Search results for: personal cyber insurance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2880

Search results for: personal cyber insurance

2070 Measuring Fundamental Growth Needs in a Youth Boatbuilding Context

Authors: Shane Theunissen, Rob Grandy

Abstract:

Historically and we would fairly conventionally within our formal schooling systems, we have convergent testing where all the students are expected to converge on the same answer, and that answer has been determined by an external authority that is reproducing knowledge of the hegemon. Many youths may not embody the cultural capital that's rewarded in formal schooling contexts as they aren't able to converge on the required answer that's being determined by the classroom teacher or the administrators. In this paper, we explore divergent processes that promote creative problem-solving. We embody this divergent process in our measurement of fundamental growth needs. To this end, we utilize the Mosaic Approach as a method for implementing the Outcomes That Matter framework. Outcomes That Matter is the name of the measurement tool built around the Circle of Courage framework, which is a way of identifying fundamental growth needs for young people. The Circle of Courage was developed by Martin-Broken-Leg and colleagues as a way to connect indigenous child-rearing philosophies with contemporary resilience and positive psychology research. The Outcomes that Matter framework puts forward four categories of growth needs for young people. These are: Belonging, which on a macro scale is acceptance into the greater community of practice, Mastery which includes a constellation of concepts including confidence, motivation, self-actualization, and self-determination, Independence refers to a sense of personal power into autonomy within a context where creativity and problem solving, and a personal voice can begin to emerge, and finally Generosity which includes interpersonal things like conflict resolution and teamwork. Outcomes of Matter puts these four domains into a measurement tool that facilitates collaborative assessment between the youth, teachers, and recreation therapists that allows for youth-led narratives pertaining to their fundamental growth outcomes. This application of the Outcomes That Matter framework is unique as it may be the first application of this framework in an educational boatbuilding context.

Keywords: collaboration, empowerment, outcomes that matter, mosaic approach, boat building

Procedia PDF Downloads 96
2069 The Various Legal Dimensions of Genomic Data

Authors: Amy Gooden

Abstract:

When human genomic data is considered, this is often done through only one dimension of the law, or the interplay between the various dimensions is not considered, thus providing an incomplete picture of the legal framework. This research considers and analyzes the various dimensions in South African law applicable to genomic sequence data – including property rights, personality rights, and intellectual property rights. The effective use of personal genomic sequence data requires the acknowledgement and harmonization of the rights applicable to such data.

Keywords: artificial intelligence, data, law, genomics, rights

Procedia PDF Downloads 138
2068 Study on Status of Child Labour in Metal Fabrication Industries of Kathmandu Valley

Authors: Bikas Chandra Bhattarai

Abstract:

Child labour is the serious issue all over the world. In Nepal, many children are working in different structured and unstructured sector. Metal fabrication is one of the sectors where many children are involved. The present study is carried out to focus on the overall socio-economic condition, psychological aspect, working environment condition and welfare of the child labour. Metal fabrication factories from Kirtipur, Chovar Area, Gongabu, Sitapaila and Sankhamul area of Kathmandu municipality were selected for the study. The structured questionnaire was prepared, and overall 55 children under age 16 were interviewed. Working in metal fabrication factory is risky job for children. The main reason behind child labour is poverty. The working environment in the metal fabrication factory was not found satisfactory. Children are exposed to various types of physical and chemical hazards. Factories are not paying proper attention to safety condition at the workplace. Large number of children is attracted towards smoking and drinking alcohol leading to unnecessary expense of their income. There should be the provision of regular health check up and insurance to the working children. Monitoring from the government level should be implemented for the betterment of working children.

Keywords: child labour, Kathmandu, Nepal, metal fabrication

Procedia PDF Downloads 331
2067 Analyzing Inclusion Attempts: Simultaneous Performance of Two Teachers at the Same Classroom

Authors: Mara A. C. Lopes

Abstract:

Hiring a second teacher to accompany deaf students inserted at Brazilian inclusive school system has raised questions about its role in the educational process of deaf students. Federal policies determine that deaf students inserted in regular education are accompanied by sign language interpreters, which leads to the understanding that the second teacher should assume this function. However, what those professionals do is to assume the function of teaching deaf student, instead of the classroom main teacher. Historical-Cultural Psychology was used as a reference for analysis, which aimed to identify the social function of the second teacher in the classroom. Two studies were accomplished in the public schools of Sao Paulo State: In Study 1, videotaped lectures provided by the Department of Education for collective reflection about the second teacher's role were examined, to identify the social meaning of that professional activity. Study 2 aimed to analyze the process of assigning personal sense to the teacher activity, considering the opinions of 21 professionals from Sao Paulo. Those teachers were interviewed individually with the support of a semi-structured interview. The analysis method utilized was: empirical description of data; development of categories, for reality abstraction; identifying the unit analysis; and return to reality, in order to explain it. Study 1 showed that the social meaning of the second teacher's activity is, also, to teach. However, Study 2 showed that this meaning is not shared among professionals of the school, so they understand that they must act as sign language interpreters. That comprehension causes a disruption between social meaning and the personal sense they attach to their activity. It also shows the need of both teachers at the classroom planning and executing activity together. On the contrary, a relationship of subordination of one teacher to another was identified, excluding the second teacher and the deaf student of the main activity. Results indicate that the second teacher, as a teacher, must take the responsibility for deaf student education, consciously, and to promote the full development of the subjects involved.

Keywords: deaf education, historical-cultural psychology, inclusion, teacher function

Procedia PDF Downloads 214
2066 Happiness Determinants in MBA Student Life

Authors: Vivek Nair

Abstract:

The objective of this research is to find out happiness determinants in MBA student life. To figure out the factors influencing happiness in life is sorted by their personal profiles. This paper used survey method to collect data. The survey was mainly conducted among Management Students and is based on three hypothesis viz. Family relationship, Friendship and God as a source of happiness, and whether happiness is manageable and controllable. The statistics used for interpreting the results included the frequencies, percentages, and z test analysis. The findings revealed that family relationships and friendship have the same effect on individual happiness.

Keywords: happiness, family, MBA students, friends

Procedia PDF Downloads 306
2065 Does One Size Fit All: Immigrant Youths, Bullying and Peer-Aggression

Authors: Shila Khayambashi

Abstract:

For the past few decades, Western researchers studied different youth issues, such as bullying, peer-aggression, depression, self-harm, and suicide, in a formulated and standardized manner. These researchers have grounded their studies upon a series of introduced characteristics and traits, which pragmatically defined the action of the individuals involved in these activities (Olweus, 1994). The phenomena of bullying and peer-aggression have touched the lives of many immigrant youths, as well. However, in the case of these immigrant young adults, the Police investigated, and later dismissed, the victims’ involvement in drugs and gangs’ activities, instead of questioning the possibility of the peer-aggression. This paper argues that neither government officials nor school personnel has ever investigated any cyber-documentation which would clarify these youth’s untimely deaths or search for any indication of peer-aggression at school. Through my ongoing research, I will problematize the Eurocentric definition of bullying and its limitations. I question the assumed universality of these definitions’ characteristics and their lack of minority representation. This research questions explicitly the positionality of the displaced youth within the promised multiculturality of Canada. I will ask: Does one size fit all, considering the bio-psycho-socio-economic differences between the Eastern and the Western worlds? More importantly, how does the epidemy of the communicative devices, like smartphones, and communicative apps, like Twitter and Snapchats, facilitate or hinder peer-aggression for the displaced youths?

Keywords: Bullying , Immigrant youths, Peer aggression, Minority population

Procedia PDF Downloads 132
2064 Comparative Public Administration: A Case Study of ASEAN Member States

Authors: Nattapol Pourprasert

Abstract:

This research is to study qualitative research having two objectives: 1. to study comparison of private sector of government to compare with ASEAN Member States, 2. to study trend of private enterprise administration of ASEAN Member States. The results are: (1) Thai people focus on personal resource administrative system, (2) Indonesia focuses on official system by good administrative principles, (3) Malaysia focuses on technology development to service people, (4) Philippines focuses on operation system development, (5) Singapore focuses on public service development, (6) Brunei Darussalam focuses on equality in government service of people, (7) Vietnam focuses on creating government labor base and develop testing and administration of operation test, (8) Myanmar focuses on human resources development, (9) Laos focuses on form of local administration, (10) Cambodia focuses on policy revolution in personal resources. The result of the second part of the study are: (1) Thailand created government personnel to be power under qualitative official structural event, (2) Indonesia has Bureaucracy Reform Roadmap of Bureaucracy Reform and National Development Plan Medium Term, (3) Malaysia has database for people service, (4) Philippines follows up control of units operation by government policy, (5) Singapore created reliability, participation of people to set government policy people’s demand, (6) Brunei Darussalam has social welfare to people, (7) Vietnam revolved testing system and administration including manpower base construction of government effectively, (8) Myanmar creates high rank administrators to develop country, (9) Laos distributes power to locality, and (10) Cambodia revolved personnel resource policy.

Keywords: public administration development, ASEAN member states, private sector, government

Procedia PDF Downloads 252
2063 Evaluation of Correct Usage, Comfort and Fit of Personal Protective Equipment in Construction Work

Authors: Anna-Lisa Osvalder, Jonas Borell

Abstract:

There are several reasons behind the use, non-use, or inadequate use of personal protective equipment (PPE) in the construction industry. Comfort and accurate size support proper use, while discomfort, misfit, and difficulties to understand how the PPEs should be handled inhibit correct usage. The need for several protective equipments simultaneously might also create problems. The purpose of this study was to analyse the correct usage, comfort, and fit of different types of PPEs used for construction work. Correct usage was analysed as guessability, i.e., human perceptions of how to don, adjust, use, and doff the equipment, and if used as intended. The PPEs tested individually or in combinations were a helmet, ear protectors, goggles, respiratory masks, gloves, protective cloths, and safety harnesses. First, an analytical evaluation was performed with ECW (enhanced cognitive walkthrough) and PUEA (predictive use error analysis) to search for usability problems and use errors during handling and use. Then usability tests were conducted to evaluate guessability, comfort, and fit with 10 test subjects of different heights and body constitutions. The tests included observations during donning, five different outdoor work tasks, and doffing. The think-aloud method, short interviews, and subjective estimations were performed. The analytical evaluation showed that some usability problems and use errors arise during donning and doffing, but with minor severity, mostly causing discomfort. A few use errors and usability problems arose for the safety harness, especially for novices, where some could lead to a high risk of severe incidents. The usability tests showed that discomfort arose for all test subjects when using a combination of PPEs, increasing over time. For instance, goggles, together with the face mask, caused pressure, chafing at the nose, and heat rash on the face. This combination also limited sight of vision. The helmet, in combination with the goggles and ear protectors, did not fit well and caused uncomfortable pressure at the temples. No major problems were found with the individual fit of the PPEs. The ear protectors, goggles, and face masks could be adjusted for different head sizes. The guessability for how to don and wear the combination of PPE was moderate, but it took some time to adjust them for a good fit. The guessability was poor for the safety harness; few clues in the design showed how it should be donned, adjusted, or worn on the skeletal bones. Discomfort occurred when the straps were tightened too much. All straps could not be adjusted for somebody's constitutions leading to non-optimal safety. To conclude, if several types of PPEs are used together, discomfort leading to pain is likely to occur over time, which can lead to misuse, non-use, or reduced performance. If people who are not regular users should wear a safety harness correctly, the design needs to be improved for easier interpretation, correct position of the straps, and increased possibilities for individual adjustments. The results from this study can be a base for re-design ideas for PPE, especially when they should be used in combinations.

Keywords: construction work, PPE, personal protective equipment, misuse, guessability, usability

Procedia PDF Downloads 87
2062 Revisiting the Jurisprudence of the Appellate Courts on the Jurisdiction of the Shari'ah Court of Appeal under Selected Nigerian Constitutions

Authors: Dahiru Jafaru Usman

Abstract:

Nigerian courts have been sanctioned by a plethora of authorities to always employ the literal rule in interpreting statutes where the language of the statute is clear and unambiguous. This cardinal rule of interpretation appears not to be employed on Shari'ah issues in Nigeria. This is more pronounced in the interpretation of the jurisdiction of the Shari'ah Court of Appeal (hereinafter the court). The paper doctrinally assesses the judicial attitude of Nigerian appellate courts towards the construction of Section 277 of the 1999 Constitution as amended and other relevant statutory enactments by the State Houses of Assembly. The paper argues that a careful examination of the wordings of the constitution on the jurisdiction of the court literally reveals the intention of the constitutional drafters empowering the National Assembly and States' House of Assemblies to add to the itemised jurisdictional areas of the court other matters not mentioned. The paper found that the appellate courts failed in their construction of the constitutional provisions to accord the words and phrases used in the establishment, jurisdiction, and quorum sections of the court their ordinary and grammatical meaning. This results in consistent limitation of the jurisdiction of the court to matters of Islamic personal law. This remains so even when Decree No. 26 of 1986 was in force suspending and amending the provisions of the 1979 Constitution deleting the word 'personal' in the suspended Nigerian Constitutions. In order not to render section 277 futile, the paper recommends that appellate courts in Nigeria should as required by rules of statutory interpretation adopt literal and ordinary grammatical meaning in interpreting constitutional provisions on the jurisdiction of the court. It is further recommended that appellate courts must interpret the provisions of the 1999 constitution in a manner not to frustrate the several decades' yearnings of the Muslims for a court that would hear all their appellate criminal and civil matters on the path of Shari'ah from the lowest court to the highest. This is a duty the Nigerian Supreme Court placed on their shoulders.

Keywords: interpretation of statutes, jurisdiction, literal rule, Nigeria, Shari'ah Court of Appeal, 1999 Constitution

Procedia PDF Downloads 186
2061 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 145
2060 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 263
2059 Children with Migration Backgrounds in Russian Elementary Schools: Teachers Attitudes and Practices

Authors: Chulpan Gromova, Rezeda Khairutdinova, Dina Birman

Abstract:

One of the most significant issues that schools all over the world face today is the ways teachers respond to increasing diversity. The study was informed by the tripartite model of multicultural competence, with awareness of personal biases a necessary component, together with knowledge of different cultures, and skills to work with students from diverse backgrounds. The paper presents the results of qualitative descriptive studies that help to understand how school teachers in Russia treat migrant children, how they solve the problems of adaptation of migrant children. The purpose of this study was to determine: a) educational practices used by primary school teachers when working with migrant children; b) relationship between practices and attitudes of teachers. Empirical data were collected through interviews. The participants were informed that a conversation was being recorded. They were also warned that the study was voluntary, absolutely anonymous, no personal data was disclosed. Consent was received from 20 teachers. The findings were analyzed using directive content analysis (Graneheim and Lundman, 2004). The analysis was deductive according to the categories of practices and attitudes identified in the literature review and enriched inductively to identify variation within these categories. Studying practices is an essential part of preparing future teachers for working in a multicultural classroom. For language and academic support, teachers mostly use individual work. In order to create a friendly classroom climate and environment teachers have productive conversations with students, organize multicultural events for the whole school or just for an individual class. The majority of teachers have positive attitudes toward migrant children. In most cases, positive attitudes lead to high expectations for their academic achievements. Conceptual orientation of teacher attitudes toward cultural diversity is mostly pluralistic. Positive attitudes, high academic expectations and conceptual orientation toward pluralism are favorably reflected in teachers’ practice.

Keywords: intercultural education, migrant children schooling, teachers attitudes, teaching practices

Procedia PDF Downloads 116
2058 Tasting and Touring: Chinese Consumers’ Experiences with Australian Wine and Winery Tour: A Case Study of Sirromet Wines, Queensland

Authors: Ning Niu

Abstract:

The study hinges on consumer taste, food industry (wine production) and cultural consumption (vineyard tourism) which are related to the Chinese market, consumers, and visitors traveling to Australian vineyards. The research topic can be summed up as: the economic importance of the Chinese market on Australian wine production; the economic importance of the Chinese market have an impact on how Australian wine is produced or packaged; the impact of mass Chinese wine tourism on Australian vineyards; the gendered and cultured experience of wine tourism for Chines visitors. This study aims to apply the theories of Pierre Bourdieu into the research in food industry and cultural consumption; investigate Chinese experiences with Australian wine products and vineyard tours; to explore the cultural, gendered and class influences on their experiences. The academic background covers the concepts of habitus, taste, capital proposed by Pierre Bourdieu along with long-lasting concepts within China’s cultural context including mianzi (face, dignity/honor/hierarchy) and guanxi (connections/social network), in order to develop new perspectives to study the tastes of Chinese tourists coming to Australia for wine experiences. The documents cited from Australian government or industries will be interpreted, and the analysis of data will constitute the economic background for this current study. The study applies qualitative research and draws from the fieldwork, choosing ethnographic observation, interviews, personal experiences and discursive analysis of government documents and tourism documents. The expected sample size includes three tourism professionals, two or three local Australian wine producers, and 20 to 30 Chinese wine consumers and visitors travelling to Australian vineyards. An embodied ethnography will be used to observe the Chinese participants’ feelings, thoughts, and experiences of their engagement with Australian wine and vineyards. The researcher will interview with Chinese consumers, tourism professionals, and Australian winemakers to collect primary data. Note-taking, picture-taking, and audio-recording will be adopted with informants’ permissions. Personal or group interview will be last for 30 and 60 minutes respectively. Personal experiences of the researcher have been analyzed to respond to some research questions, and have accumulated part of primary data (e.g., photos and stories) to discover how 'mianzi' and 'guanxi' influence Australian wine and tourism industries to meet the demands’ of Chinese consumers. At current stage, the secondary data from analysis of official and industrial documents has proved the economic importance of Chinese market is influencing Australian wine and tourism industries. And my own experiences related to this study, in some sense, has proved the Chinese cultural concepts (mianzi and guanxi) are influencing the Australian wine production and package along with vineyard tours. Future fieldwork will discover more in this research realm, contribute more to knowledge.

Keywords: habitus, taste, capital, mianzi, guanxi

Procedia PDF Downloads 130
2057 Drivers of the Performance of Members of a Social Incubator Considering the Values of Work: A Qualitative Study with Social Entrepreneurs

Authors: Leticia Lengler, Vania Estivalete, Vivian Flores Costa, Tais De Andrade, Lisiane Fellini Faller

Abstract:

Social entrepreneurship has emerged and driven a new development perspective, and as the literature mentions, it is based on innovation, and mainly, on the creation of social value, rather than personal wealth and shareholders. In this field of study, one of the focuses of discussion refers to the distinct characteristics of the individuals responsible for socially directed initiatives, named as social entrepreneurs. To contribute to this perspective, the present study aims to identify the values related to work that guide the performance of social entrepreneurs, members of enterprises that have developed themselves within a social incubator at a federal institution of higher education in Brazil. Each person's value system is present in different facets of his life, manifesting himself in his choices and in the way he conducts the relationship with other people in society. Especially the values of work, the focus of this research, play a significant role in organizational studies, since they are considered one of the important guiding principles of the behavior of individuals in the work environment. Regarding the method of the study, a descriptive and qualitative research was carried out. In the data collection, 24 entrepreneurs, members of five different enterprises belonging to the social incubator, were interviewed. The research instrument consisted of three open questions, which could be answered with the support of a "disc of values", an artifact organized to clearly demonstrate the values of the work to the respondents. The analysis of the interviews took into account the categories defined a priori, based on the model proposed by previous authors who validated these constructs within their research contexts, contemplating the following dimensions: Self-determination and stimulation; Safety; Conformity; Universalism and benevolence; Achievement; and Power. It should be noted that, in order to provide a better understanding of the interviewees, in the "disc of values" used in the research, these dimensions were represented by the objectives that define them, being respectively: Challenge; Financial independence; Commitment; Welfare of others; Personal success; And Power. Some preliminary results show that, as guiding principles of the investigation, priority is given to work values related to Self-determination and stimulation, Conformity and Universalism and benevolence. Such findings point to the importance given by these individuals to independent thinking and acting, as well as to novelty and constant challenge. Still, they demonstrate the appreciation of commitment to their enterprise, the people who make it and the quality of their work. They also point to the relevance of the possibility of contributing to the greater social good, that is, of the search for the well-being of close people and of society, as it is implied in models of social entrepreneurship coming from literature. With a lower degree of priority, the values denominated Safety and Realization, as the financial question at work and the search for satisfaction and personal success, through the use of socially recognized skills were mentioned aspects with little emphasis by social entrepreneurs. The Power value was not considered as guiding principle of the work for the respondents.

Keywords: qualitative study, social entrepreneur, social incubator, values of work

Procedia PDF Downloads 259
2056 An Evaluation of a Student Peer Mentoring Program

Authors: Nazeema Ahmed

Abstract:

This paper reports on the development of a student peer mentoring programme at a higher education institution. The programme is dependent on volunteering senior undergraduate students who are trained to mentor first-year students studying towards an engineering degree. The evaluation of the programme took the form of first-year students completing a self-report paper questionnaire at the onset of a lecture and mentors completing their questionnaire electronically. The evaluation yielded mixed findings. Peer mentoring clearly benefited some students in their adjustment to the institution. Specific mentors’ personal attributes enabled the establishment of successful mentoring relationships, where encouragement, advice and academic assistance was provided. Gains were reciprocal with mentors reporting that the programme contributed towards their personal development. Confidence in the programme was expressed in mentors feeling that it was an initiative worth continuing and first-year students agreeing that it be recommended to future first-year students. This was despite many unfavourable experiences of mentors where their professionalism and commitment to the programme was suspect. It is evident that while mentors began with noble intentions they appear either to lose interest or become overwhelmed with their own workload as the academic year progresses. On the other hand, some mentors reported feeling challenged by the apathy of first-year students who failed to maximise the opportunity available to them. The different attitudes towards mentoring that manifested as a mentoring culture in some departments were particularly pertinent to its successful implementation. The findings point to the key role of academic staff in the mentoring programme who model the mentoring relationship in their interaction with student mentors. While their involvement in the programme may be perceived as a drain on resources in an already demanding academic teaching environment, it is imperative that structural changes be put in place for the programme to be both efficient and sustainable. A pervasive finding concerns the evolving institutional culture of student development in the faculty. Mentors and first-year students alike alluded to the potential of the mentoring programme provided it is seriously endorsed at both the departmental and faculty level. The findings provide a foundation from which to develop the programme further and to begin improving its capacity for maximizing student retention in South African higher education.

Keywords: engineering students, first-year students, peer mentoring

Procedia PDF Downloads 253
2055 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 403
2054 The Experience of Middle Grade Teachers in a Culture of Collaboration

Authors: Tamara Tallman

Abstract:

Collaboration is a powerful tool for professional development and central for creating opportunities for teachers to reflect on their practice. However, school districts continue to have difficulty both implementing and sustaining collaboration. The purpose of this research was to investigate the experience of the teacher in a creative, instructional collaboration. The teachers in this study found that teacher-initiated collaboration offered them trust and they were more open with their partners. An interpretative phenomenological analysis was used for this study as it told the story of the teacher’s experience. Interpretative Phenomenological Analysis was chosen for this study to capture the complex and contextual nature of the teacher experience from a creative, instructional collaborative experience. This study sought to answer the question of how teachers in a private, faith-based school experience collaboration. In particular, the researcher engaged the study’s participants in interviews where they shared their unique perspectives on their experiences in relation to this phenomenon. Through the use of interpretative phenomenological analysis, the researcher interpreted the experiences of each participant in an attempt to gain deeper insight into how teachers made sense of their understanding of collaboration. In addition to the researcher’s interpreting the meaning of this construct for each research participant, this study gave a voice to the individual experiences and positionality of each participant at the research site. Moreover, the key findings presented in this study shed light on how teachers within this particular context participated in and made sense of their experience of creating an instructional collaborative. The research presented the findings that speak to the meaning that each research participant experienced in their relation to participating in building a collaborative culture and its effect on professional and personal growth. The researcher provided recommendations for future practice and research possibilities. The research findings demonstrated the unique experiences of each participant as well as a connection to the literature within the field of teacher professional development. The results also supported the claim that teacher collaboration can facilitate school reform. Participating teachers felt less isolation and developed more teacher knowledge.

Keywords: collaboration, personal grwoth, professional development, teachers

Procedia PDF Downloads 119
2053 A Framework for Event-Based Monitoring of Business Processes in the Supply Chain Management of Industry 4.0

Authors: Johannes Atug, Andreas Radke, Mitchell Tseng, Gunther Reinhart

Abstract:

In modern supply chains, large numbers of SKU (Stock-Keeping-Unit) need to be timely managed, and any delays in noticing disruptions of items often limit the ability to defer the impact on customer order fulfillment. However, in supply chains of IoT-connected enterprises, the ERP (Enterprise-Resource-Planning), the MES (Manufacturing-Execution-System) and the SCADA (Supervisory-Control-and-Data-Acquisition) systems generate large amounts of data, which generally glean much earlier notice of deviations in the business process steps. That is, analyzing these streams of data with process mining techniques allows the monitoring of the supply chain business processes and thus identification of items that deviate from the standard order fulfillment process. In this paper, a framework to enable event-based SCM (Supply-Chain-Management) processes including an overview of core enabling technologies are presented, which is based on the RAMI (Reference-Architecture-Model for Industrie 4.0) architecture. The application of this framework in the industry is presented, and implications for SCM in industry 4.0 and further research are outlined.

Keywords: cyber-physical production systems, event-based monitoring, supply chain management, RAMI (Reference-Architecture-Model for Industrie 4.0)

Procedia PDF Downloads 236
2052 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 377
2051 Opinions of Suan Sunandha Rajabhat University Administrative Personnel towards Performance of the University Council

Authors: Pitsanu Poonpetpun

Abstract:

This research aimed to study opinions of Suan Sunandha Rajabhat University administrative personnel towards performance of the university council committee by addressing (1) personal characteristics of the committees; (2) duties designated by the university council; and (3) relationship between university council and university administrative personnel. The population of this study including the president, vice presidents, faculty deans, deputy deans, office heads, director of office of president, directors, deputy directors, division directors, made a total of 118 respondents. Frequency, percentage, mean, and standard deviation were utilized in analyzing the data. The finding on opinions of the administrative personnel towards personal characteristics of the university council committees was averagely at a high level. The characteristic items were rated and revealed that the item gaining the highest mean score was the item stating that the university council committees obtained overall appropriate qualification. The items stating that the president of the teachers’ council acting as the university council committee had impartiality and good governance reported the lowest mean score. The opinions of the administrative personnel towards duty performance of the university council committees was averagely in a high level, in which the item gaining the highest mean score was the item stating that formulating rules and regulations or assigning governmental offices to do so was practiced with governance or fairness to all stakeholders, and the item stating that the president of the teachers’ council acting as the university council committee had impartiality good governance reported the lowest mean score. Moreover, the study found that the rating of opinions of the administrative personnel towards relationship between university council and university administrative personnel was averagely high. Relationship items were rated and revealed that the highest mean score was rated for the fact that the university president was empowered by the university council to manage the university with no violation of the policies. The fact that there was the integrity of policy between the university council and the university administrative personnel was rated the lowest score.

Keywords: performance, university council, education, university administrative personnel

Procedia PDF Downloads 285
2050 Impact of Increased Radiology Staffing on After-Hours Radiology Reporting Efficiency and Quality

Authors: Peregrine James Dalziel, Philip Vu Tran

Abstract:

Objective / Introduction: Demand for radiology services from Emergency Departments (ED) continues to increase with greater demands placed on radiology staff providing reports for the management of complex cases. Queuing theory indicates that wide variability of process time with the random nature of request arrival increases the probability of significant queues. This can lead to delays in the time-to-availability of radiology reports (TTA-RR) and potentially impaired ED patient flow. In addition, greater “cognitive workload” of greater volume may lead to reduced productivity and increased errors. We sought to quantify the potential ED flow improvements obtainable from increased radiology providers serving 3 public hospitals in Melbourne Australia. We sought to assess the potential productivity gains, quality improvement and the cost-effectiveness of increased labor inputs. Methods & Materials: The Western Health Medical Imaging Department moved from single resident coverage on weekend days 8:30 am-10:30 pm to a limited period of 2 resident coverage 1 pm-6 pm on both weekend days. The TTA-RR for weekend CT scans was calculated from the PACs database for the 8 month period symmetrically around the date of staffing change. A multivariate linear regression model was developed to isolate the improvement in TTA-RR, between the two 4-months periods. Daily and hourly scan volume at the time of each CT scan was calculated to assess the impact of varying department workload. To assess any improvement in report quality/errors a random sample of 200 studies was assessed to compare the average number of clinically significant over-read addendums to reports between the 2 periods. Cost-effectiveness was assessed by comparing the marginal cost of additional staffing against a conservative estimate of the economic benefit of improved ED patient throughput using the Australian national insurance rebate for private ED attendance as a revenue proxy. Results: The primary resident on call and the type of scan accounted for most of the explained variability in time to report availability (R2=0.29). Increasing daily volume and hourly volume was associated with increased TTA-RR (1.5m (p<0.01) and 4.8m (p<0.01) respectively per additional scan ordered within each time frame. Reports were available 25.9 minutes sooner on average in the 4 months post-implementation of double coverage (p<0.01) with additional 23.6 minutes improvement when 2 residents were on-site concomitantly (p<0.01). The aggregate average improvement in TTA-RR was 24.8 hours per weekend day This represents the increased decision-making time available to ED physicians and potential improvement in ED bed utilisation. 5% of reports from the intervention period contained clinically significant addendums vs 7% in the single resident period but this was not statistically significant (p=0.7). The marginal cost was less than the anticipated economic benefit based assuming a 50% capture of improved TTA-RR inpatient disposition and using the lowest available national insurance rebate as a proxy for economic benefit. Conclusion: TTA-RR improved significantly during the period of increased staff availability, both during the specific period of increased staffing and throughout the day. Increased labor utilisation is cost-effective compared with the potential improved productivity for ED cases requiring CT imaging.

Keywords: workflow, quality, administration, CT, staffing

Procedia PDF Downloads 112
2049 Accounting Legislation, Corporate Governance Codes and Disclosure in Jordan

Authors: Ayman Haddad, Wafaa Sbeiti, Amr Qasem

Abstract:

The main aim of this paper is to provide an overview of the most influential economic changes and accounting legislation affecting financial reporting and disclosure practices in Jordan. It also provides an overview of disclosure studies conducted in Jordan covering the year(s) between 1986 and 2014. The economic changes in Jordan required conducting economic reform and revising/issuing new regulations and financial market reforms that led to an improvement in disclosure practices. The issuance of Temporary Securities Law and its Directives of Disclosure in 1997, which came into effect in 1998, is considered as the turning point in the improvement of disclosure practice in Jordan. Based on a review of prior disclosure studies, we conclude that disclosure practices have improved overtime. We also observe that that firm size as a factor has always affected the level of disclosure in Jordan and followed by external auditing while liquidity was found to have the least effect. The paper also addresses the disclosure items required in Corporate Governance Codes that exist for listed shareholding companies, banks, and insurance companies. Finally, the paper discusses the quality of accounting education in Jordan since prior studies noted its impact on accounting practice.

Keywords: accounting legislation, corporate governance, disclosure practice, Jordan

Procedia PDF Downloads 361
2048 Developing Fire Risk Factors for Existing Small-Scale Hospitals

Authors: C. L. Wu, W. W. Tseng

Abstract:

From the National Health Insurance (NHI) system was introduced in Taiwan in 2000, there have been some problems in transformed small-scale hospitals, such as mobility of patients, shortage of nursing staff, medical pipelines breaking fire compartments and insufficient fire protection systems. Due to shrinking of the funding scale and the aging society, fire safety in small-scale hospitals has recently given cause for concern. The aim of this study is to determine fire risk index for small-scale hospital through a systematic approach The selection of fire safety mitigation methods can be regarded as a multi-attribute decision making process which must be guaranteed by expert groups. First of all, identify and select safety related factors and identify evaluation criteria through literature reviews and experts group. Secondly, application of the Fuzzy Analytic Hierarchy Process method is used to ascertain a weighted value which enables rating of the importance each of the selected factors. Overall, Sprinkler type and Compartmentation are the most crucial indices in mitigating fire, that is to say, structural approach play an important role to decrease losses in fire events.

Keywords: Fuzzy Delphi Method, fuzzy analytic hierarchy, process risk assessment, fire events

Procedia PDF Downloads 447
2047 On Cloud Computing: A Review of the Features

Authors: Assem Abdel Hamed Mousa

Abstract:

The Internet of Things probably already influences your life. And if it doesn’t, it soon will, say computer scientists; Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives. Alan Kay of Apple calls this "Third Paradigm" computing. Ubiquitous computing is essentially the term for human interaction with computers in virtually everything. Ubiquitous computing is roughly the opposite of virtual reality. Where virtual reality puts people inside a computer-generated world, ubiquitous computing forces the computer to live out here in the world with people. Virtual reality is primarily a horse power problem; ubiquitous computing is a very difficult integration of human factors, computer science, engineering, and social sciences. The approach: Activate the world. Provide hundreds of wireless computing devices per person per office, of all scales (from 1" displays to wall sized). This has required new work in operating systems, user interfaces, networks, wireless, displays, and many other areas. We call our work "ubiquitous computing". This is different from PDA's, dynabooks, or information at your fingertips. It is invisible; everywhere computing that does not live on a personal device of any sort, but is in the woodwork everywhere. The initial incarnation of ubiquitous computing was in the form of "tabs", "pads", and "boards" built at Xerox PARC, 1988-1994. Several papers describe this work, and there are web pages for the Tabs and for the Boards (which are a commercial product now): Ubiquitous computing will drastically reduce the cost of digital devices and tasks for the average consumer. With labor intensive components such as processors and hard drives stored in the remote data centers powering the cloud , and with pooled resources giving individual consumers the benefits of economies of scale, monthly fees similar to a cable bill for services that feed into a consumer’s phone.

Keywords: internet, cloud computing, ubiquitous computing, big data

Procedia PDF Downloads 382
2046 Quantitative Ranking Evaluation of Wine Quality

Authors: A. Brunel, A. Kernevez, F. Leclere, J. Trenteseaux

Abstract:

Today, wine quality is only evaluated by wine experts with their own different personal tastes, even if they may agree on some common features. So producers do not have any unbiased way to independently assess the quality of their products. A tool is here proposed to evaluate wine quality by an objective ranking based upon the variables entering wine elaboration, and analysed through principal component analysis (PCA) method. Actual climatic data are compared by measuring the relative distance between each considered wine, out of which the general ranking is performed.

Keywords: wine, grape, weather conditions, rating, climate, principal component analysis, metric analysis

Procedia PDF Downloads 318
2045 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 128
2044 The Impact of Cybercrime on Youth Development in Nigeria

Authors: Christiana Ebobo

Abstract:

Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.

Keywords: armed robber, cybercrime, integrity, youth

Procedia PDF Downloads 523
2043 The Role of Midwives in Promoting Childbearing in Respect to the Law of Population Youth in Iran

Authors: Parvin Abedi, Poorandokht Afshari

Abstract:

Introduction: In 2022, the Youth Law of the Population was notified to all organizations, including the Iranian Ministry of Health. Some of the articles of this law are about the role of midwives in health and treatment to promote childbearing. In this regard, articles number 45, 48, 49, and 50 are related to midwifery work that will be reviewed in this article. Methods: In this review, the law of population youth was reviewed. In this regard, the statistics of midwives working in the treatment and health sector were collected and analyzed according to the population youth law. Results: Nearly 47 000 midwives are working in the public and private sectors of the country and in the healthcare sector; according to Article 49, which states that there should be one midwife for every two parturient women, about 12,000 midwives are needed in the treatment department and about 8,000 midwives are needed in the health department. In Article 50 it is mentioned to modify tariffs and efficiency in order to increase natural childbirth, and in this field, insurance organizations should have sufficient cooperation with payments. The tariff for midwifery services has been increased, but it is not enough for the stressful job of midwifery. The labor incentive for delivery by midwives is also low. Conclusion: Midwives are one of the fundamental pillars of the law of the population, and without increasing the motivation of midwives, it is not possible to increase the rate of natural childbirth and make childbirth pleasant.

Keywords: law of the population, midwife, motivation, childbearing

Procedia PDF Downloads 41
2042 Factors Influencing Public Attitudes Towards Mental Illness in the Togolese Population

Authors: Myriam Roy

Abstract:

The perspectives of the Togolese public towards mental illness were assessed, looking at religious affiliation, personal knowledge of someone with a mental illness, and education level as influencers. The goal was to observe which factors influenced most strongly the general public’s attitudes towards mental illness. The Togolese population was surveyed within the context of mental health awareness workshops and involved college and university students, rural community members, and company employees. Taylor and Dear’s Community Attitudes towards the Mentally Ill (CAMI) questionnaire was used to assess these influencers and includes four dimensions of community attitudes towards mental illness: authoritarianism, benevolence, social restrictiveness, and community mental health ideology (CMHI). Demographic questions were also included, tailored to the various realities of the Togolese population. These questions looked, among others, at religious, ethnical (region of origin within Togo), and educational background. It was found that religious affiliation and personal knowledge did not correlate significantly with changes in the four dimensions of the CAMI scale. It suggests that public perspectives towards mental illness might not be as associated with these variables as was previously thought. The dimensions, however, did correlate with themselves as was expected. Authoritarianism was associated positively with social restrictiveness, benevolence was associated negatively with social restrictiveness and positively with CMHI, and CMHI was associated negatively with social restrictiveness, indicating the CAMI did not suffer from reliability and validity issues when used with this population. Interestingly, level of education significantly impacted authoritarianism level, with higher education associated with a decrease in authoritarianism. This finding would support the notion that education is likely to provide access to a wide array of information as well as interaction with people from various backgrounds and situations. Providing increased awareness regarding mental health and illness in schools could be beneficial to favor the impact that education appears to have on public perspectives towards mental illness in Togo. Future studies could assess which mental health interventions in schools would be the most useful in Togo.

Keywords: CAMI questionnaire, cross-cultural psychology, stigma towards mental illness, West African psychology

Procedia PDF Downloads 134
2041 The Relationship Between Artificial Intelligence, Data Science, and Privacy

Authors: M. Naidoo

Abstract:

Artificial intelligence often requires large amounts of good quality data. Within important fields, such as healthcare, the training of AI systems predominately relies on health and personal data; however, the usage of this data is complicated by various layers of law and ethics that seek to protect individuals’ privacy rights. This research seeks to establish the challenges AI and data sciences pose to (i) informational rights, (ii) privacy rights, and (iii) data protection. To solve some of the issues presented, various methods are suggested, such as embedding values in technological development, proper balancing of rights and interests, and others.

Keywords: artificial intelligence, data science, law, policy

Procedia PDF Downloads 106