Search results for: security education
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9742

Search results for: security education

8992 Exploring the Potential of Blockchain to Improve Higher Education

Authors: Tony Cripps, Larry Kimber

Abstract:

This paper will begin by briefly explaining how blockchain technology works. Then, after highlighting a few of the ways it promises to heavily impact all aspects of the digital landscape, the focus will shift to Blockchain in the field of education, with specific emphasis placed on practical applications in foreign language education. Blockchain is a decentralized Internet-based software application that guarantees truth in transactions. This means whenever two parties engage in a transaction using Blockchain, it is time-stamped, added to a block of other transactions, and then permanently attached to an unalterable ‘chain’ of blocks. The potential for developing applications with Blockchain is therefore immense, since software systems that ensure the impossibility of outside tampering are invaluable. Innovative ideas in every imaginable domain are presently being entertained and Blockchain in education is no exception. For instance, records kept within and between institutions of students’ grade performance, academic achievement and verification of assignment/course completion are just a few examples of how this new technology might potentially be used to revolutionize education. It is hoped that this paper will be of use to all educators interested in the application of technology in the field of education.

Keywords: blockchain, disruption, potential, technology

Procedia PDF Downloads 133
8991 Students With Special Educational Needs in Regular Classrooms and their Peer Effects on Learning Achievement

Authors: José María Renteria, Vania Salas

Abstract:

This study explores the impact of inclusive education on the educational outcomes of students without Special Educational Needs (non-SEN) in Peru, utilizing official Ministry of Education data and implementing cross-sectional regression analyses. Inclusive education is a complex issue that, without appropriate adaptations and comprehensive understanding, can present substantial challenges to the educational community. While prior research from developed nations offers diverse perspectives on the effects of inclusive education on non-SEN students, limited evidence exists regarding its impact in developing countries. Our study addresses this gap by examining inclusive education in Peru and its effects on non-SEN students, thereby contributing to the existing literature. the findings reveal that, on average, the presence of SEN students in regular classrooms does not significantly affect their non-SEN counterparts. However, we uncover heterogeneous effects contingent on the specific type of SEN and students’ academic placement. These results emphasize the importance of targeted resources, specialized teachers, and parental involvement in facilitating successful inclusive education, particularly for specific SEN types and students positioned at the lower end of the academic achievement spectrum. In summary, this study underscores the need for tailored strategies and additional resources to foster the success of inclusive education and calls for further research in this field to expand our understanding and enhance educational policy.

Keywords: inclusive education, special educational needs, learning achievement, Peru, Basic education

Procedia PDF Downloads 73
8990 Culture Dimensions of Information Systems Security in Saudi Arabia National Health Services

Authors: Saleh Alumaran, Giampaolo Bella, Feng Chen

Abstract:

The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of research on the role and impact of an organisation’s cultural dimensions on information security. This research investigated and analysed the role and impact of cultural dimensions on information security in Saudi Arabia health service. Hypotheses were tested and two surveys were carried out in order to collect data and information from three major hospitals in Saudi Arabia (SA). The first survey identified the main cultural-dimension problems in SA health services and developed an initial information security culture framework model. The second survey evaluated and tested the developed framework model to test its usefulness, reliability and applicability. The model is based on human behaviour theory, where the individual’s attitude is the key element of the individual’s intention to behave as well as of his or her actual behaviour. The research identified six cultural dimensions: Saudi national culture, Saudi health service leadership, employees’ trust, technology, multicultural interactions and employees’ job roles. The research also identified a set of cultural sub-dimensions. These include working values and norms, tribe values and norms, attitudes towards women, power sharing, vision, social interaction, respect and understanding, hospital intra-net, hospital employees’ language(s) used, multi-national culture, communication system, employees’ job satisfaction and job security. The research identified that (a) the human behaviour towards medical information in SA is one of the main threats to information security and one of the main challenges to SA health authority, (b) The current situation of SA hospitals’ IS cultures is falling short in protecting medical information due to the current value and norms towards information security, (c) Saudi national culture and employees’ job role are the main dimensions playing major roles in the employees’ attitude, and technology is the least important dimension playing a role in the employees’ attitudes.

Keywords: cultural dimension, electronic health record, information security, privacy

Procedia PDF Downloads 350
8989 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses

Authors: John Hardy, Paul Lushenko

Abstract:

he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.

Keywords: gray zone, international security, military operations, national security, strategy

Procedia PDF Downloads 155
8988 Food Security from a Spatial Perspective; The Situation in Advanced and Less Advanced Economies

Authors: Kristina Thorell

Abstract:

Food security has been one of the most important policy issues on the global arena after the Second World War. The overall aim of this presentation is to describe preconditions for a sustainable food supply from a spatial perspective. Special attention is paid to the differences between advanced and less advanced economies around the world. The theoretical framework is based upon models which are explaining complex systems of factors that affect the preconditions for agricultural productions. In additions to this, theories about how population and environmental pollution change through different stages of societal development are explained. The results are based upon data of agricultural practices, population growth, hunger and nutrition levels from different countries around the world. The analysis shows that factors which affect preconditions for agricultural production are dynamic. Factors which support the food security in the near future are a decreasing population growth, technological development and innovation but the environmental crisis is associated to high risks. It is, therefore, important to develop environmental policies and improved methods for organic farming. A final conclusion is that the spatial pattern is clear; the food supply is sufficient within advanced economies but rather complicated in development countries.

Keywords: food security, agricultural geography, demography, advanced economies, population growth, agricultural practices

Procedia PDF Downloads 313
8987 A Comparative Study of Automotive / Transportation Design Programs and University: Industry Cooperation Models in Higher Education

Authors: Efe Çukur

Abstract:

This study aims to discuss and compare i) widespread and generic design, particularly industrial design education in relation to the specific needs of the automotive/transportation industry, and ii) an automotive/transportation design education model within and under to provide the conditions of design education and automotive industry, especially in Turkey and T.R.N.C. The automotive industry is the 11th largest in the world ($1.51 trillion). One of the most important departments in this industry, along with sales, marketing and engineering, is the design department. The automotive industry is known as the locomotive industry, but there is a non-automotive design department on the academic side of Turkey. This suggestion; includes the presentation of a program proposal that meets the needs of the industry for Turkey and T.R.N.C., the second largest automobile manufacturing country in Europe. On the education side, industrial design education has become a generic title. Automotive design studios are divided into several subgroups. Even in the higher graduate education, the automotive design departments get their subgroups like exterior design and interior design. Transportation design, which is a subfield of industrial design, is offered as higher education in transportation design departments, particularly in America and Europe. In these departments, the curriculum is shaped to the needs of the sectors. Higher education transportation design programs began in the mid-20th century. Until those high education programs...Until these high education programs, the industry has adapted architectures and engineers for designer workloads. Still today transportation design graduates are not the majority of the design studios. The content of the study is an in-depth comparison of these institutions and how the requirements, demands of the industry are met in this regard and revealed. Some of the institutions are selected from Europe and US. To be analyzed under the headings of staff, courses, syllabus, University-Industry collaboration, and location selection. The study includes short, mid, and long term proposals and a hypothesis for discussion. In short, the study will not only provide a wide comparative scope of information on generic and specialized aspects of design education in different countries but also propose a higher education model for automotive / transportation design with solid data of requirements, methodology, and structure regarding learning outcomes, and especially industry cooperation.

Keywords: design education, automotive - transportation design programs, transportation design, automotive industry in Turkey /T.R.N.C., automotive design education in Turkey /T.R.N.C.

Procedia PDF Downloads 86
8986 Investigation of the Field Trip Method’s Effectiveness: As a Way of Improving Pre-Service Teachers’ Views on Environmental Education

Authors: Abuzer Akgün, Ümit Duruk

Abstract:

This study was carried out in a period of four weeks thanks to voluntarily participation of twenty eight pre-service teachers enrolled diverse departments in Faculty of Education. The purpose of the study was to point out how pre-service teachers views on environmental education were affected by field trips. Prior to data collection, four open-ended questions were prepared and administered to all pre-service teachers in the working group. Data gathered at first and final week of the field trip were compared in a qualitative approach using content analysis. In conclusion, it is obvious that most of the participants don’t feel themselves quiet enough about environmental education and state this reason as a providing justification to participate voluntarily in the study. In the secondary school teaching context, they mostly emphasize on the vital importance of the environmental awareness level of the pupils in the schools. They also seem to think that they get a detailed knowledge of environmental education and claim that they will use this knowledge in order to bring up next generations in their professional career as teachers. Lastly, they state that observing the deteriorating materials directly in their own settings, might be more effective as regards improving environmental awareness.

Keywords: science education, environmental education, environmental issues, field trip method

Procedia PDF Downloads 352
8985 The Impact of Student-Led Entrepreneurship Education through Skill Acquisition in Federal Polytechnic, Bida, Niger State, Nigeria

Authors: Ibrahim Abubakar Mikugi

Abstract:

Nigerian graduates could only be self-employed and marketable if they acquire relevant skills and knowledge for successful establishment in various occupation and gainful employment. Research has shown that entrepreneurship education will be successful through developing individual entrepreneurial attitudes, raising awareness of career options by integrating and inculcating a positive attitude in the mind of students through skill acquisition. This paper examined the student- led entrepreneurship education through skill acquisition with specific emphasis on analysis of David Kolb experiential learning cycle. This Model allows individual to review their experience through reflection and converting ideas into action by doing. The methodology used was theoretical approach through journal, internet and Textbooks. Challenges to entrepreneurship education through skill acquisition were outlined. The paper concludes that entrepreneurship education is recognised by both policy makers and academics; entrepreneurship is more than mere encouraging business start-ups. Recommendations were given which include the need for authorities to have a clear vision towards entrepreneurship education and skill acquisition. Authorities should also emphasise a periodic and appropriate evaluation of entrepreneurship and to also integrate into schools academic curriculum to encourage practical learning by doing.

Keywords: entrepreneurship, entrepreneurship education, active learning, Cefe methodology

Procedia PDF Downloads 514
8984 Mathematical Knowledge a Prerequisite for Science Education Courses in Tertiary Institution

Authors: Esther Yemisi Akinjiola

Abstract:

Mathematics has been regarded as the backbone of science and technological development, without which no nation can achieve any sustainable growth and development. Mathematics is a useful tool to simplify science by quantification of phenomena; hence physics and chemistry cannot be done without Calculus and Statistics. Mathematics is used in physical science to calculate the measurement of objects and their characteristics, as well as to show the relationship between different functions and properties. Mathematics is the building block for everything in our daily lives, including the use of mobile devices, architecture design, ancient arts, engineering sports, and. among others. Therefore the study of Mathematics is made compulsory at primary, basic, and secondary school levels. Thus, this paper discusses the concepts of Mathematics, science, and their relationships. Also, it discusses Mathematics contents needed to study science-oriented courses such as physics education, chemistry education, and biology education in the tertiary institution. The paper concluded that without adequate knowledge of Mathematics, it will be difficult, if not impossible, for science education students to cope in their field of study.

Keywords: mathematical knowledge, prerequisite, science education, tertiary institution

Procedia PDF Downloads 86
8983 The Role of Entrepreneurship Education in Enhancing Self-Employment: Students' Perspective

Authors: Stanley Fore, Gaetan Ngabonziza

Abstract:

In spite of the need for skilled labour in South Africa, tertiary education graduates are increasingly faced with unemployment, which poses a serious obstacle to the economic growth of the country. This paper is an outcome of the study that investigated students’ perceptions on the role of entrepreneurship education in enhancing graduates’ self-employment. The study was descriptive in nature and used a survey questionnaire to answer questions pertaining to the extent to which entrepreneurship education is important in enhancing self-employment endeavours. Collected data were analysed using of the statistical software for social science (SPSS) for descriptive statistics in the form of tables and charts. The study found that entrepreneurship education is critical in providing knowledge and skills that are required to succeed in self-employment. As one module of entrepreneurship does not ensure self-employment orientation or more positive expectations about entrepreneurial abilities and careers, this study suggests that students, irrespective of their field of study, should be given entrepreneurship modules in every academic year. This will help in reminding them that their success does not solely rely on their ability to find a better-paying employment but also on their ability to employ themselves.

Keywords: entrepreneurship, education, self-employment, students

Procedia PDF Downloads 247
8982 Designing Social Media into Higher Education Courses

Authors: Thapanee Seechaliao

Abstract:

This research paper presents guiding on how to design social media into higher education courses. The research methodology used a survey approach. The research instrument was a questionnaire about guiding on how to design social media into higher education courses. Thirty-one lecturers completed the questionnaire. The data were scored by frequency and percentage. The research results were the lecturers’ opinions concerning the designing social media into higher education courses as follows: 1) Lecturers deem that the most suitable learning theory is Collaborative Learning. 2) Lecturers consider that the most important learning and innovation Skill in the 21st century is communication and collaboration skills. 3) Lecturers think that the most suitable evaluation technique is authentic assessment. 4) Lecturers consider that the most appropriate portion used as blended learning should be 70% in the classroom setting and 30% online.

Keywords: instructional design, social media, courses, higher education

Procedia PDF Downloads 507
8981 Countering Terrorism through Social Media: Case Study in Indonesia

Authors: Mauly Budiyanti, Aisyah M. Anggiana

Abstract:

Terrorism is a threat to national security since the war on terror era after the tragedy of 9/11. The shifting of national threat from military to non-military centric leads us to recognize that military action is not the only way to face and solve terrorism. Alongside the use of military action to counter terrorism, Indonesia has another way to counter it by using the role of social media. The role of social media on spreading positivity to counter terrorism has the power to show that people now are fearless toward terrorist attack because their goal is to make sure that people are threatened enough by the way they act. This is showing the emergence of the non-state actor has a big impact on national security, as well as pluralism, said about the involving of non-state actor on international events. In this paper, we will examine the role of social media in countering terrorism based on study case in Indonesia.

Keywords: Indonesia, national security, social media, terrorism.

Procedia PDF Downloads 216
8980 Climate Change, Agriculture and Food Security in Sub-Saharan Africa: What Effects and What Answers?

Authors: Abdoulahad Allamine

Abstract:

The objective of this study is to assess the impact of climate variability on agriculture and food security in 43 countries of sub-Saharan Africa. We use for this purpose the data from BADC bases, UNCTAD, and WDI FAOSTAT to estimate a VAR model on panel data. The sample is divided into three (03) agro-climatic zones, more explicitly the equatorial zone, the Sahel region and the semi-arid zone. This allows to highlight the differential impacts sustained by countries and appropriate responses to each group of countries. The results show that the sharp fluctuations in the volume of rainfall negatively affect agriculture and food security of countries in the equatorial zone, with heavy rainfall and high temperatures in the Sahel region. However, countries with low temperatures and low rainfall are the least affected. The hedging policies against the risks of climate variability must be more active in the first two groups of countries. On this basis and in general, we recommend integration of agricultural policies between countries is done to reduce the effects of climate variability on agriculture and food security. It would be logical to encourage regional and international closer collaboration on the development and dissemination of improved varieties, ecological intensification, and management of biotic and abiotic stresses facing these climate variability to sustainably increase food production. Small farmers also need training in agricultural risk hedging techniques related to climate variations; this requires an increase in state budgets allocated to agriculture.

Keywords: agro-climatic zones, climate variability, food security, Sub-Saharan Africa, VAR on panel data

Procedia PDF Downloads 381
8979 Comparative Study of Traditional Classroom Learning and Distance Learning in Pakistan

Authors: Muhammad Afzal Malik

Abstract:

Traditional Learning & Distance based learning are the two systems prevailing in Pakistan. These systems affect the level of education standard. The purpose of this study was to compare the traditional classroom learning and distance learning in Pakistan: (a) To explore the effectiveness of the traditional to Distance learning in Pakistan; (b) To identify the factors that affect traditional and distance learning. This review found that, on average, students in traditional classroom conditions performed better than those receiving education in and distance learning. The difference between student outcomes for traditional Classroom and distance learning classes —measured as the difference between treatment and control means, divided by the pooled standard deviation— was larger in those studies contrasting conditions that blended elements of online and face-to-face instruction with conditions taught entirely face-to-face. This research was conducted to highlight the impact of distance learning education system on education standard. The education standards were institutional support, course development, learning process, student support, faculty support, evaluation and assessment. A well developed questionnaire was administered and distributed among 26 faculty members of GCET, H-9 and Virtual University of Pakistan from each. Data was analyzed through correlation and regression analysis. Results confirmed that there is a significant relationship and impact of DLE system on education standards. This will also provide baseline for future research. It will add value to the existing body of knowledge.

Keywords: distance learning education, higher education, education standards, student performance

Procedia PDF Downloads 277
8978 The 2017 Shanghai Model Breaking Stalemate in Chinese Education Reform: A Discussion of China’s Scheduled Experiment in Access to Higher Education Between 2017 and 2020

Authors: Ping Chou, Xiaoyan Zhou

Abstract:

Domestically and internationally, the Chinese education has long been criticized for being test-oriented, and in spite of efforts made by the Chinese government, it remains hard to find a solution. This paper intends to look at the situation in a comparatively objective manner and discuss the significance of the Shanghai Model as a newly-scheduled experiment for education reform. As a breakthrough, in addition to comprehensive inner-quality evaluation, a small but important step is to be taken in shifting focus of attention back to students by giving them more freedom in selecting certain courses for aptitude tests for college admission. As the first author of the paper has studied and taught both in Chinese and American colleges and universities, comparisons are made when the situation becomes relevant. The official solution for test-oriented education is to make students well-rounded but the writers of this paper believe that it is even more important to make the system well-rounded so it can accept a spectrum of diverse individuals with different potential.

Keywords: college admission, education reform, Shanghai model, test-oriented education

Procedia PDF Downloads 333
8977 From Arab Spring to Arabian Nightmare: State Failure and Identity in the Middle East

Authors: Kenneth Christie

Abstract:

Syria and Iraq are Arabian nightmares at the local, the regional and global levels in terms of human security and the protection of the vulnerable. Wracked by civil war, ethnic and political violence in the last 5 years in the case of Syria and 13 years in the case of Iraq, the body count now is staggering; the humanitarian crisis continues and there appears no end to this. A crisis that has claimed the lives of 200,000 people so far in Syria, sparked a humanitarian catastrophe fuelled violent Islamic extremism and exposed serious splits in the international community who appear to have no consensus. The international community’s failure to act is simply another sign of the desperate situation which has developed over conflicts that appears unsolvable in the immediate future and may be intractable in the long range. Three things are really at stake I’m going to argue in these continuing crises and how it will affect the human security dimensions of the conflict. Firstly, the protection of vulnerable individuals and civilians in the war, 2ndly, the dire consequences for regional instability as a result and thirdly the risks for minority and ethnic identities who are caught up in this, within and across these volatile borders. This paper will examine these elements and the consequences of the conflict in terms of human security, migration and development.

Keywords: human security, migration, Syria and Iraq, conflict and development

Procedia PDF Downloads 357
8976 Value-Based Management Education Need of the Hour

Authors: Surendar Vaddepalli

Abstract:

Management education plays a crucial role to enable industry to cope with emerging challenges. It has spread in the last fifteen-twenty years in India and gained popularity as it was aimed at imbibing versatility and multi-tasking abilities in student community. Several management institutions started looking at upgrading their competencies in terms of faculty, research and industry interaction. The competitive business environment has been one of the drivers that paved the way for growing demand for management graduates in the employment market. Industry expects their executives to be engaged in a constant learning process. The ever-increasing demand for managers has led to establish more management institutions; however, the growth was not in line with the expectations from the industry. While top Business Schools are continuously changing the contents and delivery methodologies, academic standards of most of the other Business Schools are not up to the mark and quality of service provided by these institutes has opened various issues for discussion. On this back ground it is important to address the concerns of Indian management education experiencing with time and we have to rethink about the management education and efforts should be made to create a dynamic environment. This paper ties to study the current trends and tries to find out need for value based management education in India to rejuvenate it.

Keywords: management education, management, value based management education, business school, India

Procedia PDF Downloads 374
8975 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 303
8974 Food Insecurity and Other Correlates of Individual Components of Metabolic Syndrome in Women Living with HIV (WLWH) in the United States

Authors: E. Wairimu Mwangi, Daniel Sarpong

Abstract:

Background: Access to effective antiretroviral therapy in the United States has resulted in the rise in longevity in people living with HIV (PLHIV). Despite the progress, women living with HIV (WLWH) experience increasing rates of cardiometabolic disorders compared with their HIV-negative counterparts. Studies focusing on the predictors of metabolic disorders in this population have largely focused on the composite measure of metabolic syndrome (METs). This study seeks to identify the predictors of composite and individual METs factors in a nationally representative sample of WLWH. In particular, the study also examines the role of food security in predicting METs. Methods: The study comprised 1800 women, a subset of participants from the Women’s Interagency HIV Study (WIHS). The primary exposure variable, food security, was measured using the U.S. 10-item Household Food Security Survey Module. The outcome measures are the five metabolic syndrome indicators (elevated blood pressure [systolic BP > 130 mmHg and diastolic BP ≥ 85 mmHg], elevated fasting glucose [≥ 110 mg/dL], elevated fasting triglyceride [≥ 150 mg/dL], reduced HDL cholesterol [< 50 mg/dL], and waist circumference > 88 cm) and the composite measure - Metabolic Syndrome (METs) Status. Each metabolic syndrome indicator was coded one if yes and 0 otherwise. The values of the five indicators were summed, and participants with a total score of 3 or greater were classified as having metabolic syndrome. Participants classified as having metabolic syndrome were assigned a code of 1 and 0 otherwise for analysis. The covariates accounted for in this study fell into sociodemographic factors and behavioral and health characteristics. Results: The participants' mean (SD) age was 47.1 (9.1) years, with 71.4% Blacks and 10.9% Whites. About a third (33.1%) had less than a high school (HS) diploma, 60.4% were married, 32.8% were employed, and 53.7% were low-income. The prevalence of worst dietary diversity, low, moderate, and high food security were 24.1%, 26.6%, 17.0%, and 56.4%, respectively. The correlate profile of the five individual METs factors plus the composite measure of METs differ significantly, with METs based on HDL having the most correlates (Age, Education, Drinking Status, Low Income, Body Mass Index, and Health Perception). Additionally, metabolic syndrome based on waist circumference was the only metabolic factor where food security was significantly correlated (Food Security, Age, and Body Mass Index). Age was a significant predictor of all five individual METs factors plus the composite METs measure. Except for METs based on Fasting Triglycerides, body mass index (BMI) was a significant correlate of the various measures of metabolic syndrome. Conclusion: High-density Lipoprotein (HDL) cholesterol significantly correlated with most predictors. BMI was a significant predictor of all METs factors except Fasting Triglycerides. Food insecurity, the primary predictor, was only significantly associated with waist circumference.

Keywords: blood pressure, food insecurity, fasting glucose, fasting triglyceride, high-density lipoprotein, metabolic syndrome, waist circumference, women living with HIV

Procedia PDF Downloads 56
8973 The Causes and Potential Solutions for Foodborne Illness, Food Security, and Food Safety: In the Case of the East Harerghe Region of Oromia, Ethiopia

Authors: Tuji Jemal Ahmed, Abdi Mohammed, Geremew Geidare Kailo

Abstract:

Food security, foodborne illness, and food safety are critical issues that affect the East Harerghe region of Oromia, Ethiopia. Despite the region's potential for agriculture, food insecurity remains a significant problem, with many households experiencing chronic hunger and malnutrition. The region also experiences high rates of foodborne illnesses, including cholera, typhoid, and diarrhea, which are caused by poor hygiene and sanitation practices. Additionally, food safety is a significant challenge, particularly in rural areas, where there is a lack of infrastructure, inadequate food storage facilities, and limited access to information about food safety. There are several factors that contribute to the current situation in the East Harerghe region; firstly, the region is susceptible to natural disasters, for instance, drought, which affects crop yields and livestock production. Secondly, the region also experiences poor infrastructure, which affects the storage and transportation of food, particularly in rural areas. Thirdly, there is a lack of awareness and knowledge on good hygiene and sanitation practices, specifically during food handling, processing, and storage. Fourthly, unitability due to conflict and other forms of land degradation exacerbates food insecurity and malnutrition. Finally, limited access to financial resources and markets commonly affects smallholder farmers by their ability to produce and sell food. To address the current situation in that area, several potential solutions can be implemented; investment in infrastructure is necessary, especially in rural areas, to improve the storage and transportation of food. Education and awareness programs on good hygiene and sanitation practices should target local communities, smallholder farmers, and food vendors. Financial resources and markets should be made more accessible to smallholder farmers, particularly through the provision of credit and improved access to markets. Addressing the underlying causes of conflict and promoting peaceful coexistence can help to reduce displacement and loss of livelihoods. Finally, the enforcement of food safety regulations and the implementation of standards for food processing and storage facilities are necessary to ensure food safety. In conclusion, addressing the challenges of food security, foodborne illness, and food safety in the East Harerghe region requires a coordinated effort from various stakeholders, including the government, non-governmental organizations, and local communities. By implementing the solutions outlined above, the region can improve its food security, prevent foodborne illnesses, and keep food safe for its population. Eventually, building the resilience of communities to shocks such as droughts, floods, and conflict is necessary to ensure long-term food security in the region.

Keywords: foodborne illness, food handling, food safety, food security

Procedia PDF Downloads 95
8972 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 37
8971 Contribution of Women to Post-Colonial Education and Leadership

Authors: Naziema Begum Jappie

Abstract:

This paper explores the relationship between educational transformation and gender equity in higher education. It draws on various policies and experiences and investigates the paradox of increased female leadership in higher education and the persistence of gender discrimination in the sphere of work. The paper will also address specific aspects of culture and education in post-colonial South Africa. Traditional features of past education systems were not isolated, they became an essential component of the education system, post-democracy. This is currently contested through the call for decolonizing the education system. The debates and discussions seek to rectify the post-colonial education structure within which women suffered triple oppression. Using feminist critical policy analysis and post-colonial theory, the paper examines how transformation over the past two decades has impacted on gender equity and how educational reform is itself gendered. It considers the nature of gender restructuring and key developments in gender equity policy. The social inequality in education is highlighted throughout this discussion. Through an analysis of research and interviews, this paper argues that gender can no longer be privileged when identifying and responding to educational and workplace inequality. In conclusion, the paper discusses the important assumptions that support how social and educational change deliver equity and how social justice may inform equity policy and practice in a culturally diverse educational framework.

Keywords: culture, educational leadership, gender inequality in the workplace, policy implementation

Procedia PDF Downloads 269
8970 Countering Violent Extremism: Challenges and Possibilities for Muslim Ummah

Authors: Altaf Ahmed

Abstract:

Unhindered progress and advancement of life are directly associated with peace and development. Unfortunately, many modern states are prone to the perilous of social challenges; Violent Extremism is the most ubiquitous adversary among all. Islam in its origin fully supports peace and security; the charter of Madina, the treaty of Hudabia and conquer of Mecca are the biggest examples in this reference. The holy Prophet Muhammad ﷺ always gave priority to peace in these cases. Today, the majority of the Muslim World faces VE and terrorism due to multiple reasons ranging from religious interpretations to political, social and economic conditions. This research will try to explore challenges for Muslim Ummah in maintaining peace and what steps have been taken by it to resolve conflicts among states. In this context, Sustainable development goals (SDGs) will be particularly analysed. SDGs were adopted by all United Nations Member States in 2015. It is an undeniable fact that these are the best peace-building tools. Although there are 17 SDGs, the paper will mainly focus on quality education, zero hunger, end of poverty (social protection), women empowerment, reduced inequalities and economic growth as the best peace-building approaches for eradication of violent extremism.

Keywords: violent extremism, Muslim Ummah, peace, modern world, education

Procedia PDF Downloads 112
8969 Application Programming Interface Security in Embedded and Open Finance

Authors: Andrew John Zeller, Artjoms Formulevics

Abstract:

Banking and financial services are rapidly transitioning from being monolithic structures focusing merely on their own financial offerings to becoming integrated players in multiple customer journeys and supply chains. Banks themselves are refocusing on being liquidity providers and underwriters in these networks, while the general concept of ‘embeddedness’ builds on the market readily available API (Application Programming Interface) architectures to flexibly deliver services to various requestors, i.e., online retailers who need finance and insurance products to better serve their customers, respectively. With this new flexibility come new requirements for enhanced cybersecurity. API structures are more decentralized and inherently prone to change. Unfortunately, this has not been comprehensively addressed in the literature. This paper tries to fill this gap by looking at security approaches and technologies relevant to API architectures found in embedded finance. After presenting the research methodology applied and introducing the major bodies of knowledge involved, the paper will discuss six dominating technology trends shaping high-level financial services architectures. Subsequently, embedded finance and the respective usage of API strategies will be described. Building on this, security considerations for APIs in financial and insurance services will be elaborated on before concluding with some ideas for possible further research.

Keywords: embedded finance, embedded banking strategy, cybersecurity, API management, data security, cybersecurity, IT management

Procedia PDF Downloads 37
8968 Mobile Device Applications in Physical Education: Investigating New Pedagogical Possibilities

Authors: Danica Vidotto

Abstract:

Digital technology is continuing to disrupt and challenge local conventions of teaching and education. As mobile devices continue to make their way into contemporary classrooms, educators need new pedagogies incorporating information communication technology to help reform the learning environment. In physical education, however, this can seem controversial as physical inactivity is often related to an excess of screen-time. This qualitative research project is an investigation on how physical educators use mobile device applications (apps) in their pedagogy and to what end. A comprehensive literature review is included to examine and engage current academic research of new pedagogies and technology, and their relevance to physical activity. Data were collected through five semi-structured interviews resulting in three overarching themes; i) changing pedagogies in physical education; ii) the perceived benefits and experienced challenges of using apps; and iii) apps, physical activity, and physical education. This study concludes with a discussion of the findings engaging the literature, discussing the implications of findings, and recommendations for future research.

Keywords: applications (apps), mobile devices, new pedagogies, physical education

Procedia PDF Downloads 192
8967 The Higher Education System in Jordan: Philosophy and Premises Preparation

Authors: Ihsan Orsan Oglah Elrabbaei

Abstract:

This research stems from the philosophy of education notion, as it is a fundamental pillar within or component of the philosophy of education. It is the general framework that society takes towards the future in order to build its integrated educational system amid the variables that surround it, in order to prepare its members in all aspects of cognitive, skill, and behavioral life, so that there is a clear concept of the system of productive values, according to the vision of philosophy that defines its future roles, which can be found in the system of productive values. With the resignation, everything changes. As a result, the philosophy of education is anticipated to evolve in response to perceived changes in society in terms of the nature of its human and material resources. The study will answer the following questions: Has the philosophy of education changed to accommodate this change? Alternatively, is the change that occurs because of natural growth without education having a role in directing this change and being aware of it in order to fit with national, regional, and global changes? Were the national educational goals and curricula and their programs viewed through the lenses of interest? On the other hand, do things happen without realizing that the philosophy of education has changed and that it proceeds according to the natural rolling of the invisible impulse? The study concluded that we must reconsider the philosophy of education and redefine who is an educated person. In addition, to recognize all the values of the roles that the individual can play in his society, according to his abilities, and with respect. Moreover, building a new philosophy of education based on what society can look at and what it wants from a flexible future takes the concept of changing life values, their contents, diversity, and the roles of each individual in them.

Keywords: higher education system, jordan, philosophy, premises preparation.

Procedia PDF Downloads 93
8966 Special Education in a Virtual Environment

Authors: Anna K. Johnson

Abstract:

Technology can provide endless opportunities for students with special needs. Virtual learning, particularly virtual charter schools in the US, provides opportunities for students with special needs for alternative education besides Brick and Mortar schools. Virtual schools have proven to be successful in the way they are able to provide quality education for their students. Virtual schools, just like Brick and Mortar schools, are not for everybody. This research is designed to look at the effectiveness of online charter schools, so parents can make decisions based on data. This article explains what inclusion is and how inclusion is addressed in the virtual environment. Often, students with special needs have limited options for schooling, and new charter schools provide that alternative education for students who don’t fit in the local brick-and-mortar school.

Keywords: special education, virtual school, online, inclusion

Procedia PDF Downloads 164
8965 An Assessment of the Effects of Social Conflicts on Tourism in Plateau State, Nigeria: Case Study of Jos Crisis on Hill Station Hotel

Authors: Audu Aly Fada, Adejoh Apeh Matthew

Abstract:

This research assesses the effects of social conflicts on tourism products in Plateau State. It was specifically set out to find out the major causes of social conflicts in Jos, evaluate the effects of social conflicts on the influx of tourists to Hill station hotel Jos, and the impact on revenue generation of the hotel. To achieve these objectives research questions were formulated and a sample of 30 hotel staff was selected as the respondents. Data collected were organized and analyzed using tables, percentages and mean statistics. It was found that the hospitality and tourism industry was adversely affected. The crisis brought about a decline in the number of tourist arrivals, increase in cancelled bookings, a decrease in the average length of stay of tourists and the average room occupancy. Peace is the best friend of travel and tourism, while war and insecurity are among its worst enemies. It is recommended that all stakeholders involved in tourism administration should device safer environment that supports continued patronage by providing modern security apparatus. In the same spirit, government as the main stake-holder in security provision should do more than paying lip service to guarantee security and safety of lives and properties.

Keywords: social conflict, crisis, security, tourism development

Procedia PDF Downloads 400
8964 Nanotechnology in Construction as a Building Security

Authors: Hanan Fayez Hussein

Abstract:

‘Due to increasing environmental challenges and security problems in the world such as global warming, storms, and terrorism’, humans have discovered new technologies and new materials in order to program daily life. As providing physical and psychological security is one of the primary functions of architecture, so in order to provide security, building must prevents unauthorized entry and harm to occupant and reduce the threat of attack by making building less attractive targets by new technologies such as; Nanotechnology, which has emerged as a major science and technology focus of the 21st century and will be the next industrial revolution. Nanotechnology is control of the properties of matter, and it deals with structures of the size 100 nanometers or smaller in at least one dimension and has wide application in various fields. The construction and architecture sectors were among the first to be identified as a promising application area for nanotechnology. The advantages of using nanomaterials in construction are enormous, and promises heighten building security by utilizing the strength of building materials to make our buildings more secure and get smart home. Access barriers such as wall and windows could incorporate stronger materials benefiting from nano-reinforcement utilizing nanotubes and nano composites to act as protective cover. Carbon nanotubes, as one of nanotechnology application, can be designed up to 250 times stronger than steel. Nano-enabled devices and materials offer both enhanced and, in some cases, completely new defence systems. In the addition, the small amount of carbon nanoparticles to the construction materials such as; cement, concrete, wood, glass, gypson, and steel can make these materials act as defence elements. This paper highlights the fact that nanotechnology can impact the future global security and how building’s envelop can act as a defensive cover for the building and can be resistance to any threats can attack it. Then focus on its effect on construction materials such as; Concrete can obtain by nanoadditives excellent mechanical, chemical, and physical properties with less material, which can acts as a precautionary shield to the building.

Keywords: nanomaterial, global warming, building security, smart homes

Procedia PDF Downloads 73
8963 These Ungodly Institutions: Christian Reconstruction, Vouchers and the Fight for American Ideals

Authors: James A. Bryant Jr

Abstract:

This article examines the far-reaching consequences of the mainstreaming of the Christian Dominionist philosophy on public schools all across the United States of America. Under the guise of “school choice,” and the ever-growing influence and legacy of its most vocal proponent, R.J. Rushdoony, the American right has declared an all-out war on public education, public schools, and the men and women who staff these institutions. For the purposes of this paper, the term “school choice” encompasses both the efforts to use public money to support private, religious education as well as the move to dramatically expand the number of children and youth who are home schooled. This article examines both the history and dangers of the homeschool movement and the vouchers-for-religious school's scheme, with particular attention to the philosophy and words of its most renowned advocate, the missionary Rousas John Rushdoony.

Keywords: history education, multicultural education, public education, Christian Dominionism

Procedia PDF Downloads 59