Search results for: security education
9202 Islamic Education System: Implementation of Curriculum Kuttab Al-Fatih Semarang
Authors: Basyir Yaman, Fades Br. Gultom
Abstract:
The picture and pattern of Islamic education in the Prophet's period in Mecca and Medina is the history of the past that we need to bring back. The Basic Education Institute called Kuttab. Kuttab or Maktab comes from the word kataba which means to write. The popular Kuttab in the Prophet’s period aims to resolve the illiteracy in the Arab community. In Indonesia, this Institution has 25 branches; one of them is located in Semarang (i.e. Kuttab Al-Fatih). Kuttab Al-Fatih as a non-formal institution of Islamic education is reserved for children aged 5-12 years. The independently designed curriculum is a distinctive feature that distinguishes between Kuttab Al-Fatih curriculum and the formal institutional curriculum in Indonesia. The curriculum includes the faith and the Qur’an. Kuttab Al-Fatih has been licensed as a Community Activity Learning Center under the direct supervision and guidance of the National Education Department. Here, we focus to describe the implementation of curriculum Kuttab Al-Fatih Semarang (i.e. faith and al-Qur’an). After that, we determine the relevance between the implementation of the Kuttab Al-Fatih education system with the formal education system in Indonesia. This research uses literature review and field research qualitative methods. We obtained the data from the head of Kuttab Al-Fatih Semarang, vice curriculum, faith coordinator, al-Qur’an coordinator, as well as the guardians of learners and the learners. The result of this research is the relevance of education system in Kuttab Al-Fatih Semarang about education system in Indonesia. Kuttab Al-Fatih Semarang emphasizes character building through a curriculum designed in such a way and combines thematic learning models in modules.Keywords: Islamic education system, implementation of curriculum, Kuttab Al-Fatih Semarang, formal education system, Indonesia
Procedia PDF Downloads 3379201 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors
Authors: M. S. Razana, Z. W. Shafiuddin
Abstract:
Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification
Procedia PDF Downloads 2389200 Enabling Service Innovation in Higher Education Institutions by Means of Leveraging Knowledge Management Practices
Authors: Mulalo Mushaisano
Abstract:
It has been revealed in the existing literature that specific knowledge management practices can be implemented and utilized in organizations to enable sustaining service innovation. This kind of innovation is of crucial importance in service environments such as institutions of higher education because it allows the delivery of enhanced services which are designed to add value and deliver better services to clients. However, there is a widespread lack of the necessary implementation of essential knowledge practices in higher education institutions owing to a variety of internal challenges and barriers. The primary objective of the study was to identify the essential knowledge management practices required for the enablement of service innovation. The main outcome was the development of a framework of knowledge management practice which can be applied in institutions of higher education to achieve service innovation. The study will address the gap in where existing literature mostly explored the aforementioned processes in the context of commercial and corporate organizations and not in the higher education environment.Keywords: higher education, innovation, knowledge management, service innovation
Procedia PDF Downloads 1469199 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure
Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano
Abstract:
Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security
Procedia PDF Downloads 1699198 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women
Authors: Abeer Al Kalbani
Abstract:
Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.Keywords: food security, household food security, utilization, role of women
Procedia PDF Downloads 4119197 Job Satisfaction and Commitment among Academic Staff of Selected Colleges of Education in Kano and Kaduna States of Nigeria
Authors: Mary Okonkwo Ekwy
Abstract:
The problem of the growing disillusionment of College of Education teachers with academic life vis-à-vis their job satisfaction and commitment was investigated in this study with a view to finding out if both their job satisfaction and commitment have suffered, and to find out if there was a relationship between job satisfaction and commitment among these College of Education teachers. Due consideration was also given in the study to the possible effects of demographic variables on attitudes to their job. To carry out a study of job satisfaction and commitment among the College of Education teachers and to explore the relationship between them, research instruments were used for measuring the levels of job satisfaction and commitment among them. A sample of 200 Colleges of Education teachers, comprising 15 Professors, 9 Principal Lecturers, 70 Senior Lecturer and 106 Lecturers was used for the study. Five major hypothesis were tested with regard to the relationship between job satisfaction and commitment among the teachers. The Pearson correlation, the F-ratio, and regression analysis were used for data analysis and hypothesis testing. The result of this investigation suggests that, perhaps the best way to secure the commitment of teachers is to ensure their job satisfaction. Future investigations will further enrich our knowledge about these very important themes.Keywords: job satisfaction, commitment, academic staff, college of education
Procedia PDF Downloads 5569196 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 999195 Educational Justice as the Basis for Social Justice
Authors: Baratali Monfaredraz
Abstract:
The concept of justice has been able to occupy a lot of people’s minds and speeches for a long time. Justice has various dimensions such as economic justice, judicial justice, political justice, educational justice, ethnical justice and etc. Educational justice as one of the most basic dimensions of justice can alter our education in every field and it can flourish the talents and capabilities on macro level. One of the most efficient ways for social justice realization is to provide equal opportunities for all people in the society to be able to access equally to education as their human rights since today how progress occurs in education is regarded as the index of social development. On this basis, especially developing countries try to provide equal opportunities for all people in terms of access to education, specifically in higher education. At present, private education system violates the principles of conducting effort, meeting the needs and in part realizing the capabilities and so it cannot be justified to be a fair conductance. It seems that providing higher quality education in public schools and lowering role of teacher and educational facilities in educational achievement can be considered as a proper way to remove the discrimination in terms of unequal distribution of educational facilities. In addition, higher education development in deprived regions can initialize social activities among the inhabitants of these regions. Justice in educational field can result in access of all people to economic and social situations and job opportunities in future.Keywords: educational justice, deprivation, private schools, higher education, job opportunities
Procedia PDF Downloads 4899194 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 4569193 Imperatives for Teacher Empowerment in Devising Extension Education as Part of the Holistic Curriculum for Hospitality and Tourism Domains: A Conceptual Study in Indian Context
Authors: Rajiv Mishra, Mantun Kumar Singh
Abstract:
The role of educator or teacher in the Indian context is circumscribed by the objective of social transformation as articulated in the Indian National Movement and later enshrined in the Preamble to the Indian Constitution, in the Fundamental Rights and in the Directive Principles of State Policy. Extension, which is the additional dimension of professional practice among teachers at higher education can be used as a revolutionary tool to modify the existing slogan of ‘education for all’ to ‘education for all and for-ever’, thereby making the ‘life-long education’, a reality. This conceptual paper addresses the twin needs of preparing the students for individual growth as also to facilitate them to contribute to social development. It focuses on the inclusion of the measures required to be taken for providing social consciousness and sensitivity, as this happens to be a neglected part of the curriculum. The extra effort so needed to build community based activities presupposes the requirement for professional training to be given to the hospitality and tourism educators as a continuing education initiative.Keywords: continuing education, extension activities, holistic curriculum, hospitality and tourism educators
Procedia PDF Downloads 3229192 Sustainable Food Systems and the Importance of Food Safety in Ensuring Sustainability
Authors: Özlem Turan, Şule Turhan
Abstract:
About 1 billion people in the world are suffering from hunger. Approximately 1.3 billion tons of produced food is wasted each year as well. While the waste of industrialized countries is 670 million tons per year, the waste per year in developing countries is estimated as 630 million tons. When evaluated in this respect, the importance of sustainability and food security can be seen clearly. Food safety is defined as taking the necessary measures and eliminating all risk arising from food. The goal of sustainable food security is, protection of consumer health, development of safe food and beverages trade nationally and internationally and to ensure reliable fair trade schemes. In this study, this study will focus on sustainable food systems and food security, by examining the food wastage and losses from environmental and economic point of views and the precautions that need to be taken will be discussed.Keywords: food, food safety, food systems, sustainability
Procedia PDF Downloads 3889191 Money Laundering and Financing of Terrorism
Authors: Covadonga Mallada Fernández
Abstract:
Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.Keywords: control of financial flows, money laundering, terrorism, financing of terrorism
Procedia PDF Downloads 4589190 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education
Authors: Hongmei Chi
Abstract:
The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning
Procedia PDF Downloads 1039189 Perceptions of Islamic Education Teachers on the Implementation of 21st Century Learning Practices
Authors: Hafizul Rasdi
Abstract:
This study was conducted to find out the perceptions of Islamic Education teachers on the implementation of 21st century learning practices in Kuching, Sarawak. This study uses the field method. Eight respondents were selected based on the interviews and focus group discussions conducted among teachers in four primary school in Kuching, Sarawak. This study is focused to find out the perceptions of Islamic Education teachers on the implementation of 21st century learning as well as the importance of 21st century learning in the subject of Islamic Education. Data were collected using library research, semi-structured interview transcripts and focus group discussions. Data analysis methods used was descriptive analysis. The findings of the study have shown that Islamic Education teachers in primary school in Kuching, Sarawak agreed on the implementation of 21st Century Learning Practices in Islamic Education subject. The finding also show that the application of 21st Century Learning Practices in the subject of Islamic Education can help improve students mastery of the subject.Keywords: perceptions, Islamic education, 21st century learning practices, teachers
Procedia PDF Downloads 719188 Data Integrity between Ministry of Education and Private Schools in the United Arab Emirates
Authors: Rima Shishakly, Mervyn Misajon
Abstract:
Education is similar to other businesses and industries. Achieving data integrity is essential in order to attain a significant supporting for all the stakeholders in the educational sector. Efficient data collect, flow, processing, storing and retrieving are vital in order to deliver successful solutions to the different stakeholders. Ministry of Education (MOE) in United Arab Emirates (UAE) has adopted ‘Education 2020’ a series of five-year plans designed to introduce advanced education management information systems. As part of this program, in 2010 MOE implemented Student Information Systems (SIS) to manage and monitor the students’ data and information flow between MOE and international private schools in UAE. This paper is going to discuss data integrity concerns between MOE, and private schools. The paper will clarify the data integrity issues and will indicate the challenges that face private schools in UAE.Keywords: education management information systems (EMIS), student information system (SIS), United Arab Emirates (UAE), ministry of education (MOE), (KHDA) the knowledge and human development authority, Abu Dhabi educational counsel (ADEC)
Procedia PDF Downloads 2269187 Factors Affecting the Success of Private Higher Education Businesses in Malaysia
Authors: Nasir Khalid
Abstract:
In Malaysia, higher education is big business. There are many companies that are willing if not already to invest heavily in higher education for students that aspire to pursue their degree in diploma, undergraduate as well as graduate studies. These companies sometimes even have a joint venture twinning program with other already established universities in and across Europe, Australia, the United States, and Canada. Some of these investments have been successful whereas others find themselves limited by the obstacle of receiving new students. Recently, the Malaysian Ministry of Higher Education has stopped issuing licenses to set up private institutions of higher education. This paper will thus examine the factors affecting the success of private higher education businesses in Malaysia. The samples will consist of thirty private institutions [N=30]. Among the factors that will be mentioned in the literature are academic programs, student quality and achievement, student employability, alumni satisfaction, student enrolment, institutional environment, lecturer-quality and effectiveness of supporting staff. A questionnaire was developed and analyzed using statistical analysis. The result of this study found that the top three factors affecting the success of private higher education businesses in Malaysia are student enrolment, institutional environment and the academic programs offered.Keywords: higher education business, successful business factors, private institutions, business in Malaysia
Procedia PDF Downloads 3199186 A Scoping Review to Explore the Policies and Procedures Addressing the Implementation of Inclusive Education in BRICS Countries
Authors: Bronwyn S. Mthimunye, Athena S. Pedro, Nicolette V. Roman
Abstract:
Inclusive education is a global concern, in the context of Brazil, Russia, India, China, and South Africa. These countries are all striving for inclusive education, as there are many children excluded from formal schooling. The need for inclusive education is imperative, given the increase in special needs diagnoses. Many children confronted with special needs are still not able to exercise their basic right to education. The aim of conducting this scoping review was to explore the policies and procedures addressing the implementation of inclusive education in Brazil, Russia, India, China, and South Africa. The studies included were published between 2006-2016 and located in Academic Search Complete, ERIC, Medline, PsycARTICLES, JSTOR, and SAGE Journals. Seven articles were included in which all of the articles reported on inclusive education and the status of implementation. The findings identified many challenges faced by Brazil, Russia, India, China, and South Africa that affect the implementation of policies and programmes. Challenges such as poor planning, resource-constrained communities, lack of professionals in schools, and the need for adequate teacher training were identified. Brazil, Russia, India, China, and South Africa are faced with many social and economic challenges, which serves as a barrier to the implementation of inclusive education.Keywords: special needs, inclusion, education, scoping review
Procedia PDF Downloads 3039185 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things
Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala
Abstract:
In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.Keywords: embedded computing, internet of things, mobile computing, wireless technologies
Procedia PDF Downloads 3229184 Exploring the Contribution of Higher Education to Sustainable Development: A Bibliometric Analysis of Research on Social Sustainability
Authors: Mestawot Beyene Tafese, Erika Kopp
Abstract:
Sustainable development, aimed at meeting current needs while safeguarding the needs of future generations, is a global imperative. Higher education stands as a pivotal force in fostering sustainable values and behaviors. However, most scholars and governments primarily focus on environmental and economic aspects. Consequently, this study examines the distribution patterns of higher education for social sustainability. The study highlights overall annual scientific production trends, leading journals and countries in scientific publication, most researched topics, and frequently used keywords. The study utilized a bibliometric method with the aid of the R Studio program. The analysis reveals Sustainability (Switzerland) as the leading journal, with 292 articles published, followed by the International Journal of Sustainability in Higher Education, which published 186 articles. Additionally, the USA is identified as the leading country, with Spain ranking second in producing research related to higher education for socially sustainable development. Among the 54 African countries, only South Africa ranks 13th, contributing fifty-nine scientific articles. Furthermore, higher education for sustainability, sustainable education, sustainable development goals, etc., emerge as the most researched topics, while the term "higher education" is prevalent in 29% and "sustainability" in 28% of the documents. Notably, according to the analysis, social sustainability is the focus of only 3% of articles. This suggests that academics researching sustainable development and higher education have overlooked social sustainability, a crucial human component of sustainable development. Consequently, the researchers concluded that social academics who are interested in studying sustainable development and higher education should give priority to social sustainability.Keywords: higher education, bibliometric analysis, social sustainability, sustainable development
Procedia PDF Downloads 709183 Building Resilience through Inclusion of Global Citizenship Education in Pre-Service Teacher Education in Pakistan
Authors: Fouzia Ajmal
Abstract:
Global Citizenship Education (GCED) could prove to be the best solution to prevent violent extremism as it will sustain a respect for all and build up a feeling of having a place with humankind. To meet the target 4.7 of sustainable development goals, it is important to focus on global citizenship education at all levels of education in general and in pre-service teacher education in particular so that the message and practices reach the young masses. The pre-service education is imperative to develop knowledge, skills and disposition of prospective teachers. The current study was conducted to investigate the integration of GCED in pre-service teacher education curriculum of Pakistan. The study was delimited to B.Ed (hons) Elementary Education programme. The curriculum of B.Ed Elementary developed by Higher Education Commission was analyzed through Curriculum Alignment Matrix. 31 course outlines were analyzed, and percentage was used to analyze the level of integration of GCED in courses. The analyses depicted that the concepts of civic sense, tolerance, duties and rights of citizens and fundamental rights of humans are partially aligned in a few of the courses. The tolerance, active citizenship, and respect for cultural diversity and religious harmony are evident in Pakistan Studies and teaching of social studies courses. The relevant books are also mentioned as resources in these courses. The intercultural understanding is not very evident while globalization is mentioned in a few courses. It is recommended that a deliberate effort may be made to integrate concepts of Global Citizenship Education so as to enable the prospective teachers in developing necessary skills to play their active role in promoting peace and building resilience to extremism in elementary school students.Keywords: curriculum analysis, global citizenship education, preservice teacher education, resilience building
Procedia PDF Downloads 1519182 Access to Higher Education During Covid-19: Challenges and Key Success Factors
Authors: Samia Jamshed Nauman Majeed
Abstract:
Purpose: Globally, the pandemic of COVID -19 has created a massive distraction for educational reforms influencing learning options, education access, and outcomes of students in more than 190 countries which has carved marks in history. To explore the challenges and complications confronted by students and faculty members while ensuring access to online education, qualitative research was conducted. Methodology: For this purpose, a series of focus group discussions were conducted in different regions of Pakistan, which revealed interesting findings shared by Panelists, which include Vice-Chancellors, Rectors, and Deans of different private and public sector universities of Pakistan. The qualitative research aims to explore the challenges and success factors of online educations by students with diverse backgrounds of higher education institutions to maximize student educational outcomes. Findings: The findings revealed several challenges and opportunities when it comes to online education for students of higher education institutions. Simultaneously, the researchers discovered the key success factors necessary for online education. Lastly, the paper presents the research limitations and future research recommendations to streamline online education in a better way ensuring the students' success. Originality: The pandemic has forced the closure of social, business, and educational activities, which has drastically influence the quality of education with its subsequent impact on the economy. In response, numerous universities across the globe are forced to suspend their educational activities by closing the universities. Though online education has been adopted worldwide by the universities, which brought numerous issues for academia, particularly for underdeveloped countries, and Pakistani higher education reforms are no exception to this.Keywords: online education, higher education institutions, COVID-19, challenges, key success factors
Procedia PDF Downloads 929181 Thai Primary School Teachers’ Attitude and Preparedness to Teach Students with Autism in the General Education Classroom
Authors: Sunanta Klibthong
Abstract:
Inclusive education services for students with Autism remains in its early developmental stages in Thailand. Despite many more children with autism are attending schools since the Thai government introduced the Education Provision for People with Disabilities Act in 2008, the services students with autism and their families receive are generally lacking. This quantitative study used Attitude and Preparedness to Teach Students with Autism Scale (APTSAS) to investigate 110 primary school teachers’ attitude and preparedness to teach students with autism in the general education classroom. Descriptive statistical analysis of the data found that student behaviour was the most significant factor in building teachers’ negative attitudes students with autism. The majority of teachers also indicated that their pre-service education did not prepare them to meet the learning needs of children with autism in particular, those who are non-verbal. The study is significant and provides direction for enhancing teacher education for inclusivity in Thailand.Keywords: attitude, autism, teachers, Thailand
Procedia PDF Downloads 2809180 Challenges of Domestic Water Security for Sustainable Development in North Central Belt of Nigeria
Authors: Samuel Ibbi Ibrahim, Isaiah Ndalassan Ibrahim
Abstract:
Accessibility and availability of good quality water have become a major concern among different users. This paper examines the caustic importance of water security in relation to people’s desire for survival. It observed the democratic ideology of national policy on domestic water supply and demand and its implementation for national and societal development. It used analogy on equilibrium approach to ascertain the household water security. In most communities, it is glaring that several public water management in operation for several years are hardly performing efficiently to reach equilibrium demand. Moreover most settlements being rural or urban lack effective public water system that could ensure regular supplies to the population. The terrain and gradual declining of efficient rainfall northward poses great challenge to the region in managing water supply and demand adequately. This study itemized the need for the government to get clear strategy for a sustainable development on better water efficiency. Partnership in providing workable policy on water security is considered apparently important. It is also suggested that water plant treatment should be established in every medium-sized towns in the country.Keywords: good quality of water, water accessibility, water availability, water sustainable
Procedia PDF Downloads 5319179 A Study on Abnormal Behavior Detection in BYOD Environment
Authors: Dongwan Kang, Joohyung Oh, Chaetae Im
Abstract:
Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies
Procedia PDF Downloads 3269178 Ensuring a Sustainable National Development Through Entrepreneurship Education in Nigerian Tertiary Institutions
Authors: Adeyemi Oluremi Olubusuyi
Abstract:
In most of the developed countries, entrepreneurship education has been and will continue to be, a great economic stimulator. Entrepreneurship advantages cannot be overemphasized in any society that desires sustainable national development because it creates new technologies, production and services; which in turn encourage improved productivity and rapid economic growth. Economic growth will invariably have positive influences on the health, thereby leading to sound body systems, increase in the lifespan, improvement in social status and standard condition of living. Promoting an effective application of entrepreneurship education principle will, in no small measure, propel Nigeria to the much desired enviable national development level which the country is currently yearning for. The focus of this paper is to discuss entrepreneurship education with reference to its concept, nature, objectives and development approaches.Keywords: entreprenuership, entrepreneurship education, national development, tertiary institutions
Procedia PDF Downloads 1179177 Classroom Readiness of Open and Distance Learning Student Teachers
Authors: E. C. du Plessis
Abstract:
Teaching practice is a major component of teacher education and the preparation of teachers for the real-life classroom throughout the world. Learning is seen as a constructive process, whether it is classroom based or takes place by means of distance education. Blending theory and practice with effective education in distance context as part of situated learning is crucial. Therefore, the aim of this research was to determine distance education student teachers' classroom readiness on completion of the teaching practice modules of their Postgraduate Certificate in Education (PGCE) course. A qualitative research approach was used for the collection, analysis, and interpretation of data. A total of 15 student teachers enrolled at the College of Education of an ODL (Open and Distance Learning) institution were selected and volunteered to participate in the research. In the light of the results of the research, it is recommended that more attention is given to the interaction between mentor teachers, academic lecturers, and student teachers, as well as the expectations and responsibilities of these role-players.Keywords: communities of practice, mentor teachers, open and distance learning, practicum, professional development, student teachers, teaching practice
Procedia PDF Downloads 1689176 Terrorism: A Threat in Constant Evolution Still Misunderstood
Authors: M. J. Gazapo Lapayese
Abstract:
It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.Keywords: responses, resilience, security, terrorism
Procedia PDF Downloads 4569175 The Implementation of Strengthening Institutional Model of Women Farmers Group in Developing Household Food Security
Authors: Rahmadanih, Sitti Bulkis, A. Amrullah, R. M. Rukka, N. M. Viantika
Abstract:
Food security is still a global issue, including in Indonesia. In South Sulawesi, this issue also occurs in members of farmer groups/women farmer groups. This study aims to (1) describe the implementation of strengthening institutional model of Women Farmer Groups (WFG) and (2) analyzing the capacity building of WFG members in order to develop food security after the implementations on institutional model. The research was conducted in Bulukumba and Luwu Utara District, South Sulawesi, Indonesia. The research was designed with qualitative and quantitative (mixed) method. Qualitative data were collected through in-depth interview and Focus Group Discussion (FGD); while quantitative data collected through a household survey of WGF members. Two WGF were selected they are WFG in Bulukumba and WGF in Luwu Utara District. Both WGF has been selected as the case unit, which consisting of 60 households. Institutional strengthening model that been implemented is a combination model of (1) institutional support and (2) capacity development of WGF members. The model of institutional support aim is to develop food security could be achieved through facilitation on produce banana chips (initiate a business group formation) and preparation of institution rule (AD/ART). (2) The developing Model of WFG members capacity building are (a) technical training of banana chips producing process, also food and nutrition counseling as well as the utilization of the yard, (b) processing of food products from their yards. Food and nutrition knowledge of WFG members was increased about 30% - 60% and accompanied by the development of households’ food security by 6.7% - 10.0%.; when compared to last year percentage.Keywords: food security, institutional strengthening, model implementation, women farmer group
Procedia PDF Downloads 1839174 Social Learning and the Flipped Classroom
Authors: Albin Wallace
Abstract:
This paper examines the use of social learning platforms in conjunction with the emergent pedagogy of the ‘flipped classroom’. In particular the attributes of the social learning platform “Edmodo” is considered alongside the changes in the way in which online learning environments are being implemented, especially within British education. Some observations are made regarding the use and usefulness of these platforms along with a consideration of the increasingly decentralized nature of education in the United Kingdom.Keywords: education, Edmodo, Internet, learning platforms
Procedia PDF Downloads 5469173 A Framework for Internet Education: Personalised Approach
Authors: Zoe Wong
Abstract:
The purpose of this paper is to develop a framework for internet education. This framework uses the personalized learning approach for everyone who can freely develop their qualifications & careers. The key components of the framework includes students, teachers, assessments and infrastructure. It allows remove the challenges and limitations of the current educational system and allows learners' to cope with progressing learning materials.Keywords: internet education, personalized approach, information technology, framework
Procedia PDF Downloads 363