Search results for: security education
9172 Ideal School of the Future from the Parents´ View: Quantitative Research of Faculty of Education of the University of Hradec Králové
Authors: Yveta Pohnětalová
Abstract:
The topic of possible forms of future schools according to rapid changes of life in the 21st century has become to reach several economic and social prognoses. In our research, we have tried to find out what the future school form is according to pupils’ parent’s view. School is a part of life of each person and based on own experience there is a certain individual picture created about a possible look of future education. The aim of our quantitative research was to find out how parents of first grade primary school pupils see the ideal school of the future. The quantitative research realized at the Faculty of Education of the University of Hradec Králové (Czech Republic). By statistical analysis of gained data from 120 respondents, there have been several views of schools of future identified in terms of mission and also the way of education. But a common indicator according to addressed parents would be more focused on the overall personality development rather than the field practice which is related to a realistic idea that school of the future is not and will not be the only source of education.Keywords: parents’ approach, school of the future, survey, ways of education
Procedia PDF Downloads 2419171 Management of English Language Teaching in Higher Education
Authors: Vishal D. Pandya
Abstract:
A great deal of perceptible change has been taking place in the way our institutions of higher learning are being managed in India today. It is believed that managers, whose intuition proves to be accurate, often tend to be the most successful, and this is what makes them almost like entrepreneurs. A certain entrepreneurial spirit is what is expected and requires a degree of insight of the manager to be successful depending upon the situational and more importantly, the heterogeneity as well as the socio-cultural aspect. Teachers in Higher Education have to play multiple roles to make sure that the Learning-Teaching process becomes effective in the real sense of the term. This paper makes an effort to take a close look at that, especially in the context of the management of English language teaching in Higher Education and, therefore, focuses on the management of English language teaching in higher education by understanding target situation analyses at the socio-cultural level.Keywords: management, language teaching, English language teaching, higher education
Procedia PDF Downloads 2529170 Developing Elusive Frame for Creativity, ICT and Teacher Education
Authors: Rahul Malhotra, Anu Malhotra, Veena Bana
Abstract:
Information and Communication Technology (ICT) plays an imperative part in enhancing the quality of life, together with education. This research work is an important consequence to endow with substantiation for the effective use of Information and Communication Technology (ICT) tools for educational rationale. Perspective teachers and students of technical education from various regions of Rajasthan participated in the survey based research work. Condensed from the analysis and interpretations of the data collected from Perspective teachers and students of technical education from various regions of Rajasthan, it is inevitable that use of Information and Communication Technology (ICT) for educational purpose can augment student’s creativity and achievement ability. The Chi-Square statistics produce the evidence of the effective use of Information and Communication Technology (ICT) in enhancing the creativity and achievement ability of the perspective teachers and students of technical education.Keywords: ICT, education, creativity, elusive frame
Procedia PDF Downloads 4699169 The Analysis of the Challenge China’s Energy Transition Faces and Proposed Solutions
Authors: Yuhang Wang
Abstract:
As energy is vital to industrial productivity and human existence, ensuring energy security becomes a critical government responsibility. The Chinese government has implemented the energy transition to safeguard China’s energy security. Throughout this progression, the Chinese government has faced numerous obstacles. This article seeks to describe the causes of China’s energy transition barriers and the steps taken by the Chinese government to overcome them.Keywords: energy transition, energy market, fragmentation, path dependency
Procedia PDF Downloads 1089168 Cognitive eTransformation Framework for Education Sector
Authors: A. Hol
Abstract:
21st century brought waves of business and industry eTransformations. The impact of change is also being seen in education. To identify the extent of this, scenario analysis methodology was utilised with the aim to assess business transformations across industry sectors ranging from craftsmanship, medicine, finance and manufacture to innovations and adoptions of new technologies and business models. Firstly, scenarios were drafted based on the current eTransformation models and its dimensions. Following this, eTransformation framework was utilised with the aim to derive the key eTransformation parameters, the essential characteristics that have enabled eTransformations across the sectors. Following this, identified key parameters were mapped to the transforming domain-education. The mapping assisted in deriving a cognitive eTransformation framework for education sector. The framework highlights the importance of context and the notion that education today needs not only to deliver content to students but it also needs to be able to meet the dynamically changing demands of specific student and industry groups. Furthermore, it pinpoints that for such processes to be supported, specific technology is required, so that instant, on demand and periodic feedback as well as flexible, dynamically expanding study content can be sought and received via multiple education mediums.Keywords: education sector, business transformation, eTransformation model, cognitive model, cognitive systems, eTransformation
Procedia PDF Downloads 1409167 Culture Dimensions of Information Systems Security in Saudi Arabia National Health Services
Authors: Saleh Alumaran, Giampaolo Bella, Feng Chen
Abstract:
The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of research on the role and impact of an organisation’s cultural dimensions on information security. This research investigated and analysed the role and impact of cultural dimensions on information security in Saudi Arabia health service. Hypotheses were tested and two surveys were carried out in order to collect data and information from three major hospitals in Saudi Arabia (SA). The first survey identified the main cultural-dimension problems in SA health services and developed an initial information security culture framework model. The second survey evaluated and tested the developed framework model to test its usefulness, reliability and applicability. The model is based on human behaviour theory, where the individual’s attitude is the key element of the individual’s intention to behave as well as of his or her actual behaviour. The research identified six cultural dimensions: Saudi national culture, Saudi health service leadership, employees’ trust, technology, multicultural interactions and employees’ job roles. The research also identified a set of cultural sub-dimensions. These include working values and norms, tribe values and norms, attitudes towards women, power sharing, vision, social interaction, respect and understanding, hospital intra-net, hospital employees’ language(s) used, multi-national culture, communication system, employees’ job satisfaction and job security. The research identified that (a) the human behaviour towards medical information in SA is one of the main threats to information security and one of the main challenges to SA health authority, (b) The current situation of SA hospitals’ IS cultures is falling short in protecting medical information due to the current value and norms towards information security, (c) Saudi national culture and employees’ job role are the main dimensions playing major roles in the employees’ attitude, and technology is the least important dimension playing a role in the employees’ attitudes.Keywords: cultural dimension, electronic health record, information security, privacy
Procedia PDF Downloads 3539166 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses
Authors: John Hardy, Paul Lushenko
Abstract:
he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.Keywords: gray zone, international security, military operations, national security, strategy
Procedia PDF Downloads 1629165 Food Security from a Spatial Perspective; The Situation in Advanced and Less Advanced Economies
Authors: Kristina Thorell
Abstract:
Food security has been one of the most important policy issues on the global arena after the Second World War. The overall aim of this presentation is to describe preconditions for a sustainable food supply from a spatial perspective. Special attention is paid to the differences between advanced and less advanced economies around the world. The theoretical framework is based upon models which are explaining complex systems of factors that affect the preconditions for agricultural productions. In additions to this, theories about how population and environmental pollution change through different stages of societal development are explained. The results are based upon data of agricultural practices, population growth, hunger and nutrition levels from different countries around the world. The analysis shows that factors which affect preconditions for agricultural production are dynamic. Factors which support the food security in the near future are a decreasing population growth, technological development and innovation but the environmental crisis is associated to high risks. It is, therefore, important to develop environmental policies and improved methods for organic farming. A final conclusion is that the spatial pattern is clear; the food supply is sufficient within advanced economies but rather complicated in development countries.Keywords: food security, agricultural geography, demography, advanced economies, population growth, agricultural practices
Procedia PDF Downloads 3209164 Parents' View of Children's Preschool Education in Slovakia
Authors: Sona Lorencova
Abstract:
The practice of kindergartens shows that the communication and cooperation of teachers and directors of kindergartens with parents, who come with different expectations and ideas about preschool education, is becoming an increasing problem, which leads to many misunderstandings in their mutual functioning. In practice, little attention is paid to communication and cooperation between kindergartens and families, whether in the professional development of educators, in professional articles and publications, or in the field of research. The approach of teachers to parents whose children attend kindergarten requires more and more skills on the part of educators, which is also related to the introduction of the institute of compulsory preschool education. Thus, the discrepancy in mutual expectations and requirements for children's preschool education on the part of the kindergarten and the family is increasing. The aim of the research was to look into the world of parents and learn about their subjective experience with preschool education of children in kindergarten. The findings could be useful in the search for appropriate strategies for mutual communication and cooperation between kindergartens and families in order to achieve more effective progress for children in education. The data were collected through the method of a constellation with figures, semi-structured interviews, and the use of a research diary. Through an interpretive phenomenological analysis, it was found that the parents' view of preschool education in kindergarten is connected to 6 basic topics - parenting with a preschooler, adaptation to kindergarten, professionalism of teachers, cooperation with kindergarten, and parents' satisfaction with preschool education. The conducted research also revealed that the determinants at the level of microsystem, mesosystem, exosystem, macrosystem, and chronosystem influenced parents' view of children's preschool education in kindergarten.Keywords: preschool education, parents, kindergarten, interpretive phenomenological analysis, subjective experience
Procedia PDF Downloads 1069163 Developing Human Resources through Inclusive Education: A Study of Effectiveness of Government Policies in India
Authors: Sanjay Kumar Srivastava, Rajesh Srivastava
Abstract:
Human resource is the key point of success of any economy. From the past few decades, policies started to move in the route of expanding inclusive education with effective involvement of government.Governments of developing nations are generating policies for educational upliftment. Applying educational policies, the motive of the government is to maintain and develop the effective human resource within a society. The attention of the government includes primary education to higher education. It also involves professional training programmes related to every discipline. The aim of this paper is to find out the government policies in terms of expenditure and achievements for inclusive education to develop human resources in developing countries. A case of Indian experience has been taken into consideration. This approach generates a picture as to how India is enriching its educational system for human resource development and this research study will be useful for the policy makers to determine the appropriate level of overall spending of government and achievements in the education system for human resource development. Analytical research methodology has been adopted.Keywords: government policies, inclusive education, National Educational Policy, NCERT
Procedia PDF Downloads 3309162 Countering Terrorism through Social Media: Case Study in Indonesia
Authors: Mauly Budiyanti, Aisyah M. Anggiana
Abstract:
Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.Keywords: Indonesia, national security, social media, terrorism.
Procedia PDF Downloads 2249161 Climate Change, Agriculture and Food Security in Sub-Saharan Africa: What Effects and What Answers?
Authors: Abdoulahad Allamine
Abstract:
The objective of this study is to assess the impact of climate variability on agriculture and food security in 43 countries of sub-Saharan Africa. We use for this purpose the data from BADC bases, UNCTAD, and WDI FAOSTAT to estimate a VAR model on panel data. The sample is divided into three (03) agro-climatic zones, more explicitly the equatorial zone, the Sahel region and the semi-arid zone. This allows to highlight the differential impacts sustained by countries and appropriate responses to each group of countries. The results show that the sharp fluctuations in the volume of rainfall negatively affect agriculture and food security of countries in the equatorial zone, with heavy rainfall and high temperatures in the Sahel region. However, countries with low temperatures and low rainfall are the least affected. The hedging policies against the risks of climate variability must be more active in the first two groups of countries. On this basis and in general, we recommend integration of agricultural policies between countries is done to reduce the effects of climate variability on agriculture and food security. It would be logical to encourage regional and international closer collaboration on the development and dissemination of improved varieties, ecological intensification, and management of biotic and abiotic stresses facing these climate variability to sustainably increase food production. Small farmers also need training in agricultural risk hedging techniques related to climate variations; this requires an increase in state budgets allocated to agriculture.Keywords: agro-climatic zones, climate variability, food security, Sub-Saharan Africa, VAR on panel data
Procedia PDF Downloads 3949160 Administrative Reform and the Changing Nature of Higher Education: A Lesson from Indonesian Higher Education Reforms
Authors: Nurdiana Gaus, Mahmud Tang
Abstract:
This paper analyses changes being experienced by academics in Indonesian state university systems as a result of government-driven policy and the impacts of these changes on academics work and organisations. This analysis is located in the main concept of neoliberal agenda with its associated discourse of New Public Management. The purpose of this analysis is to show how public administrative reforms adopting neoliberal agenda have been disseminated in Indonesian higher education reform via policies and programmes of the government. This essay is expected to clarify the concept of neoliberalism in the administrative reforms within higher education institutions by examining and understanding its implementation in Indonesian context and how this impacted on the structural changes in universities and academics work.Keywords: neoliberalism, higher education, Indonesia, new public management
Procedia PDF Downloads 4879159 Women in Higher Education in Nigeria: A Panacea for Developmental Growth
Authors: Lucy Adesomon Okukpon, Margaret Omolara Akerele
Abstract:
Higher Education in Nigeria is sought after by women, they believe that the economic power and growth lies in the attainment and pursuit of higher Education. No nation in the world can boast of developmental growth when the women are not fully empowered educationally. The attainment of higher education spurs women to contribute meaningfully towards the growth and development of the Nigerian workforce. Recent innovations and trends reveal that over fifty per cent of Nigerian women have attained higher education within and outside the country. Women in Nigeria have expressed their growing concern of what becomes of the remaining 50 per cent who are unable to attain basic education. This concern has brought about the issue of funding which is a practical challenge towards the attainment of education for these vulnerable women. Another challenging factor is that most women often seek the permission of their husbands, brothers, fathers and uncles to enable them attain educational pursuit, especially when the institution is miles away from their place of abode. The solution to this problems from research findings reveal that the umbrella body which co-ordinates education for women in Nigeria (The National Council of Women Societies, NCWS) have taken it upon itself to provide educational learning centres in all the states of the Federation including Abuja the Nations capital city. This is to stem the ugly trend and enable women gain access to educational facilities provided for their growth and development. This positive stride has brought succour to women who hitherto have no hope of attaining any form of education. Moreover, awareness creation concerning higher education is translated into different Nigerian languages so that the women at the grassroots can benefit immensely and contribute towards the growth and development of the Nation. Their educational progress attest to the fact that Nigerian Women are happy for the educational opportunities provided and have vowed to attain greater heights particularly where higher education is concerned.Keywords: developmental growth, educational attainment, higher education, women in higher education, Nigeria
Procedia PDF Downloads 5039158 Exploring the Potential of Blockchain to Improve Higher Education
Authors: Tony Cripps, Larry Kimber
Abstract:
This paper will begin by briefly explaining how blockchain technology works. Then, after highlighting a few of the ways it promises to heavily impact all aspects of the digital landscape, the focus will shift to Blockchain in the field of education, with specific emphasis placed on practical applications in foreign language education. Blockchain is a decentralized Internet-based software application that guarantees truth in transactions. This means whenever two parties engage in a transaction using Blockchain, it is time-stamped, added to a block of other transactions, and then permanently attached to an unalterable ‘chain’ of blocks. The potential for developing applications with Blockchain is therefore immense, since software systems that ensure the impossibility of outside tampering are invaluable. Innovative ideas in every imaginable domain are presently being entertained and Blockchain in education is no exception. For instance, records kept within and between institutions of students’ grade performance, academic achievement and verification of assignment/course completion are just a few examples of how this new technology might potentially be used to revolutionize education. It is hoped that this paper will be of use to all educators interested in the application of technology in the field of education.Keywords: blockchain, disruption, potential, technology
Procedia PDF Downloads 1419157 From Arab Spring to Arabian Nightmare: State Failure and Identity in the Middle East
Authors: Kenneth Christie
Abstract:
Syria and Iraq are Arabian nightmares at the local, the regional and global levels in terms of human security and the protection of the vulnerable. Wracked by civil war, ethnic and political violence in the last 5 years in the case of Syria and 13 years in the case of Iraq, the body count now is staggering; the humanitarian crisis continues and there appears no end to this. A crisis that has claimed the lives of 200,000 people so far in Syria, sparked a humanitarian catastrophe fuelled violent Islamic extremism and exposed serious splits in the international community who appear to have no consensus. The international community’s failure to act is simply another sign of the desperate situation which has developed over conflicts that appears unsolvable in the immediate future and may be intractable in the long range. Three things are really at stake I’m going to argue in these continuing crises and how it will affect the human security dimensions of the conflict. Firstly, the protection of vulnerable individuals and civilians in the war, 2ndly, the dire consequences for regional instability as a result and thirdly the risks for minority and ethnic identities who are caught up in this, within and across these volatile borders. This paper will examine these elements and the consequences of the conflict in terms of human security, migration and development.Keywords: human security, migration, Syria and Iraq, conflict and development
Procedia PDF Downloads 3679156 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates
Procedia PDF Downloads 3109155 Students With Special Educational Needs in Regular Classrooms and their Peer Effects on Learning Achievement
Authors: José María Renteria, Vania Salas
Abstract:
This study explores the impact of inclusive education on the educational outcomes of students without Special Educational Needs (non-SEN) in Peru, utilizing official Ministry of Education data and implementing cross-sectional regression analyses. Inclusive education is a complex issue that, without appropriate adaptations and comprehensive understanding, can present substantial challenges to the educational community. While prior research from developed nations offers diverse perspectives on the effects of inclusive education on non-SEN students, limited evidence exists regarding its impact in developing countries. Our study addresses this gap by examining inclusive education in Peru and its effects on non-SEN students, thereby contributing to the existing literature. the findings reveal that, on average, the presence of SEN students in regular classrooms does not significantly affect their non-SEN counterparts. However, we uncover heterogeneous effects contingent on the specific type of SEN and students’ academic placement. These results emphasize the importance of targeted resources, specialized teachers, and parental involvement in facilitating successful inclusive education, particularly for specific SEN types and students positioned at the lower end of the academic achievement spectrum. In summary, this study underscores the need for tailored strategies and additional resources to foster the success of inclusive education and calls for further research in this field to expand our understanding and enhance educational policy.Keywords: inclusive education, special educational needs, learning achievement, Peru, Basic education
Procedia PDF Downloads 879154 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 469153 Food Insecurity and Other Correlates of Individual Components of Metabolic Syndrome in Women Living with HIV (WLWH) in the United States
Authors: E. Wairimu Mwangi, Daniel Sarpong
Abstract:
Background: Access to effective antiretroviral therapy in the United States has resulted in the rise in longevity in people living with HIV (PLHIV). Despite the progress, women living with HIV (WLWH) experience increasing rates of cardiometabolic disorders compared with their HIV-negative counterparts. Studies focusing on the predictors of metabolic disorders in this population have largely focused on the composite measure of metabolic syndrome (METs). This study seeks to identify the predictors of composite and individual METs factors in a nationally representative sample of WLWH. In particular, the study also examines the role of food security in predicting METs. Methods: The study comprised 1800 women, a subset of participants from the Women’s Interagency HIV Study (WIHS). The primary exposure variable, food security, was measured using the U.S. 10-item Household Food Security Survey Module. The outcome measures are the five metabolic syndrome indicators (elevated blood pressure [systolic BP > 130 mmHg and diastolic BP ≥ 85 mmHg], elevated fasting glucose [≥ 110 mg/dL], elevated fasting triglyceride [≥ 150 mg/dL], reduced HDL cholesterol [< 50 mg/dL], and waist circumference > 88 cm) and the composite measure - Metabolic Syndrome (METs) Status. Each metabolic syndrome indicator was coded one if yes and 0 otherwise. The values of the five indicators were summed, and participants with a total score of 3 or greater were classified as having metabolic syndrome. Participants classified as having metabolic syndrome were assigned a code of 1 and 0 otherwise for analysis. The covariates accounted for in this study fell into sociodemographic factors and behavioral and health characteristics. Results: The participants' mean (SD) age was 47.1 (9.1) years, with 71.4% Blacks and 10.9% Whites. About a third (33.1%) had less than a high school (HS) diploma, 60.4% were married, 32.8% were employed, and 53.7% were low-income. The prevalence of worst dietary diversity, low, moderate, and high food security were 24.1%, 26.6%, 17.0%, and 56.4%, respectively. The correlate profile of the five individual METs factors plus the composite measure of METs differ significantly, with METs based on HDL having the most correlates (Age, Education, Drinking Status, Low Income, Body Mass Index, and Health Perception). Additionally, metabolic syndrome based on waist circumference was the only metabolic factor where food security was significantly correlated (Food Security, Age, and Body Mass Index). Age was a significant predictor of all five individual METs factors plus the composite METs measure. Except for METs based on Fasting Triglycerides, body mass index (BMI) was a significant correlate of the various measures of metabolic syndrome. Conclusion: High-density Lipoprotein (HDL) cholesterol significantly correlated with most predictors. BMI was a significant predictor of all METs factors except Fasting Triglycerides. Food insecurity, the primary predictor, was only significantly associated with waist circumference.Keywords: blood pressure, food insecurity, fasting glucose, fasting triglyceride, high-density lipoprotein, metabolic syndrome, waist circumference, women living with HIV
Procedia PDF Downloads 629152 Application Programming Interface Security in Embedded and Open Finance
Authors: Andrew John Zeller, Artjoms Formulevics
Abstract:
Banking and financial services are rapidly transitioning from being monolithic structures focusing merely on their own financial offerings to becoming integrated players in multiple customer journeys and supply chains. Banks themselves are refocusing on being liquidity providers and underwriters in these networks, while the general concept of ‘embeddedness’ builds on the market readily available API (Application Programming Interface) architectures to flexibly deliver services to various requestors, i.e., online retailers who need finance and insurance products to better serve their customers, respectively. With this new flexibility come new requirements for enhanced cybersecurity. API structures are more decentralized and inherently prone to change. Unfortunately, this has not been comprehensively addressed in the literature. This paper tries to fill this gap by looking at security approaches and technologies relevant to API architectures found in embedded finance. After presenting the research methodology applied and introducing the major bodies of knowledge involved, the paper will discuss six dominating technology trends shaping high-level financial services architectures. Subsequently, embedded finance and the respective usage of API strategies will be described. Building on this, security considerations for APIs in financial and insurance services will be elaborated on before concluding with some ideas for possible further research.Keywords: embedded finance, embedded banking strategy, cybersecurity, API management, data security, cybersecurity, IT management
Procedia PDF Downloads 469151 The Causes and Potential Solutions for Foodborne Illness, Food Security, and Food Safety: In the Case of the East Harerghe Region of Oromia, Ethiopia
Authors: Tuji Jemal Ahmed, Abdi Mohammed, Geremew Geidare Kailo
Abstract:
Food security, foodborne illness, and food safety are critical issues that affect the East Harerghe region of Oromia, Ethiopia. Despite the region's potential for agriculture, food insecurity remains a significant problem, with many households experiencing chronic hunger and malnutrition. The region also experiences high rates of foodborne illnesses, including cholera, typhoid, and diarrhea, which are caused by poor hygiene and sanitation practices. Additionally, food safety is a significant challenge, particularly in rural areas, where there is a lack of infrastructure, inadequate food storage facilities, and limited access to information about food safety. There are several factors that contribute to the current situation in the East Harerghe region; firstly, the region is susceptible to natural disasters, for instance, drought, which affects crop yields and livestock production. Secondly, the region also experiences poor infrastructure, which affects the storage and transportation of food, particularly in rural areas. Thirdly, there is a lack of awareness and knowledge on good hygiene and sanitation practices, specifically during food handling, processing, and storage. Fourthly, unitability due to conflict and other forms of land degradation exacerbates food insecurity and malnutrition. Finally, limited access to financial resources and markets commonly affects smallholder farmers by their ability to produce and sell food. To address the current situation in that area, several potential solutions can be implemented; investment in infrastructure is necessary, especially in rural areas, to improve the storage and transportation of food. Education and awareness programs on good hygiene and sanitation practices should target local communities, smallholder farmers, and food vendors. Financial resources and markets should be made more accessible to smallholder farmers, particularly through the provision of credit and improved access to markets. Addressing the underlying causes of conflict and promoting peaceful coexistence can help to reduce displacement and loss of livelihoods. Finally, the enforcement of food safety regulations and the implementation of standards for food processing and storage facilities are necessary to ensure food safety. In conclusion, addressing the challenges of food security, foodborne illness, and food safety in the East Harerghe region requires a coordinated effort from various stakeholders, including the government, non-governmental organizations, and local communities. By implementing the solutions outlined above, the region can improve its food security, prevent foodborne illnesses, and keep food safe for its population. Eventually, building the resilience of communities to shocks such as droughts, floods, and conflict is necessary to ensure long-term food security in the region.Keywords: foodborne illness, food handling, food safety, food security
Procedia PDF Downloads 1069150 A Comparative Study of Automotive / Transportation Design Programs and University: Industry Cooperation Models in Higher Education
Authors: Efe Çukur
Abstract:
This study aims to discuss and compare i) widespread and generic design, particularly industrial design education in relation to the specific needs of the automotive/transportation industry, and ii) an automotive/transportation design education model within and under to provide the conditions of design education and automotive industry, especially in Turkey and T.R.N.C. The automotive industry is the 11th largest in the world ($1.51 trillion). One of the most important departments in this industry, along with sales, marketing and engineering, is the design department. The automotive industry is known as the locomotive industry, but there is a non-automotive design department on the academic side of Turkey. This suggestion; includes the presentation of a program proposal that meets the needs of the industry for Turkey and T.R.N.C., the second largest automobile manufacturing country in Europe. On the education side, industrial design education has become a generic title. Automotive design studios are divided into several subgroups. Even in the higher graduate education, the automotive design departments get their subgroups like exterior design and interior design. Transportation design, which is a subfield of industrial design, is offered as higher education in transportation design departments, particularly in America and Europe. In these departments, the curriculum is shaped to the needs of the sectors. Higher education transportation design programs began in the mid-20th century. Until those high education programs...Until these high education programs, the industry has adapted architectures and engineers for designer workloads. Still today transportation design graduates are not the majority of the design studios. The content of the study is an in-depth comparison of these institutions and how the requirements, demands of the industry are met in this regard and revealed. Some of the institutions are selected from Europe and US. To be analyzed under the headings of staff, courses, syllabus, University-Industry collaboration, and location selection. The study includes short, mid, and long term proposals and a hypothesis for discussion. In short, the study will not only provide a wide comparative scope of information on generic and specialized aspects of design education in different countries but also propose a higher education model for automotive / transportation design with solid data of requirements, methodology, and structure regarding learning outcomes, and especially industry cooperation.Keywords: design education, automotive - transportation design programs, transportation design, automotive industry in Turkey /T.R.N.C., automotive design education in Turkey /T.R.N.C.
Procedia PDF Downloads 969149 Investigation of the Field Trip Method’s Effectiveness: As a Way of Improving Pre-Service Teachers’ Views on Environmental Education
Authors: Abuzer Akgün, Ümit Duruk
Abstract:
This study was carried out in a period of four weeks thanks to voluntarily participation of twenty eight pre-service teachers enrolled diverse departments in Faculty of Education. The purpose of the study was to point out how pre-service teachers views on environmental education were affected by field trips. Prior to data collection, four open-ended questions were prepared and administered to all pre-service teachers in the working group. Data gathered at first and final week of the field trip were compared in a qualitative approach using content analysis. In conclusion, it is obvious that most of the participants don’t feel themselves quiet enough about environmental education and state this reason as a providing justification to participate voluntarily in the study. In the secondary school teaching context, they mostly emphasize on the vital importance of the environmental awareness level of the pupils in the schools. They also seem to think that they get a detailed knowledge of environmental education and claim that they will use this knowledge in order to bring up next generations in their professional career as teachers. Lastly, they state that observing the deteriorating materials directly in their own settings, might be more effective as regards improving environmental awareness.Keywords: science education, environmental education, environmental issues, field trip method
Procedia PDF Downloads 3609148 The Impact of Student-Led Entrepreneurship Education through Skill Acquisition in Federal Polytechnic, Bida, Niger State, Nigeria
Authors: Ibrahim Abubakar Mikugi
Abstract:
Nigerian graduates could only be self-employed and marketable if they acquire relevant skills and knowledge for successful establishment in various occupation and gainful employment. Research has shown that entrepreneurship education will be successful through developing individual entrepreneurial attitudes, raising awareness of career options by integrating and inculcating a positive attitude in the mind of students through skill acquisition. This paper examined the student- led entrepreneurship education through skill acquisition with specific emphasis on analysis of David Kolb experiential learning cycle. This Model allows individual to review their experience through reflection and converting ideas into action by doing. The methodology used was theoretical approach through journal, internet and Textbooks. Challenges to entrepreneurship education through skill acquisition were outlined. The paper concludes that entrepreneurship education is recognised by both policy makers and academics; entrepreneurship is more than mere encouraging business start-ups. Recommendations were given which include the need for authorities to have a clear vision towards entrepreneurship education and skill acquisition. Authorities should also emphasise a periodic and appropriate evaluation of entrepreneurship and to also integrate into schools academic curriculum to encourage practical learning by doing.Keywords: entrepreneurship, entrepreneurship education, active learning, Cefe methodology
Procedia PDF Downloads 5249147 Mathematical Knowledge a Prerequisite for Science Education Courses in Tertiary Institution
Authors: Esther Yemisi Akinjiola
Abstract:
Mathematics has been regarded as the backbone of science and technological development, without which no nation can achieve any sustainable growth and development. Mathematics is a useful tool to simplify science by quantification of phenomena; hence physics and chemistry cannot be done without Calculus and Statistics. Mathematics is used in physical science to calculate the measurement of objects and their characteristics, as well as to show the relationship between different functions and properties. Mathematics is the building block for everything in our daily lives, including the use of mobile devices, architecture design, ancient arts, engineering sports, and. among others. Therefore the study of Mathematics is made compulsory at primary, basic, and secondary school levels. Thus, this paper discusses the concepts of Mathematics, science, and their relationships. Also, it discusses Mathematics contents needed to study science-oriented courses such as physics education, chemistry education, and biology education in the tertiary institution. The paper concluded that without adequate knowledge of Mathematics, it will be difficult, if not impossible, for science education students to cope in their field of study.Keywords: mathematical knowledge, prerequisite, science education, tertiary institution
Procedia PDF Downloads 959146 The Role of Entrepreneurship Education in Enhancing Self-Employment: Students' Perspective
Authors: Stanley Fore, Gaetan Ngabonziza
Abstract:
In spite of the need for skilled labour in South Africa, tertiary education graduates are increasingly faced with unemployment, which poses a serious obstacle to the economic growth of the country. This paper is an outcome of the study that investigated students’ perceptions on the role of entrepreneurship education in enhancing graduates’ self-employment. The study was descriptive in nature and used a survey questionnaire to answer questions pertaining to the extent to which entrepreneurship education is important in enhancing self-employment endeavours. Collected data were analysed using of the statistical software for social science (SPSS) for descriptive statistics in the form of tables and charts. The study found that entrepreneurship education is critical in providing knowledge and skills that are required to succeed in self-employment. As one module of entrepreneurship does not ensure self-employment orientation or more positive expectations about entrepreneurial abilities and careers, this study suggests that students, irrespective of their field of study, should be given entrepreneurship modules in every academic year. This will help in reminding them that their success does not solely rely on their ability to find a better-paying employment but also on their ability to employ themselves.Keywords: entrepreneurship, education, self-employment, students
Procedia PDF Downloads 2579145 Designing Social Media into Higher Education Courses
Authors: Thapanee Seechaliao
Abstract:
This research paper presents guiding on how to design social media into higher education courses. The research methodology used a survey approach. The research instrument was a questionnaire about guiding on how to design social media into higher education courses. Thirty-one lecturers completed the questionnaire. The data were scored by frequency and percentage. The research results were the lecturers’ opinions concerning the designing social media into higher education courses as follows: 1) Lecturers deem that the most suitable learning theory is Collaborative Learning. 2) Lecturers consider that the most important learning and innovation Skill in the 21st century is communication and collaboration skills. 3) Lecturers think that the most suitable evaluation technique is authentic assessment. 4) Lecturers consider that the most appropriate portion used as blended learning should be 70% in the classroom setting and 30% online.Keywords: instructional design, social media, courses, higher education
Procedia PDF Downloads 5139144 An Assessment of the Effects of Social Conflicts on Tourism in Plateau State, Nigeria: Case Study of Jos Crisis on Hill Station Hotel
Authors: Audu Aly Fada, Adejoh Apeh Matthew
Abstract:
This research assesses the effects of social conflicts on tourism products in Plateau State. It was specifically set out to find out the major causes of social conflicts in Jos, evaluate the effects of social conflicts on the influx of tourists to Hill station hotel Jos, and the impact on revenue generation of the hotel. To achieve these objectives research questions were formulated and a sample of 30 hotel staff was selected as the respondents. Data collected were organized and analyzed using tables, percentages and mean statistics. It was found that the hospitality and tourism industry was adversely affected. The crisis brought about a decline in the number of tourist arrivals, increase in cancelled bookings, a decrease in the average length of stay of tourists and the average room occupancy. Peace is the best friend of travel and tourism, while war and insecurity are among its worst enemies. It is recommended that all stakeholders involved in tourism administration should device safer environment that supports continued patronage by providing modern security apparatus. In the same spirit, government as the main stake-holder in security provision should do more than paying lip service to guarantee security and safety of lives and properties.Keywords: social conflict, crisis, security, tourism development
Procedia PDF Downloads 4049143 Nanotechnology in Construction as a Building Security
Authors: Hanan Fayez Hussein
Abstract:
‘Due to increasing environmental challenges and security problems in the world such as global warming, storms, and terrorism’, humans have discovered new technologies and new materials in order to program daily life. As providing physical and psychological security is one of the primary functions of architecture, so in order to provide security, building must prevents unauthorized entry and harm to occupant and reduce the threat of attack by making building less attractive targets by new technologies such as; Nanotechnology, which has emerged as a major science and technology focus of the 21st century and will be the next industrial revolution. Nanotechnology is control of the properties of matter, and it deals with structures of the size 100 nanometers or smaller in at least one dimension and has wide application in various fields. The construction and architecture sectors were among the first to be identified as a promising application area for nanotechnology. The advantages of using nanomaterials in construction are enormous, and promises heighten building security by utilizing the strength of building materials to make our buildings more secure and get smart home. Access barriers such as wall and windows could incorporate stronger materials benefiting from nano-reinforcement utilizing nanotubes and nano composites to act as protective cover. Carbon nanotubes, as one of nanotechnology application, can be designed up to 250 times stronger than steel. Nano-enabled devices and materials offer both enhanced and, in some cases, completely new defence systems. In the addition, the small amount of carbon nanoparticles to the construction materials such as; cement, concrete, wood, glass, gypson, and steel can make these materials act as defence elements. This paper highlights the fact that nanotechnology can impact the future global security and how building’s envelop can act as a defensive cover for the building and can be resistance to any threats can attack it. Then focus on its effect on construction materials such as; Concrete can obtain by nanoadditives excellent mechanical, chemical, and physical properties with less material, which can acts as a precautionary shield to the building.Keywords: nanomaterial, global warming, building security, smart homes
Procedia PDF Downloads 87