Search results for: identity threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2623

Search results for: identity threat

1813 Civil Discourse in the Digital Age: Perceptions of Age as a Barrier to Civic Engagement

Authors: Julianne Viola

Abstract:

Young people are at a critical stage in their lives, developing from young participants to adult participants in democratic society. At this time, civic engagement is crucial for young people’s sense of belonging and future participation in their communities. In adolescence, individuals form their own identities and associations with others and may accomplish this with the help of technology and social media. In the Digital Age, young people and adults use technology as a platform to discuss political issues, including human rights and social justice but do not always engage in civil discourse. There is an urgent need to investigate this complex interplay of social media, identity formation, and civil discourse as it relates to how teenagers become participants in democratic society and how they engage in civil discourse. This qualitative study draws on theories of identity formation in adolescence and is situated within the literature surrounding teen civic engagement and technology use. Through in-depth interviews with participants ages 14 through 17, this study investigates the ways in which teens conceptualize their civic identities and engagement, presence online, and civil discourse. The context in which the young people in this study have grown up has the potential to impact and inform these processes. Early results of this study illustrate what it means to be a young person in today’s world, and how perceptions of others’ opinions may influence young people’s engagement in their communities and online. Participants in this study often indicated concerns of their age as a constraint on participation in their communities and in society, and a self-imposed restriction around the people with whom they engage in conversation about political and social issues. While the participants shared common concerns and experiences, each participant’s unique perspectives and beliefs are viewed with equal importance. The results from this research will help students, teachers, and community groups learn about the reasons for engagement and disengagement among this age group, and how technology has influenced teens’ dialogue about political issues. With this knowledge, academics and school leaders can devise new ways to best teach citizenship skills and civil discourse to students in the Digital Age.

Keywords: civics, digital age, discourse, sociology of youth, youth studies

Procedia PDF Downloads 253
1812 Civility in Indonesia: Comparison of Indonesian People's Friendliness with the Past

Authors: Abshari Nabilah Fiqi, Sekar Ayu Dian Kusumaningtyas, Amira Eka Pratiwi

Abstract:

Since a very long time ago, Indonesia are well known for their hospitality. Hospitality has been one of the civility concepts that represented Indonesia’s culture. However, as an Indonesian, we found that nowadays we are starting to lose this particular culture. The influence of modern culture is undeniably strong. As a capital city, Jakarta is one of the most modern cities in Indonesia. We conduct this experimental study to find out whether the people in Jakarta are still willing to maintain their identity as a friendly Indonesian or not by testing their willingness to reply greetings from strangers.

Keywords: city, civility, culture, greetings, hospitality, modern

Procedia PDF Downloads 483
1811 Predicting Expectations of Non-Monogamy in Long-Term Romantic Relationships

Authors: Michelle R. Sullivan

Abstract:

Positive romantic relationships and marriages offer a buffer against a host of physical and emotional difficulties. Conversely, poor relationship quality and marital discord can have deleterious consequences for individuals and families. Research has described non-monogamy, infidelity, and consensual non-monogamy, as both consequential and causal of relationship difficulty, or as a unique way a couple strives to make a relationship work. Much research on consensual non-monogamy has built on feminist theory and critique. To the author’s best knowledge, to date, no studies have examined the predictive relationship between individual and relationship characteristics and expectations of non-monogamy. The current longitudinal study: 1) estimated the prevalence of expectations of partner non-monogamy and 2) evaluated whether gender, sexual identity, age, education, how a couple met, and relationship quality were predictive expectations of partner non-monogamy. This study utilized the publically available longitudinal dataset, How Couples Meet and Stay Together. Adults aged 18- to 98-years old (n=4002) were surveyed by phone over 5 waves from 2009-2014. Demographics and how a couple met were gathered through self-report in Wave 1, and relationship quality and expectations of partner non-monogamy were gathered through self-report in Waves 4 and 5 (n=1047). The prevalence of expectations of partner non-monogamy (encompassing both infidelity and consensual non-monogamy) was 4.8%. Logistic regression models indicated that sexual identity, gender, education, and relationship quality were significantly predictive of expectations of partner non-monogamy. Specifically, male gender, lower education, identifying as lesbian, gay, or bisexual, and a lower relationship quality scores were predictive of expectations of partner non-monogamy. Male gender was not predictive of expectations of partner non-monogamy in the follow up logistic regression model. Age and whether a couple met online were not associated with expectations of partner non-monogamy. Clinical implications include awareness of the increased likelihood of lesbian, gay, and bisexual individuals to have an expectation of non-monogamy and the sequelae of relationship dissatisfaction that may be related. Future research directions could differentiate between non-monogamy subtypes and the person and relationship variables that lead to the likelihood of consensual non-monogamy and infidelity as separate constructs, as well as explore the relationship between predicting partner behavior and actual partner behavioral outcomes.

Keywords: open relationship, polyamory, infidelity, relationship satisfaction

Procedia PDF Downloads 159
1810 Quantifying Multivariate Spatiotemporal Dynamics of Malaria Risk Using Graph-Based Optimization in Southern Ethiopia

Authors: Yonas Shuke Kitawa

Abstract:

Background: Although malaria incidence has substantially fallen sharply over the past few years, the rate of decline varies by district, time, and malaria type. Despite this turn-down, malaria remains a major public health threat in various districts of Ethiopia. Consequently, the present study is aimed at developing a predictive model that helps to identify the spatio-temporal variation in malaria risk by multiple plasmodium species. Methods: We propose a multivariate spatio-temporal Bayesian model to obtain a more coherent picture of the temporally varying spatial variation in disease risk. The spatial autocorrelation in such a data set is typically modeled by a set of random effects that assign a conditional autoregressive prior distribution. However, the autocorrelation considered in such cases depends on a binary neighborhood matrix specified through the border-sharing rule. Over here, we propose a graph-based optimization algorithm for estimating the neighborhood matrix that merely represents the spatial correlation by exploring the areal units as the vertices of a graph and the neighbor relations as the series of edges. Furthermore, we used aggregated malaria count in southern Ethiopia from August 2013 to May 2019. Results: We recognized that precipitation, temperature, and humidity are positively associated with the malaria threat in the area. On the other hand, enhanced vegetation index, nighttime light (NTL), and distance from coastal areas are negatively associated. Moreover, nonlinear relationships were observed between malaria incidence and precipitation, temperature, and NTL. Additionally, lagged effects of temperature and humidity have a significant effect on malaria risk by either species. More elevated risk of P. falciparum was observed following the rainy season, and unstable transmission of P. vivax was observed in the area. Finally, P. vivax risks are less sensitive to environmental factors than those of P. falciparum. Conclusion: The improved inference was gained by employing the proposed approach in comparison to the commonly used border-sharing rule. Additionally, different covariates are identified, including delayed effects, and elevated risks of either of the cases were observed in districts found in the central and western regions. As malaria transmission operates in a spatially continuous manner, a spatially continuous model should be employed when it is computationally feasible.

Keywords: disease mapping, MSTCAR, graph-based optimization algorithm, P. falciparum, P. vivax, waiting matrix

Procedia PDF Downloads 78
1809 Cross-Cultural Evangelism a Necessity in Contemporary Times: A Case Study of Mission of Diocese on the Niger Anglican Communion to Togo

Authors: Nnatuanya Chinedu Emmanuel

Abstract:

The focus of this research is to point out the importance of mission across nations, tribes, and languages. This is because the message of the gospel is global in nature and as a result, Christians of nations, irrespective of color and denomination, must strive to ensure that this message of transformation is extended to all, notwithstanding their region, locality and color. It is in response to this that this work investigates the evangelization activity of the Diocese on the Niger in Togo, their impacts and activities. The framework of qualitative research was adopted while findings indicate that much work has been done in the areas of human and societal development; notwithstanding, the problem of funding, language barrier, and manpower become a threat to the mission work.

Keywords: cross–cultural Evangelism, diocese on the Niger, Anglican communion, Togo

Procedia PDF Downloads 90
1808 Toward a Coalitional Subject in Contemporary American Feminist Literature

Authors: Su-Lin Yu

Abstract:

Coalition politics has been one of feminists’ persistent concerns. Following recent feminist discussion on new modes of affiliation across difference, she will explore how the process of female subject formation depends on alliances across different cultural locations. First, she will examine how coalition politics is reformulated across difference in contemporary feminist literature. In particular, the paper will identify the particular contexts and locations in which coalition building both enables and constrains the female subject. She will attempt to explore how contemporary feminist literature highlights the possibilities and limitations for solidarity and affiliations. To understand coalition politics in contemporary feminist works, she will engage in close readings of two texts: Rebecca Walker’s Black, White and Jewish: Memoir of a Shifting Self and Danzy Senna’s Caucasia. Both Walker and Senna have articulated the complex nodes of identity that are staged by a politics of location as they refuse to be boxed into simplistic essentialist positions. Their texts are characterized by the characters’ racial ambiguity and their social and geographical mobility of life in the contemporary United States. Their experiences of living through conflictual and contradictory relationships never fully fit the boundaries of racial categorization. Each of these texts demonstrates the limits as well as the possibilities of working with diversity among and within persons and groups, thus, laying the ground for complex alliance formation. Because each of the protagonists must negotiate a set of contradictions, they will have to constantly shift their affiliations. Rather than construct a static alliance, they describe a process of moving ‘beyond boundaries,’ an embracing of multiple locations. As self-identified third wavers, Rebecca Walker and Danzy Senna have been identified and marked with the status of ‘leader’ by the feminist establishment and by mainstream U.S. media. Their texts have captured both mass popularity and critical attention in the feminist and, often, the non-feminist literary community. By analyzing these texts, she will show how contemporary American feminist literature reveals coalition politics which is fraught with complications and unintended consequences. Taken as a whole, then, these works provide an important examination not only of coalition politics of American feminism, but also a snapshot of a central debate among feminist critique of coalition politics as a whole.

Keywords: coalition politics, contemporary women’s literature, identity, female subject

Procedia PDF Downloads 294
1807 A Study on Local Endemic Jurinea brevicaulis Boiss. (Asteraceae) from Turkey

Authors: Bekir Dogan

Abstract:

The genus Jurinea is one of the larger genera within Asteraceae, comprising about 200 species. Jurinea is naturally distributed in central Asia, Turkey, Iran and the Mediterranean region. Jurinea has 23 species within the Mediterranean and Irano-Turanian phytogeographic regions of Turkey. Jurinea brevicaulis is locally endemic in Turkey. It grows Erzincan province in Turkey. Between 2005 and 2007, as a part of a revisional study of Jurinea in Turkey, the author carried out extensive field studies and herbaria and collected an enough number of specimens. In the field, the specimens' GPS coordinates, habitat and relevant field observations were recorded. International Union for Conservation of Nature (IUCN) threat category was given. The present study reviews the chorology of the Jurinea brevicaulis in Turkey based on recent taxonomic revision and available specimen data.

Keywords: Asteraceae, endemic, Jurinea, Turkey

Procedia PDF Downloads 406
1806 Simulation of Forest Fire Using Wireless Sensor Network

Authors: Mohammad F. Fauzi, Nurul H. Shahba M. Shahrun, Nurul W. Hamzah, Mohd Noah A. Rahman, Afzaal H. Seyal

Abstract:

In this paper, we proposed a simulation system using Wireless Sensor Network (WSN) that will be distributed around the forest for early forest fire detection and to locate the areas affected. In Brunei Darussalam, approximately 78% of the nation is covered by forest. Since the forest is Brunei’s most precious natural assets, it is very important to protect and conserve our forest. The hot climate in Brunei Darussalam can lead to forest fires which can be a fatal threat to the preservation of our forest. The process consists of getting data from the sensors, analyzing the data and producing an alert. The key factors that we are going to analyze are the surrounding temperature, wind speed and wind direction, humidity of the air and soil.

Keywords: forest fire monitor, humidity, wind direction, wireless sensor network

Procedia PDF Downloads 454
1805 A Three-modal Authentication Method for Industrial Robots

Authors: Luo Jiaoyang, Yu Hongyang

Abstract:

In this paper, we explore a method that can be used in the working scene of intelligent industrial robots to confirm the identity information of operators to ensure that the robot executes instructions in a sufficiently safe environment. This approach uses three information modalities, namely visible light, depth, and sound. We explored a variety of fusion modes for the three modalities and finally used the joint feature learning method to improve the performance of the model in the case of noise compared with the single-modal case, making the maximum noise in the experiment. It can also maintain an accuracy rate of more than 90%.

Keywords: multimodal, kinect, machine learning, distance image

Procedia PDF Downloads 79
1804 Imami Shia and Democracy

Authors: Hamid Reza Shariatmadari

Abstract:

The Muslims who believe in twelve Imams and believe that their twelfth Imam is now hidden, because of their kind of consideration of immune Imam as their unique canonical authority for interpretation of Islam, are subject of these important questions; how can you be democratic? And can you speak of democracy as the best model of governing? Answering this question, we can talk firstly about the nature of democracy and realize it as a way and mechanism not as a philosophy of identity and secondly we can refer to the nature and functions of Imam in Shiism and thirdly we will focus on the age of Ghaybah (Or concealment of Imam). In such a time we can or have to combine domination of Islamic Faqis (Islamic Jurists) and democracy which is known in Shiite Iran for instance as religious democracy.

Keywords: Shiism, concealment of Imam, Islamic Jurists, Democracy

Procedia PDF Downloads 491
1803 Study on Renewal Strategy of Old District with an Example of SQ in Shenzhen

Authors: Yun Zuo, Wenju Li

Abstract:

Shenzhen is one of China’s gates to the world. What was once a fishing village is now a metropolis of more than 10 million people. Because of its unprecedented pace of development, it also brings a serious of issues, such as the self-renewal of the city. In the paper, we use Sungang-Quingshuihe(SQ) as an example. SQ is one of the oldest districts in the east of Shenzhen. Nowadays, SQ faces many challenges. This is because once the logistics area has been slowly disappear, the new identity will be replaced. As a result, we are to minimize damages to the city in transforming process by seeking for a new design strategy. In the meantime, we think that each district in a city has its own role forming the whole city together. Therefore, a district transformation is functionally-oriented and for improving city quality in focus.

Keywords: old district, renewal strategy, public space, sustainable development

Procedia PDF Downloads 422
1802 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 142
1801 Chemical Synthesis of a cDNA and Its Expression Analysis

Authors: Salman Akrokayan

Abstract:

Synthetic cDNA (ScDNA) of granulocyte colony-stimulating factor (G-CSF) was constructed using a DNA synthesizer with the aim to increase its expression level. 5' end of the ScDNA of G-CSF coding region was modified by decreasing the GC content without altering the predicted amino acids sequence. The identity of the resulting protein from ScDNA was confirmed by the highly specific enzyme-linked immunosorbent assay. In conclusion, a synthetic G-CSF cDNA in combination with the recombinant DNA protocol offers a rapid and reliable strategy for synthesizing the target protein. However, the commercial utilization of this methodology requires rigorous validation and quality control.

Keywords: synthetic cDNA, recombinant G-CSF, cloning, gene expression

Procedia PDF Downloads 284
1800 Use of Personal Rhythm to Authenticate Encrypted Messages

Authors: Carlos Gonzalez

Abstract:

When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).

Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption

Procedia PDF Downloads 304
1799 A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed.

Keywords: Belgium, counterterrorism strategies, human rights, immigration law

Procedia PDF Downloads 106
1798 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 406
1797 Reinforced Concrete Design Construction Issues and Earthquake Failure-Damage Responses

Authors: Hasan Husnu Korkmaz, Serra Zerrin Korkmaz

Abstract:

Earthquakes are the natural disasters that threat several countries. Turkey is situated on a very active earthquake zone. During the recent earthquakes, thousands of people died due to failure of reinforced concrete structures. Although Turkey has a very sufficient earthquake code, the design and construction mistakes were repeated for old structures. Lack of the control mechanism during the construction process may be the most important reason of failure. The quality of the concrete and poor detailing of steel or reinforcement is the most important headings. In this paper, the reasons of failure of reinforced concrete structures were summarized with relevant photos. The paper is beneficial for civil engineers as well as architect who are in the process of construction and design of structures in earthquake zones.

Keywords: earthquake, reinforced concrete structure, failure, material

Procedia PDF Downloads 365
1796 Gender Identification Using Digital Forensics

Authors: Vinod C. Nayak

Abstract:

In day-to-day forensic practice, identification is always a difficult task. Availability of anti-mortem and postmortem records plays a major rule in facilitating this tough task. However, the advent of digital forensic is a boon for forensic experts. This study has made use of digital forensics to establish identity by radiological dimensions of maxillary sinus using workstation software. The findings suggest a significant association between maxillary sinus dimensions and human gender. The author will be discussing the methods and results of the study in this e-poster.

Keywords: digital forensics, identification, maxillary sinus, radiology

Procedia PDF Downloads 419
1795 Drivers of Global Great Power Assertiveness: Russia and Its Involvement in the Global South

Authors: Elina Vroblevska, Toms Ratfelders

Abstract:

This paper examines the impact of international status-seeking aspirations on great power behavior within the international system. In particular, we seek to test the assumption advanced by the proponents of the Social Identity Theory (SIT) that the inability to achieve social mobilization through joining perceived higher-status social groups (of states) leads great powers to adopt the approach of social competition in which they aim to equal or outdo the dominant group in the area on which its claim to superior status rests. Since the dissolution of the Soviet Union, Russia has struggled to be accepted as a great power by the group of Western states that had created the dominant international system order, while the Soviet states were isolated. While the 1990s and the beginning of the 21st century can be characterized by striving to integrate into the existing order, the second decade has seen a rather sharp turn towards creating a new power center for Russia through the realization of ideas of multipolarity rivalry and uniqueness of the state itself. Increasingly, we have seen the Kremlin striving to collaborate and mobilize groups of states that fall outside of the categories of democracy, multiculturalism, and international order, the way that is perceived by the dominant group, which can be described as the West. Instead, Russia builds its own narrative where it creates an alternative understanding of these values, differentiating from the higher-status social group. The Global South, from a Russian perspective, is the group of states that can still be swayed to create an alternative power center in the international system - one where Russia can assert its status as a great power. This is based on a number of reasons, the most important being that the global north is already highly institutionalized in terms of economy (the EU) and defense (NATO), leaving no room for Russia but to integrate within the existing framework. Second, the difference in values and their interpretation - Russia has been adamant, for the last twenty years, on basing its moral code on traditional values like religion, the heterosexual family model, and moral superiority, which contradict the overall secularism of the Global North. And last, the striking difference in understanding of state governance models - with Russia becoming more autocratic over the course of the last 20 years, it has deliberately created distance between itself and democratic states, entering a “gray area” of alternative understanding of democracy which is more relatable to the global South countries. Using computational text analysis of the excerpts of Vladimir Putin’s speeches delivered from 2000-2022 regarding the areas that fall outside the immediate area of interest of Russia (the Global South), we identify 80 topics that relate to the particular component of the great power status - interest to use force globally. These topics are compared across four temporal frames that capture the periods of more and less permissible Western social boundaries. We find that there exists a negative association between such permissiveness and Putin’s emphasis on the “use of force” topics. This lends further support to the Social Identity Theory and contributes to broadening its applicability to explaining the questions related to great power assertiveness in areas outside of their primary focus regions.

Keywords: Russia, Global South, great power, identity

Procedia PDF Downloads 54
1794 A Simulation for Behaviors of Preys to Avoid Pursuit of Predator

Authors: Jae Moon Lee

Abstract:

Generally the predator will continuously aim to attack the prey, while the prey will maintain a safe distance from the predator in order to avoid it . If the predator has enough energy to chase a certain amount of distance, it will begin to attack the prey. The prey needs to approach the predator for various reasons such as getting food. However, it will also try to keep a safe distance because of the threat of predators. The safe distance is dependent on the amount of the energy of predator, and the behaviors of prey is changed according to the size of the safe distance. This paper is to simulate the behaviors of preys to avoid the pursuit of predator based on the safe distance. The simulations will be executed experimentally under single predator and multiple preys. The results of the simulations show that the amount of energy of predator gives a great influence on the behavior of the prey.

Keywords: predator, prey, energy, safe distance, simulation

Procedia PDF Downloads 265
1793 Reading Literacy, Storytelling and Cognitive Learning: an Effective Connection in Sustainability Education

Authors: Rosa Tiziana Bruno

Abstract:

The connection between education and sustainability has been posited to have benefit for realizing a social development compatible with environmental protection. However, an educational paradigm based on the passage of information or on the fear of a catastrophe might not favor the acquisition of eco-identity. To build a sustainable world, it is necessary to "become people" in harmony with other human beings, being aware of belonging to the same human community that is part of the natural world. This can only be achieved within an authentic educating community and the most effective tools for building educating communities are reading literacy and storytelling. This paper is the report of a research-action carried out in this direction, in agreement with the sociology department of the University of Salerno, which involved four hundred children and their teachers in a path based on the combination of reading literacy, storytelling, autobiographical writing and outdoor education. The goal of the research was to create an authentic educational community within the school, capable to encourage the acquisition of an eco-identity by the pupils, that is, personal and relational growth in the full realization of the Self, in harmony with the social and natural environment, with a view to an authentic education for sustainability. To ensure reasonable validity and reliability of findings, the inquiry started with participant observation and a process of triangulation has been used including: semi-structured interview, socio-semiotic analysis of the conversation and time budget. Basically, a multiple independent sources of data was used to answer the questions. Observing the phenomenon through multiple "windows" helped to comparing data through a variety of lenses. All teachers had the experience of implementing a socio-didactic strategy called "Fiabadiario" and they had the possibility to use it with approaches that fit their students. The data being collected come from the very students and teachers who are engaged with this strategy. The educational path tested during the research has produced sustainable relationships and conflict resolution within the school system and between school and families, creating an authentic and sustainable learning community.

Keywords: educating community, education for sustainability, literature in education, social relations

Procedia PDF Downloads 122
1792 Control of an Outbreak of Vancomycin-Resistant Enterococci in a Tunisian Teaching Hospital

Authors: Hela Ghali, Sihem Ben Fredj, Mohamed Ben Rejeb, Sawssen Layouni, Salwa Khefacha, Lamine Dhidah, Houyem Said Laatiri

Abstract:

Background: Antimicrobial resistance is a growing threat to public health and motivates to improve prevention and control programs both at international (WHO) and national levels. Despite their low pathogenicity, vancomycin-resistant enterococci (VRE) are common nosocomial pathogens in several countries. The high potential for transmission of VRE between patients and the threat to send its resistance genes to other bacteria such as staphylococcus aureus already resistant to meticilin, justify strict control measures. Indeed, in Europe, the proportion of Enterococcus faecium responsible for invasive infections, varies from 1% to 35% in 2011 and less than 5% were resistant to vancomycin. In addition, it represents the second cause of urinary tract and wound infections and the third cause of nosocomial bacteremia in the United States. The nosocomial outbreaks of VRE have been mainly described in intensive care services, hematology-oncology and haemodialysis. An epidemic of VRE has affected our hospital and the objective of this work is to describe the measures put in place. Materials/Methods: Following the alert given by the service of plastic surgery concerning a patient carrier of VRE, a team of the prevention and healthcare security service (doctor + technician) made an investigation. A review of files was conducted to draw the synoptic table and the table of cases. Results: By contacting the microbiology laboratory, we have identified four other cases of VRE and who were hospitalized in Medical resuscitation department (2 cases, one of them was transferred to the Physical rehabilitation department), and Nephrology department (2 cases). The visit has allowed to detect several malfunctions in professional practice. A crisis cell has allowed to validate, coordinate and implement control measures following the recommendations of the Technical Center of nosocomial infections. In fact, the process was to technically isolate cases in their sector of hospitalization, to restrict the use of antibiotics, to strength measures of basic hygiene, and to make a screening by rectal swab for both cases and contacts (other patients and health staff). These measures have helped to control the situation and no other case has been reported for a month. 2 new cases have been detected in the intensive care unit after a month. However, these are short-term strategies, and other measures in the medium and long term should be taken into account in order to face similar outbreaks. Conclusion: The efforts to control the outbreak were not efficient since 2 new cases have been reported after a month. Therefore, a continuous monitoring in order to detect new cases earlier is crucial to minimize the dissemination of VRE.

Keywords: hospitals, nosocomial infection, outbreak, vancomycin-resistant enterococci

Procedia PDF Downloads 301
1791 Evidence-Based Approaches and Effective Practices for Preventing Bullying

Authors: Nato Asatiani

Abstract:

The research underscores the critical role of a positive school climate in combating bullying. The results can be generalized and assumed that bullying behavior occurs when there is a victim, and the environment allows the realization of aggression; school culture is a strong predictor of bullying behavior; the probability of becoming a victim (victimhood) is high among those teenagers who experience high levels of stress in the environment; when a teenager experiences a sense of threat, such physical, psychological, or social symptoms are developed that makes teenagers vulnerable to bullying; the school culture that is oriented to adherence to the rules of communication and mutual respect in the group reduces the likelihood of a teenager to become a victim; consequently, when a teenager has a sense of wellness even in combination with aggression, this sense reduces the likelihood of a teenager to become a victim.

Keywords: bullying, adolescence, aggression, school climate

Procedia PDF Downloads 30
1790 Graduate School of Biotechnology and Bioengineering/ YuanZe University

Authors: Sankhanil Das, Arunava Dasgupta, Keya Mitra

Abstract:

This paper investigates the relationship between natural ecological systems and modern urban morphology. Over years, ecological conditions represented by natural resources such as natural landforms, systems of water, urban geography and land covers have been a significant driving factor of how settlements have formed, expanded and functioned. These have played a pivotal role in formation of the community character and the cultural identity of the urban spaces, and have steered cultural behavior within these settings. Such cultural behaviors have been instrumental in transforming mere spaces to places with meaning and symbolism. The natural process of city formation is principally founded upon the idea of balance and harmony, mostly in a subconscious manner. Reimaging such processes of natural evolution, this paper systematically builds a development model that generates a balance between environment and development, with specific focus on the Urban-Rural fringe areas in the Temple Town of Puri, in Eastern India. Puri represents a unique cross section of ecological landscape, cultural practices and religious symbolism with a very rich history and a vibrant heritage. While the city centre gets more and more crowded by tourists and pilgrims to accommodate related businesses, the original residents of Puri relocate to move towards the urban peripheral areas for better living conditions, gradually converting agricultural lands into non agricultural uses. This rapid spread into the rural hinterland is devoid of any connection with the rich cultural identity of Puri. These past four decades of ‘development’ has been at the cost of 810 Hectares of ecological Lake systems in the region. Invaluable ecological resources at urban rural edges are often viewed as hindrances to development and conceptualized as taking away from the image of the city. This paper attempts to understand the language of development over years on existing natural resources through topo-analysis and proposes a sustainable approach of development using different planning tools, with ecological resources as the pivotal factor of development.

Keywords: livability, sustainable development, urbanization, urban-rural edge

Procedia PDF Downloads 188
1789 Management by Sufficient Economy Philosophy for Hospitality Business in Samut Songkram

Authors: Krisada Sungkhamanee

Abstract:

The objectives of this research are to know the management form of Samut Songkram lodging entrepreneurs with sufficient economy framework, to know the threat that affect this business and drawing the fit model for this province in order to sustain their business with Samut Songkram style. What will happen if they do not use this philosophy? Will they have a cash short fall? The data and information are collected by informal discussion with 8 managers and 400 questionnaires. We will use a mix of methods both qualitative research and quantitative research for our study. Bent Flyvbjerg’s phronesis is utilized for this analysis. Our research will prove that sufficient economy can help small and medium business firms solve their problems. We think that the results of our research will be a financial model to solve many problems of the entrepreneurs and this way will use to practice in other areas of our country.

Keywords: Samut Songkram, hospitality business, sufficient economy philosophy, style

Procedia PDF Downloads 305
1788 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978

Authors: Naseer Ahmad Bhat

Abstract:

Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.

Keywords: detentions, Kashmir, public safety act, liberty, security

Procedia PDF Downloads 228
1787 Energy Models for Analyzing the Economic Wide Impact of the Environmental Policies

Authors: Majdi M. Alomari, Nafesah I. Alshdaifat, Mohammad S. Widyan

Abstract:

Different countries have introduced different schemes and policies to counter global warming. The rationale behind the proposed policies and the potential barriers to successful implementation of the policies adopted by the countries were analyzed and estimated based on different models. It is argued that these models enhance the transparency and provide a better understanding to the policy makers. However, these models are underpinned with several structural and baseline assumptions. These assumptions, modeling features and future prediction of emission reductions and other implication such as cost and benefits of a transition to a low-carbon economy and its economy wide impacts were discussed. On the other hand, there are potential barriers in the form political, financial, and cultural and many others that pose a threat to the mitigation options.

Keywords: energy models, environmental policy instruments, mitigating CO2 emission, economic wide impact

Procedia PDF Downloads 524
1786 The Kindergarten as a Multicultural Workplace

Authors: Monika Haanpää

Abstract:

Well-functioning workplaces are often characterized by good co-operation, adequate flow of information, open interaction between workers and a supportive work environment. The workplace is a mosaic of human personalities and the influx of people, who speak different languages and who are from different cultural backgrounds, may bring about new challenges and enrich this environment. However, this influx of people could also pose a problem as the adaptation of immigrant people to new terms of work may depend heavily on the level of language skills, the stage of culture shock, professional identity, and personality. Migration is not a rare phenomenon in Finland anymore; nobody is surprised to see people from different countries and different backgrounds in the schools, on the streets or in shops. However, this does not mean that immigration is an easy process for people coming from other countries. The experience of workers, with diverse language and backgrounds, has rarely been researched, particularly from the superior's point of view. In addition, the vast majority of researchers have paid more attention to multicultural kindergartens in terms of immigrant children and their families. Hence, there is a need to show the problem which exists in the recruitment of the increasing number of workers who come from different countries. Opinions about kindergartens, as multicultural workplaces, have been gathered through interviews with immigrant workers responsible for education. In addition, a questionnaire for native Finnish workers and superiors in kindergartens was carried out. The collected material has been analyzed qualitatively, focusing on topics such as: the kindergarten as a multicultural workplace, factors influencing career success of workers with diverse language and cultural backgrounds, the social relations in the multicultural workplaces and teachers’ changing professional identity. The results of the research provided a novel aspect of the multicultural workplace and emphasized a dependency of immigrant workers’ on language skills in Finnish; affecting professional success. In addition, they showed the good relations between other native Finnish co-workers and superiors. The results also illustrate why writing skills in Finnish are so important in kindergartens. Part of the investigation also questions some results of the research i.e. which is more important in the kindergarten as a multicultural workplace: personality, good professional skills or good language skills.

Keywords: kindergarten, multicultural workplace, social relations at work, work satisfaction

Procedia PDF Downloads 271
1785 Sustainable Management of Gastronomy Experiences as a Mechanism to Promote the Local Economy

Authors: Marianys Fernandez

Abstract:

Gastronomic experiences generate a positive impact on the dynamization of the economy when they are managed in a sustainable manner, given that they value the identity of the destination, strengthen cooperation between stakeholders in the sector, contribute to the preservation of gastronomic heritage, and encourage the implementation of competitive and sustainable public policies. Having as its main aim the analysis of sustainable management of gastronomic experiences, this study analyses different elements associated with the promotion of the local economy. For this purpose, a systematic literature review was carried out to identify, select, synthesise, and evaluate the studies that respond to the research objectives in order to select more reliable articles for research and reduce the potential for bias within the review of literature. To obtain reliable, updated and relevant sources for scientific research, the Web of Science and Scopus databases were used, taking into account the following key words: (1) experiential tourism, (2) gastronomy experience, (3) sustainable destination management, (4) sustainable gastronomy, (5) sustainable economy, in which we obtained a final list of 76 articles. The analysis of the literature allowed us to identify the most pertinent elements referring to the objective of the study: (a) need for competitive policies in the gastronomic sector to promote sustainable local economic development, (b) incentive for cooperation between stakeholders in the gastronomic sector, to guarantee the competitiveness of the destination, (c) propose sustainable standards in the gastronomic tourism sector that link the local economy. Gastronomic experiences constitute a dynamic element of the local economy and promote sustainable tourism. We can highlight that sustainability is a mechanism for the preservation of regional identity in the gastronomic sector through the valuation of the attributes of gastronomy, promotion of the local economy, strengthening of strategic alliances between the stakeholders of the gastronomic sector and its relevant contribution to the competitiveness of the destination. The theoretical implications of the study are focused on suggesting planning, management, and policy criteria to promote the sustainable management of gastronomic experiences in order to promote the local economy. In the practical context, research integrates different approaches, tools, and methods to encourage the active participation of local actors in the promotion of the local economy through the sustainable management of gastronomic tourism.

Keywords: experiential tourism, gastronomy experience, sustainable destination management, sustainable economy, sustainable gastronomy

Procedia PDF Downloads 74
1784 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean

Authors: Jessica Kate Simonds

Abstract:

The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.

Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies

Procedia PDF Downloads 184