denied access to traditional gallery and museum channels are supported by community engagement and involvement. Public art as a social practice challenges the traditional western view of artistic practice. Art in the public realm creates a new media that provides a platform for a dialogical exchange between diverse social groups. It seems that public art has evolved as an arena for activism that addresses wide-ranging and highly controversial social issues and civilian concerns. The findings of this study indicate that public artworks are capable of playing a role of activist in facilitating community evolution via social progress.

Keywords: aesthetics, community regeneration, city development, publicness, public participation, social progress

Procedia PDF Downloads 225
8509 Attitudes of Secondary School Students towards Science and Technical Education in Yauri Metropolis Kebbi State, Nigeria

Authors: Ibrahim Alhassan Libata

Abstract:

This study was carried out to assess attitude of secondary school students towards science and technical education in Yauri metropolis, Kebbi State, Nigeria. The population of the study was 200. Proportionate random sampling method was used in selecting 132 as sample size. Science and technical education is the most powerful forces for change in the world today, and students who hope to have a hand in shaping a better future must participate for their advancements. Four Null hypotheses were generated to guide the conduct of the study, questionnaire was the only instrument used in the study; the instrument was subjected to test-retest reliability. The reliability index of the instrument was 0.69. Overall scores of the Students were analyzed and a mean score was determined, the mean score of students was 85. There were no significant differences between the attitudes of male and female students towards science and technical education. The results also revealed that there was significant difference between the attitude of boding and day school students towards science and technical education, personality constraints of students is one factor militating against the participation of students in science and technical education, socio-economic status of the parents over the years have been the dominant factor of student’s inadequate representation in the field of science and technical education. Based on the findings of this study, the researcher recommended that teachers should motivate students, which they can do through their teaching styles and by showing them the relevance of the learning topics to their everyday lives. Government and the school management should create the learning environment that helps motivate students not only to come to classes but also want to learn and enjoy learning science and technical education, establishment of more Science and Technical Colleges education, more Public enlightenment campaigns to motivate parents and the entire community to support their children in studying science and technical education.

Keywords: attitude, students, science, Yauri

Procedia PDF Downloads 244
8508 Measuring Government’s Performance (Services) Oman Service Maturity Model (OSMM)

Authors: Angie Al Habib, Khalid Al Siyabi

Abstract:

To measure or asses any government’s efficiency we need to measure the performance of this government in regards to the quality of the service it provides. Using a technological platform in service provision became a trend and a public demand. It is also a public need to make sure these services are aligned to values and to the whole government’s strategy, vision and goals as well. Providing services using technology tools and channels can enhance the internal business process and also help establish many essential values to government services like transparency and excellence, since in order to establish e-services many standards and policies must be put in place to enable the handing over of decision making to a mature system oriented mechanism. There was no doubt that the Sultanate of Oman wanted to enhance its services and move it towards automation and establishes a smart government as well as links its services to life events. Measuring government efficiency is very essential in achieving social security and economic growth, since it can provide a clear dashboard of all projects and improvements. Based on this data we can improve the strategies and align the country goals to them.

Keywords: government, maturity, Oman, performance, service

Procedia PDF Downloads 361
8507 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 561
8506 Television Is Useful in Promoting Safe Sexual Practices to Student Populations: A Mixed-Methods Questionnaire Exploring the Impact of Channel Four’s ‘It’s a Sin (2021)’

Authors: Betsy H. Edwards

Abstract:

Background: Public Health England recognises unprotected sex and consequent transmission of sexually transmitted infections (STIs) as significant problems within student populations. Government surveys show that 50% of sexually-active young adults engage in unprotected sex with new partners, with 10% never using condoms. The recent Channel Four mini-series ‘It’s a Sin’ dramatises the 1980s AIDS epidemic and has been praised for its educational value and for promoting safe sexual practices to its viewers. This mixed-methods questionnaire study aims to investigate whether the series can change attitudes towards safe sex in student populations, can promote the use of condoms in student populations, and whether television, in general, is a useful tool for promoting health education. Methods: A questionnaire, created on Microsoft Forms, was distributed to students at the University of Birmingham via Facebook groups between September 2021 and May 2022. To consent, participants had to be aged 18 or over, a student at the university, have seen the entire series of ‘It’s a Sin’, and read the study information. Data was confidentially stored within the University’s secured OneDrive in accordance with the study’s approved ethics application. Quantitative questions measured participants’ attitudes and behaviours using Likert scales. Qualitative data was analysed using thematic analysis. Quantitative Results: 78 students completed the questionnaire. 43 participants (55%) felt that the series ‘It’s a Sin’ promoted safe sex. 74 participants (96%) and 31 participants (39%) said they were ‘very likely’ or ‘likely’ to use condoms with a casual partner during penetrative sex and oral sex respectively. 27 participants (35%) felt that watching ‘It’s a Sin’ made them more likely to use condoms; of these 27 participants, all were ‘very likely’ or ‘likely’ to use condoms during penetrative sex, and 9 were ‘very likely’ or ‘likely’ to during oral sex. 49 participants (63%) and 53 participants (68%) felt that television is a good way to provide health education and to promote healthy behaviours respectively. Qualitative Results: 56 participants (72%) gave reasons why the series had been associated with an increased uptake in HIV testing. Three themes emerged: increased education and attention, decreased stigmatisation, and relatability of characters on screen. Conclusions: This study suggests that the series ‘It’s a Sin’ can influence attitudes towards and the uptake of safe sexual practices. It would be useful for further research - using larger, randomised samples - to explore impacts upon populations lesser-educated about sexual health, who potentially have more to gain from watching series such as ‘It’s a Sin’.

Keywords: GUM, It's a sin, media, sexual health, students, television, tv

Procedia PDF Downloads 92
8505 The Audit Quality Effects on Reputation of the Certified Public Accountants in Thailand

Authors: Prateep Wajeetongratana

Abstract:

This research aims to study the audit quality that affected to the reputation of the certified public accountants in Thailand. The researcher defined the population for this research as a group of the certified public accountants in Thailand who are the member of the federation of accounting professions under the royal patronage of his majesty the king also disclose their information .The total sampling size is 325. The results showed the audit quality factor has influence to the reputation of the certified public accountants in Thailand by accuracy auditing, objectiveness auditing and clearness auditing .These factors show by y1 = 1.381 + .372x1.1 + .309x1.2 + .305x1.3 can be describe as professional standard strictly factor (Y.1.1) and the new clients raised from word of mount of old clients regularly factor (Y.1.2) by regression coefficient (R2) as.242, this shows that such variables could predict the audit quality variable as 24.2 percent.

Keywords: audit quality, certified public accountants in Thailand, reputation

Procedia PDF Downloads 245
8504 Diplomatic Public Relations Techniques for Official Recognition of Palestine State in Europe

Authors: Bilgehan Gultekin, Tuba Gultekin

Abstract:

Diplomatic public relations gives an ideal concept for recognition of palestine state in all over the europe. The first step of official recognition is approval of palestine state in international political organisations such as United Nations and Nato. So, diplomatic public relations provides a recognition process in communication scale. One of the aims of the study titled “Diplomatic Public Relations Techniques for Recognition of Palestine State in Europe” is to present some communication projects on diplomatic way. The study also aims at showing communication process at diplomatic level. The most important level of such kind of diplomacy is society based diplomacy. Moreover,The study provides a wider perspective that gives some creative diplomatic communication strategies for attracting society. To persuade the public for official recognition also is key element of this process. The study also finds new communication routes including persuasion techniques for society. All creative projects are supporting parts in original persuasive process of official recognition of Palestine.

Keywords: diplomatic public relations, diplomatic communication strategies, diplomatic communication, public relations

Procedia PDF Downloads 450
8503 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 468
8502 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 68
8501 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 387
8500 Media Regulation and Public Sphere in the Digital Age: An Analysis in the Light of Constructive Democracy

Authors: Carlos Marden Cabral Coutinho, Jose Luis Bolzan de Morais

Abstract:

The article proposed intends to analyze the possibility (and conditions) of a media regulation law in a democratic rule of law in the twenty-first century. To do so, will be presented initially the idea of the public sphere (by Jürgen Habermas), showing how it is presented as an interface between the citizen and the state (or the private and public) and how important is it in a deliberative democracy. Based on this paradigm, the traditional perception of the role of public information (such as system functional element) and on the possibility of media regulation will be exposed, due to the public nature of their activity. A critical argument will then be displayed from two different perspectives: a) the formal function of the current media information, considering that the digital age has fragmented the information access; b) the concept of a constructive democracy, which reduces the need for representation, changing the strategic importance of the public sphere. The question to be addressed (based on the comparative law) is if the regulation is justified in a polycentric democracy, especially when it operates under the digital age (with immediate and virtual communication). The proposal is to be presented in the sense that even in a twenty-first century the media in a democratic rule of law still has an extremely important role and may be subject to regulation, but this should be on terms very different (and narrower) from those usually defended.

Keywords: constructive democracy, media, digital age, public sphere

Procedia PDF Downloads 371
8499 Development of an Integrated Criminogenic Intervention Programme for High Risk Offenders

Authors: Yunfan Jiang

Abstract:

In response to an identified gap in available treatment programmes for high-risk offenders with multiple criminogenic needs and guided by emerging literature in the field of correctional rehabilitation, Singapore Prison Service (SPS) developed the Integrated Criminogenic Programme (ICP) in 2012. This evidence-informed psychological programme was designed to address all seven dynamic criminogenic needs (from the Central 8) of high-risk offenders by applying concepts from rehabilitation and psychological theories such as Risk-Need-Responsivity, Good Lives Model, narrative identity, and motivational interviewing. This programme also encompasses a 6-month community maintenance component for the purpose of providing structured step-down support in the aftercare setting. These sessions provide participants the opportunity for knowledge reinforcement and application of skills attained in-care. A quantitative evaluation of the ICP showed that the intervention group had statistically significant improvements across time in most self-report measures of criminal attitudes, substance use attitudes, and psychosocial functioning. This was congruent with qualitative data from participants saying that the ICP had the most impact on their criminal thinking patterns and management of behaviours in high-risk situations. Results from the comparison group showed no difference in their criminal attitudes, even though they reported statistically significant improvements across time in their substance use attitudes and some self-report measures of psychosocial functioning. The programme’s efficacy was also apparent in the lower rates of recidivism and relapse within 12 months for the intervention group. The management of staff issues arising from the development and implementation of an innovative high-intensity psychological programme such as the ICP will also be discussed.

Keywords: evaluation, forensic psychology, intervention programme, offender rehabilitation

Procedia PDF Downloads 580
8498 Leadership of People with Physical Disabilities in Virtual Teams

Authors: Fatemeh Jafari Hemmat Abadi

Abstract:

Through empathy, caring, and nurturing, benevolent leaders can help people with disabilities overcome the stigma of disability and smile at their work environment and work. The main purpose of our research is to examine the performance of people with physical disabilities in virtual teams across geographical, cultural and linguistic barriers around the world. Our results show the relationship between benevolent leadership and the three components of well-being among administrative staff, disability including perceived discrimination, job satisfaction and the need for improvement. The two factors identified for productivity are pervasive team attitudes in the team and proper leadership by the team leader.

Keywords: benevolent leadership, virtual teams, group attitudes pervasive, climate including disability

Procedia PDF Downloads 156