Search results for: public attitudes security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9073

Search results for: public attitudes security

9013 University Students’ Perception on Public Transit in Dhaka City

Authors: Mosabbir Pasha, Ijaj Mahmud Chowdhury, M. A. Afrahim Bhuiyann

Abstract:

With the increasing population and intensive land use, huge traffic demand is generating worldwide both in developing and developed countries. As a developing country, Bangladesh is also facing the same problem in recent years by producing huge numbers of daily trips. As a matter of fact, extensive traffic demand is increasing day by day. Also, transport system in Dhaka is heterogeneous, reflecting the heterogeneity in the socio-economic and land use patterns. As a matter of fact, trips produced here are for different purposes such as work, business, educational etc. Due to the significant concentration of educational institutions a large share of the trips are generated by educational purpose. And one of the major percentages of educational trips is produced by university going students and most of them are travelled by car, bus, train, taxi, rickshaw etc. The aim of the study was to find out the university students’ perception on public transit ridership. A survey was conducted among 330 students from eight different universities. It was found out that 26% of the trips produced by university going students are travelled by public bus service and only 5% are by train. Percentage of car share is 16% and 12% of the trips are travelled by private taxi. From the study, it has been found that more than 42 percent student’s family resides outside of Dhaka, eventually they prefer bus instead of other options. Again those who chose to walk most of the time, of them, over 40 percent students’ family reside outside of Dhaka and of them over 85 percent students have a tendency to live in a mess. They generally choose a neighboring location to their respective university so that they can reach their destination by walk. On the other hand, those who travel by car 80 percent of their family reside inside Dhaka. The study also revealed that the most important reason that restricts students not to use public transit is poor service. Negative attitudes such as discomfort, uneasiness in using public transit also reduces the usage of public transit. The poor waiting area is another major cause of not using public transit. Insufficient security also plays a significant role in not using public transit. On the contrary, the fare is not a problem for students those who use public transit as a mode of transportation. Students also think stations are not far away from their home or institution and they do not need to wait long for the buses or trains. It was also found accessibility to public transit is moderate.

Keywords: traffic demand, fare, poor service, public transit ridership

Procedia PDF Downloads 244
9012 The Value of Job Security across Various Welfare Policies

Authors: Eithan Hourie, Miki Malul, Raphael Bar-El

Abstract:

To investigate the relationship between various welfare policies and the value of job security, we conducted a study with 201 people regarding their assessments of the value of job security with respect to three elements: income stability, assurance of continuity of employment, and security in the job. The experiment simulated different welfare policy scenarios, such as the amount and duration of unemployment benefits, workfare, and basic income. The participants evaluated the value of job security in various situations. We found that the value of job security is approximately 22% of the starting salary, which is distributed as follows: 13% reflects income security, 8.7% reflects job security, and about 0.3% is for being able to keep their current employment in the future. To the best of our knowledge, this article is one of the pioneers in trying to quantify the value of job security in different market scenarios and at varying levels of welfare policy. Our conclusions may help decision-makers when deciding on a welfare policy.

Keywords: job security value, employment protection legislation, status quo bias, expanding welfare policy

Procedia PDF Downloads 80
9011 The Principle of Methodological Rationality and Security of Organisations

Authors: Jan Franciszek Jacko

Abstract:

This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.

Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics

Procedia PDF Downloads 118
9010 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 374
9009 Knowledge of Critical Thinking and Attitudes Towards It among Saudi International Students in the UK Universities

Authors: Wesal A. Maash

Abstract:

The purpose of this study was to investigate Saudi students' knowledge of CT and their attitudes to it. The sample consisted of 121 students from 23 cities who are studying currently in UK universities with a mix of background variables (age, gender, and university level). A questionnaire was developed by the researcher to be used as the tool of the study. Its validity and reliability were established. The results revealed a negative correlation between knowledge of CT and the attitudes to it. It was also indicated that there exist statistically significant differences between the means of knowledge according to the university level, in favour of postgraduates. Moreover, no significant differences in the level of attitudes to CT were found according to age. Similarly, no significant differences in the knowledge of CT were found according to gender. Further, the attitudes to CT of Saudi students can be predicted based upon their university level. The findings suggest conducting further interpretive or mixed methods research with Saudi international students in order to understand the context in more depth.

Keywords: critical thinking, Saudi international students, knowledge of critical thinking, attitudes towards critical thinking

Procedia PDF Downloads 126
9008 Topic Sentiments toward the COVID-19 Vaccine on Twitter

Authors: Melissa Vang, Raheyma Khan, Haihua Chen

Abstract:

The coronavirus disease 2019 (COVID‐19) pandemic has changed people's lives from all over the world. More people have turned to Twitter to engage online and discuss the COVID-19 vaccine. This study aims to present a text mining approach to identify people's attitudes towards the COVID-19 vaccine on Twitter. To achieve this purpose, we collected 54,268 COVID-19 vaccine tweets from September 01, 2020, to November 01, 2020, then the BERT model is used for the sentiment and topic analysis. The results show that people had more negative than positive attitudes about the vaccine, and countries with an increasing number of confirmed cases had a higher percentage of negative attitudes. Additionally, the topics discussed in positive and negative tweets are different. The tweet datasets can be helpful to information professionals to inform the public about vaccine-related informational resources. Our findings may have implications for understanding people's cognitions and feelings about the vaccine.

Keywords: BERT, COVID-19 vaccine, sentiment analysis, topic modeling

Procedia PDF Downloads 120
9007 Career Attitudes of Human Resource Management Professionals in Portugal

Authors: Vitor Gomes, Maria João Santos

Abstract:

The research carried out aimed to analyze how human resources management professionals manage their careers. It investigates the protean career and boundaryless career attitudes of these professionals and the extent to which socio-demographic dimensions (salary, gender, and academic degree, amongst others) influence their attitudes. A total of 732 professionals in the field of human resources who work for other private companies in Portugal participated in this study. The results show that as far as the professionals studied are concerned, protean attitudes and boundaryless careers prevail. Other research findings show that: (1) those with higher salaries have higher levels of protean and boundaryless career attitudes; (2) male professionals and (3) with higher education have a higher prevalence of protean and boundaryless attitudes when compared to female professionals and professionals without higher education.

Keywords: boundaryless careeer, careeer management, human resource management, protean career, portugal

Procedia PDF Downloads 143
9006 Quality Management and Employees' Attitudes: An Example from Certified Enterprises

Authors: Ala Hanetite

Abstract:

This study aims to investigate the implications of quality management system (QMS) practices in employees' attitudes relating to job involvement, job satisfaction, career satisfaction, and organizational commitment. Design/methodology/approach: This study was accomplished through the use of a questionnaire. Twenty hypotheses related to QMS practices and the employees' attitudes were formulated and tested. Findings: The results indicate that responsibility and teamwork have a significant and positive correlation with job involvement, job satisfaction, career satisfaction, as well as organizational commitment. Ongoing improvement and problem solving have significant implications in organizational commitment. In addition, training and education, as well as customer focus, did not demonstrate any favorable contribution to the employees' attitudes. Originality/value: The study recommends that management should be more committed to the development of quality practices to sustain and enhance employees' positive attitudes toward their job. Such practices are a competitive strategy to attract and retain competent employees.

Keywords: attitudes, employee, quality management system, competitive strategy

Procedia PDF Downloads 246
9005 e-Learning Security: A Distributed Incident Response Generator

Authors: Bel G Raggad

Abstract:

An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.

Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection

Procedia PDF Downloads 403
9004 Can Empowering Women Farmers Reduce Household Food Insecurity? Evidence from Malawi

Authors: Christopher Manyamba

Abstract:

Women in Malawi produce perform between 50-70 percent of all agricultural tasks and yet the majority remain food insecure. The aim of his paper is to build on existing mixed evidence that indicates that empowering women in agriculture is conducive to improving food security. The WEAI is used to provide evidence on the relationship between women’s empowerment in agriculture and household food security. A multinomial logistic regression is applied to the Women Empowerment in Agriculture Index (WEAI) components and the Household Hunger Scale. The overall results show that the WEAI can be used to determine household food insecurity; however it has to be contextually adapted. Assets ownership, credit, group membership and leisure time are positively associated with food security. Contrary to other literature, empowerment in having control and decisions on income indicate negative association with household food security. These results could potentially better inform public, private and civil society stakeholders’ dialogues in creating the most effective and sustainable interventions to help women attain long-term food security.

Keywords: food security, gender, empowerment, agriculture index, framework for African food security, household hunger scale

Procedia PDF Downloads 342
9003 Culture Dimensions of Information Systems Security in Saudi Arabia National Health Services

Authors: Saleh Alumaran, Giampaolo Bella, Feng Chen

Abstract:

The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of research on the role and impact of an organisation’s cultural dimensions on information security. This research investigated and analysed the role and impact of cultural dimensions on information security in Saudi Arabia health service. Hypotheses were tested and two surveys were carried out in order to collect data and information from three major hospitals in Saudi Arabia (SA). The first survey identified the main cultural-dimension problems in SA health services and developed an initial information security culture framework model. The second survey evaluated and tested the developed framework model to test its usefulness, reliability and applicability. The model is based on human behaviour theory, where the individual’s attitude is the key element of the individual’s intention to behave as well as of his or her actual behaviour. The research identified six cultural dimensions: Saudi national culture, Saudi health service leadership, employees’ trust, technology, multicultural interactions and employees’ job roles. The research also identified a set of cultural sub-dimensions. These include working values and norms, tribe values and norms, attitudes towards women, power sharing, vision, social interaction, respect and understanding, hospital intra-net, hospital employees’ language(s) used, multi-national culture, communication system, employees’ job satisfaction and job security. The research identified that (a) the human behaviour towards medical information in SA is one of the main threats to information security and one of the main challenges to SA health authority, (b) The current situation of SA hospitals’ IS cultures is falling short in protecting medical information due to the current value and norms towards information security, (c) Saudi national culture and employees’ job role are the main dimensions playing major roles in the employees’ attitude, and technology is the least important dimension playing a role in the employees’ attitudes.

Keywords: cultural dimension, electronic health record, information security, privacy

Procedia PDF Downloads 331
9002 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 279
9001 Identification of Nursing Students’ Attitudes toward Older People in Turkey

Authors: Ayse Berivan Bakan, Senay Karadag Arli, Ela Varol

Abstract:

Objective: The present study aims to identify nursing students’ attitudes toward older people. Methods: This descriptive study was conducted with 166 nursing department students enrolled in a four-year undergraduate program in a university located in Eastern Turkey. The participants were chosen using convenience sampling method, and the data were collected through the Descriptive Characteristics Form and Turkish version of Kogan's Attitudes toward Old People Scale (KAOP). Results: It was found that the students participating in the study had positive attitudes toward old people, and the mean scores of those who wanted to work with old people after graduation were significantly high (p<0.05). Scale mean scores according to receiving Gerontology Nursing course showed that the score difference between the two groups was not statistically significant. Conclusion: This study found that nursing students’ attitudes toward older people were positive. Cultural features of the region where the study was conducted are considered to contribute to this result.

Keywords: older people, attitudes, gerontology, nursing students, Turkey

Procedia PDF Downloads 205
9000 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 388
8999 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 183
8998 Students’ Attitudes towards Reading as a Determinant of Performance in O’ Level English in Oyo State Secondary Schools, Nigeria

Authors: Adebimpe Olubunmi Adebanjo

Abstract:

This study observed students’ attitudes towards reading as a determinant of performance in O’ Level English in Oyo state secondary schools. Random sampling technique was used to select two schools from each of the five geo-political zones of the state while stratified sampling technique was used to select twenty students from each of the ten schools. A researcher designed questionnaire was used to gather information on students’ attitudes while a prepared test based on O’ Level syllabus was stapled to each of the questionnaire to ascertain their level of achievement in O’ Level English. The Percentage, Mean, Standard Deviation, Chi-square and Pearson Contingency Coefficient were used to answer and test the research questions and hypotheses raised. The findings showed that the general attitude of students towards reading was ambivalent; the general level of achievement was also low. The findings also revealed that there was a significant difference in the attitudes of students to reading on the basis of gender and home background. Students from educated homes also had better attitudes towards reading than their counterparts from illiterate homes. The findings also showed that there was a significant relationship between students’ attitudes to reading and their performance in O’ Level English. Students with positive attitude to reading had better grades in O’ Level English than students with ambivalent and negative attitudes. Based on the findings, it was recommended that students should change their attitudes to reading; the school and the home were also advised to always encourage students to read.

Keywords: positive, ambivalent, negative attitudes, o' level English

Procedia PDF Downloads 223
8997 Attitudes toward Work-Life Balance among Japanese Youth

Authors: Tomoko Adachi

Abstract:

Although, thirty years have passed since the enactment of Equal Employment Opportunity Law, contemporary Japanese citizens still have difficulties in balancing work and life responsibilities. Not a few women give up their professional career after childbirth, meanwhile, men spend longer hours at work and have minimal time for their families. One of the reasons should be attributed to the traditional gender role ideas which have been entrenched even among younger generations. In an attempt to explore the psychological factors which enable work-life balance, the current study investigated attitudes of Japanese youth toward work-life balance and their relationships with gender role attitudes. Participants were 948 Japanese (165 men and 783 women) with the average age of 19.60 (SD=1.18). As for measure, a scale developed and modified by the author was used to assess attitudes toward work-life balance and Short form of the Scale of Egalitarian Sex Role Attitudes (SESRA-S) was used to assess traditional vs. egalitarian gender role attitudes. The results showed clear gender differences as follows. First, examination of attitudes toward work-life balance showed that more than 90% of men preferred to continue their work without child care interruption. Meanwhile, women showed various attitudes, with around 50% wanted to have child care interruption, 40% wanted to continue working without it, while, 10% wanted to work until childbirth. Secondly, gender comparison of egalitarian gender role attitudes showed that women possessed equal ideas on gender roles than men. Thirdly, relationships between gender role attitudes and attitudes for work-life balance were examined. No significant relationship between the two was found among men, which implies that regardless of the gender role attitudes, most of the men thought that continuing work without child care interruption was the ideal path for them. On the other hand, the effects of gender role attitudes were apparent among women, showing that women with egalitarian attitudes preferred to continue their professional career even after childbirth. The present study revealed gender difference in the idea about work-life balance with men possessing traditional ideas of 'men should be a bread winner'. Implications for support on young adults to reconcile work and family responsibilities were discussed.

Keywords: career path, gender role attitudes, work-life balance, youth

Procedia PDF Downloads 494
8996 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 352
8995 Nurses' Knowledge and Attitudes toward the Use of Physical Restraints

Authors: Fatema Salman, Ridha Hammam, Fatima Khairallah, Fatima Aradi, Nafeesa Abdulla, Mohammed Alsafar

Abstract:

Purpose: This study aims at measuring the extent of nurses’ knowledge and attitudes toward the use of physical restraints in different hospital wards at Salmaniya Medical Complex (SMC). Background: The habitual use of physical restraint is a widespread practice among nurses working in the clinical settings. Restraints inflict many deleterious consequences on patients physically and psychologically which in turn increases their morbidity and mortality risk and jeopardizes care quality. Nurses’ knowledge and attitudes toward physical restraints are crucial determinants of the persistence of this practice. Literature review: the evidence of lack of knowledge among nurses regarding the use of physical restraints is overwhelming in various clinical settings, especially in two main areas which are the negative consequences and the available alternatives to physical restraints. Studies explored nurses’ attitudes toward physical restraints yielded inconsistent findings. Equally comparable, some studies found that nurses hold positive attitudes toward the use of physical restraints while some others reported just the opposite. Methods: Self-administered knowledge and attitudes scales to 106 nurses working in the SMC. Findings: nurses hold the moderate level of knowledge about restraints (M=58%) with weak negative attitudes (M = -20%) toward using it. Significant moderately-strong negative correlation (r= -0.57, r2= 0.32, p= 0.000) was uncovered between nurses knowledge and their attitudes which provided an empirical explanation of this phenomenon (use of physical restraints). Recommendations: Induction of awareness program that especially focuses on the negative consequences and encourages the use of alternatives is an evident need. This effort necessarily should be adjoined with policy and procedure adjustments.

Keywords: attitudes, knowledge, nurses, restraints

Procedia PDF Downloads 275
8994 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 339
8993 The Impact of Race, Politics and COVID-19 on Immigration in the United States

Authors: Cindy Agyemang

Abstract:

This study seeks to find out if racial sentiment toward immigrants still matters in the United States with COVID-19 present. It is argued that previous studies on immigration and racial attitudes or race conducted do not consider how health-related pandemics influence public opinion on immigration and the racial attitudes of people during severe health-related pandemics. In doing so, this paper hypothesizes that respondents' racial sentiment towards immigrants during this pandemic will influence their views on opposing immigration, those that believe the president handled cases on COVID-19 better are more likely to oppose immigration, and party affiliation affects respondents' views on immigration and COVID-19. For testing these hypotheses, the 2012, 2016, and 2020 American National Election Studies data was used. In accordance with the expectations of this study, it was observed that there was a statistically significant relationship between all my estimated models. This paper concludes that racial sentiment toward immigrants still matters even more in the United States, especially with the existence of health-related pandemics.

Keywords: COVID-19, immigration, racial attitudes, partisanship

Procedia PDF Downloads 264
8992 Challenges of Domestic Water Security for Sustainable Development in North Central Belt of Nigeria

Authors: Samuel Ibbi Ibrahim, Isaiah Ndalassan Ibrahim

Abstract:

Accessibility and availability of good quality water have become a major concern among different users. This paper examines the caustic importance of water security in relation to people’s desire for survival. It observed the democratic ideology of national policy on domestic water supply and demand and its implementation for national and societal development. It used analogy on equilibrium approach to ascertain the household water security. In most communities, it is glaring that several public water management in operation for several years are hardly performing efficiently to reach equilibrium demand. Moreover most settlements being rural or urban lack effective public water system that could ensure regular supplies to the population. The terrain and gradual declining of efficient rainfall northward poses great challenge to the region in managing water supply and demand adequately. This study itemized the need for the government to get clear strategy for a sustainable development on better water efficiency. Partnership in providing workable policy on water security is considered apparently important. It is also suggested that water plant treatment should be established in every medium-sized towns in the country.

Keywords: good quality of water, water accessibility, water availability, water sustainable

Procedia PDF Downloads 484
8991 Inclusivity in Public Spaces through Architecture: A Case of Transgender Community in India

Authors: Sakshi Dhruve, Ar. Sarang Barbarwar

Abstract:

Public spaces are the locus of activity and interaction in any urban area. Such spaces provide identity to cities, towns or neighborhoods and define the people and culture over there. Inclusiveness is one of the core aspects of public or community spaces. With its humongous population and rapidly expanding urban areas, India needs more inclusivity in public spaces to attain true equitable development. The aim of the paper is to discuss the sensitivity of public spaces in India to the transgender community. The study shows how this community was legally included as ‘Third Gender’ in country’s legislation yet lacks social acceptance and security. It shows the challenges and issues faced by them at public spaces. The community was studied on ethnographic basis to understand their culture, lifestyle, requirements, etc. The findings have indicated towards a social stigma from people and insensitivity in designing of civic spaces. The larger objective of the study is also to provide recommendations on the design aspects and interventions in public places to increase their inclusiveness towards the transgender society.

Keywords: community spaces, ethnographic, stigma, Third Gender community

Procedia PDF Downloads 254
8990 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 71
8989 Canadian High School Students' Attitudes and Perspectives Towards People With Disabilities, Autism, and ADHD

Authors: Khodi Morgan, Kasey Crowe, Amanda Morgan

Abstract:

Canadian High School Students' Attitudes & Perspectives Towards People With Disabilities, Autism, and ADHD. Objective: To survey Canadian high school students' regarding their attitudes and perspectives towards people with disabilities and explore how age, gender, and personal experience with disability may impact these views. Methods A survey was developed using the standardized Attitude Toward Persons With Disability Scale as its base, with the addition of questions specifically about Autism and Attention Deficit Hyperactivity Disorder (ADHD). The survey also gathered information about the participants’ age and gender and whether or not they, or a close family member, had any disabilities. Participants were recruited at a public Canadian high school by fellow student researchers. Results A total of 219 (N=219) students ranging from 13 - 19 years old participated in the study (m= 15.9 years of age). Gender was equally split, with 44% male, 42% female and 14% undeclared. Experience with disability was common amongst participants, with 25% self-identifying as having a personal disability and 48% claiming to have a close family member with a disability. Exploratory trends indicated that females, and people with self-identified disabilities, and people with close family members with disabilities trended towards having more positive attitudes toward persons with disabilities. This poster will report upon these trends and explore in more depth how personal factors such as age, gender and personal disability status impact high school students attitudes toward persons with disability in general and in regards to Autism and ADHD specifically.

Keywords: disability, autism, ADHD, community research, acceptance, adolescence, high school

Procedia PDF Downloads 51
8988 Students' Statistical Reasoning and Attitudes towards Statistics in Blended Learning, E-Learning and On-Campus Learning

Authors: Petros Roussos

Abstract:

The present study focused on students' statistical reasoning related to Null Hypothesis Statistical Testing and p-values. Its objective was to test the hypothesis that neither the place (classroom, at a distance, online) nor the medium that actually supports the learning (ICT, internet, books) has an effect on understanding of statistical concepts. In addition, it was expected that students' attitudes towards statistics would not predict understanding of statistical concepts. The sample consisted of 385 undergraduate and postgraduate students from six state and private universities (five in Greece and one in Cyprus). Students were administered two questionnaires: a) the Greek version of the Survey of Attitudes Toward Statistics, and b) a short instrument which measures students' understanding of statistical significance and p-values. Results suggest that attitudes towards statistics do not predict students' understanding of statistical concepts, whereas the medium did not have an effect.

Keywords: attitudes towards statistics, blended learning, e-learning, statistical reasoning

Procedia PDF Downloads 287
8987 The Factors that Affect to the Overall Attitude toward SMS Advertising of Thai Mobile Phone Users

Authors: Panprae Bunyapukkna

Abstract:

The aim of this study is to: (1) measure the overall attitudes of Thai mobile phone users toward SMS advertisements, and (2) identify demographic factors that affect the overall attitudes toward SMS advertisements of Thai mobile phone users. The sample in this study consists of 100 individuals who possess at least one mobile phone and who either live, work or study in Bangkok. Thirty-three respondents are male, while the other 67 respondents are female. The respondents are aged between 21 years and 45 years old. Convenient sampling technique was used in this study. The results of this study indicate that Thai mobile phone users in general hold negative attitudes toward SMS advertisements, and that negative attitudes prevailed in nearly all different demographic groups. The results also suggest that Thai mobile phone users find SMS advertisements irritating, but are indifferent as to whether SMS ads are informative, credible and entertaining as well.

Keywords: consumer attitudes, credibility, SMS advertising, Thai mobile phone users

Procedia PDF Downloads 242
8986 Mathematical Beliefs, Attitudes, and Performance of Freshman College Students

Authors: Johna Bernice Ablaza, Bryan Lim Corpuz, Joanna Marie Estrada, Mary Ann Cristine Olgado, Rhina Recato

Abstract:

This study aimed to describe the mathematical beliefs and attitudes in relation to the mathematics performance of freshman college students. The descriptive design using the correlational study was used to describe the relationship among mathematical beliefs, attitudes, and performance of freshman college students. This study involved one hundred fifty (150) freshman college students of Philippine Normal University during the third trimester of school year 2015-2016. The research instruments used to gather the information needed in the study are the beliefs about Mathematics Questionnaire, the KIM-Project Questionnaire, and the ACT Compass Mathematics Test. The data gathered were analyzed using the percentages, mean, standard deviation, and Pearson r-moment correlation. The results of this study have shown that although students believe that Mathematics is significant in their lives, the overall result on their beliefs and attitudes are positively low. There is a significant relationship between the students’ mathematical beliefs and mathematics performance. Likewise, their attitudes in mathematics have significant relationship to mathematics performance.

Keywords: attitudes, diligence, interest, mathematical beliefs, mathematical performance, self-confidence

Procedia PDF Downloads 250
8985 The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory

Authors: Ari S. Prabowo, Nia Febriyanti, Haryono B. Santosa

Abstract:

Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions.

Keywords: laboratory, physical protection system, security culture, security function

Procedia PDF Downloads 154
8984 Attitudes and Behaviors of Pediatric Residents towards Care for Underserved Children in a Tertiary Government Hospital

Authors: Paul Lawrence Filomeno, John Robert Medina, Anna Lisa Ong-Lim, Leonila Dans

Abstract:

Introduction: In most hospitals, pediatric residents are part of the frontline team who interacts with medically underserved patients. Despite of these daily encounters, little is known regarding their attitudes and behaviors towards caring for these underserved patients. Objectives: This study measured the pediatric resident physicians’ attitudes and behaviors towards underserved patients and determine its association. Methodology: The study utilized a cross-sectional mixed methodology, combining the use of a self-administered questionnaire survey using the Learner’s Needs Assessment tool, measuring both attitudes and behaviors towards the underserved. This is followed by a focus group discussion (FGD) involving a sample of residents at the Philippine General Hospital. Results: The response rate was 100% among 62 residents. Overall, 78% of pediatric residents acknowledged the issues of medically underserved to be very important. Volunteerism (behaviors) was only 27% during residency, and was projected to be 90% in future practice. No significant association was noted between their attitudes and behaviors. The FGD revealed that factors (i.e. burnout) causes strains in residents towards the underserved. Frustration from genuine concern for the underserved children was apparent. Conclusion: Among PGH pediatric residents, their attitudes and behaviors are noted to be positive towards the underserved. There was no significant correlation noted between having positive attitudes and volunteerism (behaviors) of the residents towards the underserved. Despite this, residents pointed out certain factors (i.e. burnout) that affect their attitudes and behaviors. The study results may serve as the basis for curriculum enhancements tailored to promote resident well-being, molding them to become the ‘5-star pediatricians’ who will genuinely be ready to serve the underserved.

Keywords: pediatric residents, attitudes, behaviors, underserved children

Procedia PDF Downloads 195