Search results for: security program
5642 Adaptive Programming for Indigenous Early Learning: The Early Years Model
Authors: Rachel Buchanan, Rebecca LaRiviere
Abstract:
Context: The ongoing effects of colonialism continue to be experienced through paternalistic policies and funding processes that cause disjuncture between and across Indigenous early childhood programming on-reserve and in urban and Northern settings in Canada. While various educational organizations and social service providers have risen to address these challenges in the short, medium and long term, there continues to be a lack in nation-wide cohesive, culturally grounded, and meaningful early learning programming for Indigenous children in Canada. Indigenous-centered early learning programs tend to face one of two scaling dilemmas: their program goals are too prescriptive to enable the program to be meaningfully replicated in different cultural/ community settings, or their program goals are too broad to be meaningfully adapted to the unique cultural and contextual needs and desires of Indigenous communities (the “franchise approach”). There are over 600 First Nations communities in Canada representing more than 50 Nations and languages. Consequently, Indigenous early learning programming cannot be applied with a universal or “one size fits all” approach. Sustainable and comprehensive programming must be responsive to each community context, building upon existing strengths and assets to avoid program duplication and irrelevance. Thesis: Community-driven and culturally adapted early childhood programming is critical but cannot be achieved on a large scale within traditional program models that are constrained by prescriptive overarching program goals. Principles, rather than goals, are an effective way to navigate and evaluate complex and dynamic systems. Principles guide an intervention to be adaptable, flexible and scalable. The Martin Family Initiative (MFI) ’s Early Years program engages a principles-based approach to programming. As will be discussed in this paper, this approach enables the program to catalyze existing community-based strengths and organizational assets toward bridging gaps across and disjuncture between Indigenous early learning programs, as well as to scale programming in sustainable, context-responsive and dynamic ways. This paper argues that using a principles-driven and adaptive scaling approach, the Early Years model establishes important learnings for culturally adapted Indigenous early learning programming in Canada. Methodology: The Early Years has leveraged this approach to develop an array of programming with partner organizations and communities across the country. The Early Years began as a singular pilot project in one First Nation. In just three years, it has expanded to five different regions and community organizations. In each context, the program supports the partner organization through different means and to different ends, the extent to which is determined in partnership with each community-based organization: in some cases, this means supporting the organization to build home visiting programming from the ground-up; in others, it means offering organization-specific culturally adapted early learning resources to support the programming that already exists in communities. Principles underpin but do not define the practices of the program in each of these relationships. This paper will explore numerous examples of principles-based adaptability with the context of the Early Years, concluding that the program model offers theadaptability and dynamism necessary to respond to unique and ever-evolving community contexts and needs of Indigenous children today.Keywords: culturally adapted programming, indigenous early learning, principles-based approach, program scaling
Procedia PDF Downloads 1935641 A Study of Curriculum for a Dual Bachelor’s Degree Including a Teaching Certificate
Authors: Hyeon Seok Kim, Inhoi Lee, Seong Baeg Kim, Kyunghee Ko, Kyung Eon Lee, Dong Sik Kang
Abstract:
In the age of globalization, higher education institutions attempt to equip students with global competence. In response, most universities have been developing and running various international programs. However, teacher education has been a neglected area in this trend. Therefore, in this study, we suggest a program that offers a dual bachelor’s degree from both universities located on different countries, focusing on teacher education institutions with different policies and regulations of teacher education programs that may become obstacles to designing a dual degree program. We discuss a possible way to get a dual degree including a teaching certificate at a specialized college, college of secondary education. To be specific, this research presents a way to attain two diplomas from Jeju National University (JNU) in Korea and Boise State University (BSU) in the U.S. It attempts to build an effective plan for students to declare simultaneous degrees at both universities. From the study, we find that it takes about 5 years to fulfill requirements for the dual degree at the undergraduate level.Keywords: dual degree, curriculum, teaching certificate, college of secondary education, international program
Procedia PDF Downloads 2955640 Motherhood Managerial in Health Services: Need Eustress Internalization
Authors: Retty Ratnawati, Santi Sri Wulandari, Tulus Sabrina
Abstract:
Feminine and masculine gender role stress could occur in some work situation. Being manager in health services that is known to be more women’ role in Indonesia, has expected to have feminine stereotype role. In the communities, this has been done in the program kesejahteraan keluarga (welfare family program) since the 1970s, for example through family planning program. The aim of the study was to explore the experience of being a motherhood managerial in health services. Our auto ethnographic study has revealed that motherhood managerial, even though running by a woman, could have some stress conditions whether she has realized or has not. The challenge would occur when the manager did not realize that she needed the eustress. The autonomy concept for a woman to be a manager could be a complex cycle that needs open communication continually and understanding the four elements surround her life. In conclusion, there is a demand to have the eustress when the manager does not realize that she has to be an autonomy person. However, it does not need eustress when the manager understands about how to deal with the complex cycle of being autonomy.Keywords: motherhood managerial, eustress, feminine gender role stress, masculine gender role stress, autonomy concept in women
Procedia PDF Downloads 2775639 An Analysis of OpenSim Graphical User Interface Effectiveness
Authors: Sina Saadati
Abstract:
OpenSim is a well-known software in biomechanical studies. There are worthy algorithms developed in this program which are used for modeling and simulation of human motions. In this research, we analyze the OpenSim application from the computer science perspective. It is important that every application have a user-friendly interface. An effective user interface can decrease the time, costs, and energy needed to learn how to use a program. In this paper, we survey the user interface of OpenSim as an important factor of the software. Finally, we infer that there are many challenges to be addressed in the development of OpenSim.Keywords: biomechanics, computer engineering, graphical user interface, modeling and simulation, interface effectiveness
Procedia PDF Downloads 995638 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics
Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova
Abstract:
We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.Keywords: cybersecurity, epidemiology, cyber epidemiology, malware
Procedia PDF Downloads 1125637 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services
Authors: Rachna Jain, Sushila Madan, Bindu Garg
Abstract:
Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service
Procedia PDF Downloads 3405636 Disability Management and Occupational Health Enhancement Program in Hong Kong Hospital Settings
Authors: K. C. M. Wong, C. P. Y. Cheng, K. Y. Chan, G. S. C. Fung, T. F. O. Lau, K. F. C. Leung, J. P. C. Fok
Abstract:
Hospital Authority (HA) is the statutory body to manage all public hospitals in Hong Kong. Occupational Care Medicine Service (OMCS) is an in-house multi-disciplinary team responsible for injury management in HA. Hospital administrative services (AS) provides essential support in hospital daily operation to facilitate the provision of quality healthcare services. An occupational health enhancement program in Tai Po Hospital (TPH) domestic service supporting unit (DSSU) was piloted in 2013 with satisfactory outcome, the keys to success were staff engagement and management support. Riding on the success, the program was rolled out to another 5 AS departments of Alice Ho Miu Ling Nethersole Hospital (AHNH) and TPH in 2015. This paper highlights the indispensable components of disability management and occupational health enhancement program in hospital settings. Objectives: 1) Facilitate workplace to support staff with health affecting work problem, 2) Enhance staff’s occupational health. Methodology: Hospital Occupational Safety and Health (OSH) team and AS departments (catering, linen services, and DSSU) of AHNH and TPH worked closely with OMCS. Focus group meetings and worksite visits were conducted with frontline staff engagement. OSH hazards were identified with corresponding OSH improvement measures introduced, e.g., invention of high dusting device to minimize working at height; tailor-made linen cart to minimize back bending at work, etc. Specific MHO trainings were offered to each AS department. A disability management workshop was provided to supervisors in order to enhance their knowledge and skills in return-to-work (RTW) facilitation. Based on injured staff's health condition, OMCS would provide work recommendation, and RTW plan was formulated with engagement of staff and their supervisors. Genuine communication among stakeholders with expectation management paved the way for realistic goals setting and success in our program. Outcome: After implementation of the program, a significant drop of 26% in musculoskeletal disorders related sickness absence day was noted in 2016 as compared to the average of 2013-2015. The improvement was postulated by innovative OSH improvement measures, teamwork, staff engagement and management support. Staff and supervisors’ feedback were very encouraging that 90% respondents rated very satisfactory in program evaluation. This program exemplified good work sharing among departments to support staff in need.Keywords: disability management, occupational health, return to work, occupational medicine
Procedia PDF Downloads 2165635 Frequent-Flyer Program: The Connection between Commercial Partners and Spin-off
Authors: Changmin Jiang
Abstract:
In this paper, we build a theoretical model to investigate the relationship between two recent trends in airline frequent-flyer programs (FFPs): the adoption of the “coalition” business model with other commercial partners, and the separation from airlines’ operations. We show that commercial partners benefit from teaming up with FFP, while increasing the number of commercial partners will increase the total profit; it reduces the average profit of the parties involved. Furthermore, we show that the number of commercial partners of an FFP is negatively related with the benefit to keep the FFP in-house.Keywords: frequent flyer program, coalition, commercial partners, spin-off
Procedia PDF Downloads 3065634 Corporate Social Responsibility and Students’ Job Performance: A Case Study of Silpakorn University’s Internship Program
Authors: Naritphol Boonyakiat
Abstract:
This research attempts to investigate the relationship between corporate social responsibility and students’ job performance of the Silpakorn University’s internship program within various organizations. The goal of this study is to fill the literature gap by gaining an understanding of corporate social responsibility that fundamentally relate to students’ job performance within the organizations. Thus, this study will focus on the outcomes that derive from selected employers’ qualitative assessment and evaluation forms from various companies. The results represent the perceptions of students towards the corporate social responsibility aspects and their job performance evaluation from the employers in various organizations. The findings indicate that corporate social responsibility has significant effects on students’ job performance. This study may assist us in gaining a better understanding of the integrated aspects of university and workplace environments to discover how to allocate optimally university’s resources and management approaches to gain benefits from corporate social responsibility practices toward students’ job performance within an organizational setting. Therefore, there is good reason to believe that the findings can contribute to research in the area of CSR and students’ job performance as an essential aspect of long-term success sustainability.Keywords: corporate social responsibility, job performance, university students, internship program
Procedia PDF Downloads 3845633 Profiling the Food Security Status of Farming Households in Chanchaga Area of Nigeria’s Guinea Savana
Authors: Olorunsanya E. O., Adedeji S. O., Anyanwu A. A.
Abstract:
Food insecurity is a challenge to many nations Nigeria inclusive. It is increasingly becoming a major problem among farm households due to many factors chief of which is low labour productivity. This study therefore profiles the food security status of a representative randomly selected 90 farming households in Chanchaga area of Nigeria’s Guinea Savana using structured interview schedule Descriptive and inferential statistics were used as analytical tools for the study. The results of the descriptive statistics show that majority (35.56%) of the surveyed household heads fall within the age range of 40 – 49 years and (88.89%) are male while (78.89) are married. More than half of the respondents have formal education. About 43.3% of the household heads have farm experience of 11- 20 years and a modal household size class range of 7 – 12. The results further reveal that majority (68.8%) earned more than N12, 500 (22.73 US Dollar) per month. The result of households’ food expenditure pattern reveals that an average household spends about N3, 644.44 (6.63 US Dollar) on food and food items on a weekly basis. The result of the analysis of food diversity intake in the study area shows that 63.33% of the sampled households fell under the low household food diversity intake, while 33 households, representing 36.67% ranks high in term of household food diversity intake. The result for the food security status shows that the sampled population was food secure (58.89%) while 41.11% falls below the recommended threshold. The result for the logistics regression model shows that age, engagement in off farm employment and household size are significant in determining the food security status of farm household in the study area. The three variables were significant at 10%, 5% and 1% respectively. The study therefore recommends among others, that measures be put in place by stakeholders to make agriculture attractive for youth since age is a significant determinant of food security in the study area. Awareness should also be created by stakeholders on the needs for effective family planning methods to be adopted by farm household in the study area.Keywords: Niger State, Guinea Savana, food diversity, logit regression model and food security
Procedia PDF Downloads 1105632 Dialogue Journals as an EFL Learning Strategy in the Preparatory Year Program: Learners' Attitudes and Perceptions
Authors: Asma Alyahya
Abstract:
This study attempts to elicit the perceptions and attitudes of EFL learners of the Preparatory Year Program at KSU towards dialogue journal writing as an EFL learning strategy. The descriptive research design used incorporated both qualitative and quantitative instruments to accomplish the objectives of the study. A learners’ attitude questionnaire and follow-up interviews with learners from a randomly selected representative sample of the participants were employed. The participants were 55 female Saudi university students in the Preparatory Year Program at King Saud University. The analysis of the results indicated that the PYP learners had highly positive attitudes towards dialogue journal writing in their EFL classes and positive perceptions of the benefits of the use of dialogue journal writing as an EFL learning strategy. The results also revealed that dialogue journals are considered an effective EFL learning strategy since they fulfill various needs for both learners and instructors. Interestingly, the analysis of the results also revealed that Saudi university level students tend to write about personal topics in their dialogue journals more than academic ones.Keywords: dialogue journals, EFL, learning strategy, writing
Procedia PDF Downloads 4635631 Feasibility Study of Iraq' Decomposition and Its Effects on the Region
Authors: Ebrahim Rahmani, Siyamak Moazeni
Abstract:
According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan
Procedia PDF Downloads 3345630 The Effectiveness of the Family-Centered Sensory and Motor Interactive Games Program on Strengthening the Developmental and Motor Skills of Children aged 12 to 24 Months Who Have a Prior History of Low Birth Weight
Authors: Seyede Soraya Alavinezhad, Gholam Ali Afrooz, Seyedsaeid Sajjadianari
Abstract:
The purpose of this study was to assess the efficacy of a family-centered sensory and motor interactive activities program in enhancing the motor and developmental abilities of infants between the ages of 12 and 24 months who have a medical history of low birth weight. The design of the study was a combined method (qualitative and quantitative). The statistical population comprised infants between the ages of 12 and 24 months who had a documented history of low birth weight in Tehran in 2022. The study sample comprised twenty-eight infants, ranging in age from twelve to twenty-four months, whose mothers were selected using a readily available sampling method. The participants were allocated into two groups—experimental and control—at random. The Children's Developmental Screening Scale, the third edition of Ages and Stages Questionnaires (ASQ3TM), was utilized in both cohorts. Two sessions of the family-centered program for mothers and sixteen sessions for children in the experimental group were taken into account. The statistical analysis software SPSS version 26 was utilized to analyze the data. Initially, the descriptive analysis of the variables, the normality of the assumptions, and the equality of the variance of the variables in the groups were examined. Subsequently, univariate analysis of covariance was employed to examine research hypotheses. The results of the covariance analysis demonstrated that the family-centered interactive activities program for sensory and motor development was effective. A significant difference has been observed between the experimental and control groups with regard to developmental skills between the pre-test and post-test (P<0.005). Motor and developmental skills among children aged 12 to 24 months with a history of low birth weight can be enhanced through entertainment programs that incorporate suitable structure, according to the findings of this study. It is recommended that future research investigate the efficacy of this program on children of average weight and conduct longitudinal studies.Keywords: children, developmental skills, low birth weight, sensory and motor interactive games program
Procedia PDF Downloads 275629 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures
Authors: Mastoor Qubra
Abstract:
Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation
Procedia PDF Downloads 2715628 CIPP Evaluation of Online Broadcasting of Suan Dusit Rajabhat University
Authors: Somkiat Korbuakaew, Winai Mankhatitham, Anchan Chongcharoen, Wichar Kunkum
Abstract:
This research’s objective is to evaluate the online broadcasting of Suan Dusit Rajabhat Univeristy by CIPP model. The evaluation was separated into 4 parts: context factor, input factor, process factor and product factor. Sample group in this research were 399 participants who were university’s executive, staff and students. Questionnaires and interview were the research tools. Data were analyzed by computer program. Statistics used here were percentage, mean, and standard deviation. Findings are as follows: 1. Context factor: The context factor here in this research was university’s executives, staff and students. The study shows that they would like to use online broadcasting to be the educational tool and IT development. 2. Input factor: The input factor was the modern IT equipment to create interesting teaching materials and develop education in general. 3. Process factor: The process factor in this study was the publication of the program that it should be promoted more among students and should be more objective. 4. Product factor: The product factor in this study was the purpose of the program that it expands the educational channel for students.Keywords: evaluation, project, internet, online broadcasting
Procedia PDF Downloads 5325627 Intrusion Detection System Based on Peer to Peer
Authors: Alireza Pour Ebrahimi, Vahid Abasi
Abstract:
Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.Keywords: network, intrusion detection system, peer to peer, internal and external network
Procedia PDF Downloads 5535626 Detecting Black Hole Attacks in Body Sensor Networks
Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai
Abstract:
This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++
Procedia PDF Downloads 6495625 The Application of Nuclear Energy for Sustainable Agriculture and Food Security: A Review
Authors: Gholamreza Farrokhi, Behzad Sani
Abstract:
The goals of sustainable agricultural are development, improved nutrition, and food security. Sustainable agriculture must be developed that will meet today’s needs for food and other products, as well as preserving the vital natural resource base that will allow future generations to meet their needs. Sustainable development requires international cooperation and the effective use of technology. Access to sustainable sources of food will remain a preeminent challenge in the decades to come. Based upon current practice and consumption, agricultural production will have to increase by about 70% by 2050 to meet demand. Nuclear techniques are used in developing countries to increase production sustainably by breeding improved crops, enhancing livestock reproduction and nutrition, as well as controlling animal and plant pests and diseases. Post-harvest losses can be reduced and safety increased with nuclear technology. Soil can be evaluated with nuclear techniques to conserve and improve soil productivity and water management.Keywords: food safety, food security, nuclear techniques, sustainable agriculture, sustainable future
Procedia PDF Downloads 3615624 Computational Approaches for Ballistic Impact Response of Stainless Steel 304
Authors: A. Mostafa
Abstract:
This paper presents a numerical study on determination of ballistic limit velocity (V50) of stainless steel 304 (SS 304) used in manufacturing security screens. The simulated ballistic impact tests were conducted on clamped sheets with different thicknesses using ABAQUS/Explicit nonlinear finite element (FE) package. The ballistic limit velocity was determined using three approaches, namely: numerical tests based on material properties, FE calculated residual velocities and FE calculated residual energies. Johnson-Cook plasticity and failure criterion were utilized to simulate the dynamic behaviour of the SS 304 under various strain rates, while the well-known Lambert-Jonas equation was used for the data regression for the residual velocity and energy model. Good agreement between the investigated numerical methods was achieved. Additionally, the dependence of the ballistic limit velocity on the sheet thickness was observed. The proposed approaches present viable and cost-effective assessment methods of the ballistic performance of SS 304, which will support the development of robust security screen systems.Keywords: ballistic velocity, stainless steel, numerical approaches, security screen
Procedia PDF Downloads 1705623 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand
Authors: John Battersby, Rhys Ball
Abstract:
After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.Keywords: academic, counter terrorism, intelligence, practitioner, research, security
Procedia PDF Downloads 1145622 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia
Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez
Abstract:
The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis
Procedia PDF Downloads 2435621 Water Access and Food Security: A Cross-Sectional Study of SSA Countries in 2017
Authors: Davod Ahmadi, Narges Ebadi, Ethan Wang, Hugo Melgar-Quiñonez
Abstract:
Compared to the other Least Developed Countries (LDCs), major countries in sub-Saharan Africa (SSA) have limited access to the clean water. People in this region, and more specifically females, suffer from acute water scarcity problems. They are compelled to spend too much of their time bringing water for domestic use like drinking and washing. Apart from domestic use, water through affecting agriculture and livestock contributes to the food security status of people in vulnerable regions like SSA. Livestock needs water to grow, and agriculture requires enormous quantities of water for irrigation. The main objective of this study is to explore the association between access to water and individuals’ food security status. Data from 2017 Gallup World Poll (GWP) for SSA were analyzed (n=35,000). The target population in GWP is the entire civilian, non-institutionalized, aged 15 and older population. All samples selection is probability based and nationally representative. The Gallup surveys an average of 1,000 samples of individuals per country. Three questions related to water (i.e., water quality, availability of water for crops and availability of water for livestock) were used as the exposure variables. Food Insecurity Experience Scale (FIES) was used as the outcome variable. FIES measures individuals’ food security status, and it is composed of eight questions with simple dichotomous responses (1=Yes and 0=No). Different statistical analyses such as descriptive, crosstabs and binary logistic regression, form the basis of this study. Results from descriptive analyses showed that more than 50% of the respondents had no access to enough water for crops and livestock. More than 85% of respondents were categorized as “food insecure”. Findings from cross-tabulation analyses showed that food security status was significantly associated with water quality (0.135; P=0.000), water for crops (0.106; P=0.000) and water for livestock (0.112; P=0.000). In regression analyses, the probability of being food insecure increased among people who expressed no satisfaction with water quality (OR=1.884 (OR=1.768-2.008)), not enough water for crops (OR=1.721 (1.616-1.834)) and not enough water for livestock (OR=1.706 (1.819)). In conclusion, it should note that water access affects food security status in SSA.Keywords: water access, agriculture, livestock, FIES
Procedia PDF Downloads 1555620 Gymnastics-Oriented Training Program: Impact of 6 weeks Training on the Fitness and Performance of Basketball Players
Authors: Syed Ibrahim, Syed Muneer Ahmed
Abstract:
It is a global phenomenon that fitness is a pre-requisite to the desired end of optimum efficiency in elite class basketballers achieved through appropriate conditioning program. This study was undertaken to find out the effect of gymnastic oriented training program on the physical fitness and the level of technical performance of basketball players. Method: 27 basketballers were divided into 12 experimental and 15 control groups aged between 19 to 25 years. Physical fitness tests comprising of vertical jump, push-ups, chin ups, sit ups, back strength, 30 m sprint, boomerangs test, 600 m run, sit and reach, bridge up and shoulder rotation and technical skill tests like dribbling, layup shots and rebound collection were used for the study. A pre- and post-test was conducted before and after the training program of 6 weeks. Results: The results indicated no significant difference in the anthropometric measurements of age, height and weight between the experimental and control group as the ‘t’ values observed were 0.28, 1.63 and 1.60 respectively . There were significant improvements in vertical jump, push-ups, sit-ups, modified boomerang test, bridge test and shoulder rotation index with the ‘t’ values being 2.60, 3.41, 3.91, 4.02, 3.55 and 2.33 respectively. However, no significant differences existed in chin-ups, back strength, 30 m sprint and 6000 m run with the ‘t’ values being 2.08, 1.77, 1.28 and 0.80 respectively. There was significant improvement in the post-test for the technical skills tests in the experimental group with ‘t’ values being 3.65, 2.57, and 3.62 for the dribble, layup shots and rebound collection respectively. There was no significant difference in the values of the control group except in the rebound collection which showed significant difference. Conclusion: It was found that both the physical fitness and skill proficiency of the basketballers increased through the participation in the gymnastics oriented program.Keywords: gymnastic, technical, pre-requisite, elite class
Procedia PDF Downloads 4045619 Exploration and Reform of Fundamentals of Program Design Based on Application Ability
Authors: Jiaqi Yin, Baofeng Liang
Abstract:
The rapid development in the fields of computer science and information technology presents new challenges and opportunities for foundational programming education. Traditional programming courses often focus heavily on theoretical knowledge while neglecting students’ practical programming and problem-solving abilities. This paper delves into the significance of programming education based on application abilities and provides a detailed explanation of a reform approach that incorporates project-driven teaching to nurture students with more comprehensive computer science skills.Keywords: fundamentals of programming, application abilities, pedagogical reform, program design
Procedia PDF Downloads 825618 The Effect of Artificial Intelligence on Human Rights Legislations and Evolution
Authors: Nawal Yacoub Halim Abdelmasih
Abstract:
The link between terrorism and human rights has grown to be a chief challenge in the combat against terrorism around the sector. This is primarily based on the truth that terrorism and human rights are so closely related that after the former starts, the latter is violated. This direct connection is identified in the Vienna Declaration and program of movement adopted by way of the sector Convention on Human Rights in Vienna on June 25, 1993, which acknowledges that acts of terrorism in all their paperwork and manifestations intended to damage the human rights of people. Terrorism, therefore, represents an assault on our maximum fundamental human rights. To this stop, the first part of this article makes a specialty of the connections between terrorism and human rights and seeks to spotlight the interdependence between those two standards. The second part discusses the rising idea of cyberterrorism and its manifestations. An evaluation of the fight against cyberterrorism inside the context of human rights is likewise performed.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 175617 The Changing Trend of Collaboration Patterns in the Social Sciences: Institutional Influences on Academic Research in Korea, 2013-2016
Authors: Ho-Dae Chong, Jong-Kil Kim
Abstract:
Collaborative research has become more prevalent and important across disciplines because it stimulates innovation and interaction between scholars. Seeing as existing studies relatively disregarded the institutional conditions triggering collaborative research, this work aims to analyze the changing trend in collaborative work patterns among Korean social scientists. The focus of this research is the performance of social scientists who received research grants through the government’s Social Science Korea (SSK) program. Using quantitative statistical methods, collaborative research patterns in a total of 2,354 papers published under the umbrella of the SSK program in peer-reviewed scholarly journals from 2013 to 2016 were examined to identify changing trends and triggering factors in collaborative research. A notable finding is that the share of collaborative research is overwhelmingly higher than that of individual research. In particular, levels of collaborative research surpassed 70%, increasing much quicker compared to other research done in the social sciences. Additionally, the most common composition of collaborative research was for two or three researchers to conduct joint research as coauthors, and this proportion has also increased steadily. Finally, a strong association between international journals and co-authorship patterns was found for the papers published by SSK program researchers from 2013 to 2016. The SSK program can be seen as the driving force behind collaboration between social scientists. Its emphasis on competition through a merit-based financial support system along with a rigorous evaluation process seems to have influenced researchers to cooperate with those who have similar research interests.Keywords: coauthorship, collaboration, competition, cooperation, Social Science Korea, policy
Procedia PDF Downloads 2335616 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review
Authors: Rashid Mahmood, Muhammad Junaid Sarwar
Abstract:
Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.Keywords: MANET, IDS, intrusions, signature, detection, prevention
Procedia PDF Downloads 3825615 The Political Economy of Green Trade in the Context of US-China Trade War: A Case Study of US Biofuels and Soybeans
Authors: Tonghua Li
Abstract:
Under the neoliberal corporate food regime, biofuels are a double-edged sword that exacerbates tensions between national food security and trade in green agricultural products. Biofuels have the potential to help achieve green sustainable development goals, but they threaten food security by exacerbating competition for land and changing global food trade patterns. The U.S.-China trade war complicates this debate. Under the influence of different political and corporate coordination mechanisms in China and the US, trade disputes can have different impacts on sustainable agricultural practices. This paper develops an actor-centred ‘network governance framework’ focusing on trade in soybean and corn-based biofuels to explain how trade wars can change the actions of governmental and non-governmental actors in the context of oligopolistic competition and market concentration in agricultural trade. There is evidence that the US-China trade decoupling exacerbates the conflict between national security, free trade in agriculture, and the realities and needs of green and sustainable energy development. The US government's trade policies reflect concerns about China's relative gains, leading to a loss of trade profits, making it impossible for the parties involved to find a balance between the three objectives and, consequently, to get into a biofuels and soybean industry dilemma. Within the setting of prioritizing national security and strategic interests, the government has replaced the dominant position of large agribusiness in the neoliberal food system, and the goal of environmental sustainability has been marginalized by high politics. In contrast, China faces tensions in the trade war between food security self-sufficiency policy and liberal sustainable trade, but the state-capitalist model ensures policy coordination and coherence in trade diversion and supply chain adjustment. Despite ongoing raw material shortages and technological challenges, China remains committed to playing a role in global environmental governance and promoting green trade objectives.Keywords: food security, green trade, biofuels, soybeans, US-China trade war
Procedia PDF Downloads 155614 Remote Sensing Applications in Identifying Opium Poppy: A Dual Approach to Food Security and Counter-Terrorism
Authors: Hadi Fadaei
Abstract:
The opium poppy plant, known for its significant role in the global drug trade, poses a dual threat to food security and national security. This paper explores the application of remote sensing technology to identify the spectral reflectance characteristics of the opium poppy, aiming to enhance monitoring efforts and inform policy decisions. The increasing prevalence of opium poppy cultivation, particularly in regions where food security is already compromised, necessitates a comprehensive understanding of its spatial distribution and growth patterns. Remote sensing offers a non-invasive and efficient means of collecting data on agricultural practices, enabling the identification of crop types and their health status. By analyzing the spectral reflectance of the opium poppy plant, we can differentiate it from other crops, thereby providing critical insights into its cultivation areas. This capability is essential for developing targeted interventions to mitigate the impacts of illicit opium production on food security and local economies. The methodology involves the use of advanced remote sensing techniques, including satellite imagery and aerial photography, to capture high-resolution spectral data. This data will be processed using sophisticated algorithms to extract relevant features that characterize the opium poppy's reflectance. The analysis will focus on identifying specific spectral signatures associated with the plant at various growth stages, which can be correlated with its physiological characteristics. The findings of this research are expected to contribute significantly to the understanding of opium poppy cultivation dynamics. By establishing a reliable method for detecting and mapping opium poppy fields, policymakers, and law enforcement agencies can enhance their efforts to combat illegal drug production. Furthermore, this research aims to highlight the implications of opium poppy cultivation on food security, particularly in regions where agricultural resources are limited and communities are vulnerable. In conclusion, the integration of remote sensing technology into the monitoring of opium poppy cultivation presents a promising approach to addressing the challenges posed by this plant. By identifying its spectral reflectance characteristics, we can develop effective strategies to mitigate its impact on food security and support counter-terrorism initiatives. This research not only aims to advance the field of remote sensing but also seeks to contribute to broader discussions on agricultural sustainability and security in the face of evolving threats. The outcomes of this study will provide valuable insights for stakeholders involved in food security, law enforcement, and agricultural policy, ultimately fostering a more secure and resilient future.Keywords: opium poppy, remote sensing, spectral reflectance, food security, counter-terrorism
Procedia PDF Downloads 75613 The Food and Nutritional Effects of Smallholders’ Participation in Milk Value Chain in Ethiopia
Authors: Geday Elias, Montaigne Etienne, Padilla Martine, Tollossa Degefa
Abstract:
Smallholder farmers’ participation in agricultural value chain identified as a pathway to get out of poverty trap in Ethiopia. The smallholder dairy activities have a huge potential in poverty reduction through enhancing income, achieving food and nutritional security in the country. However, much less is known about the effects of smallholder’s participation in milk value chain on household food security and nutrition. This paper therefore, aims at evaluating the effects of smallholders’ participation in milk value chain on household food security taking in to account the four pillars of food security measurements (availability, access, utilization and stability). Using a semi-structured interview, a cross sectional farm household data collected from a randomly selected sample of 333 households (170 in Amhara and 163 in Oromia regions).Binary logit and propensity score matching( PSM) models are employed to examine the mechanisms through which smallholder’s participation in the milk value chain affects household food security where crop production, per capita calorie intakes, diet diversity score, and food insecurity access scale are used to measure food availability, access, utilization and stability respectively. Our findings reveal from 333 households, only 34.5% of smallholder farmers are participated in the milk value chain. Limited access to inputs and services, limited access to inputs markets and high transaction costs are key constraints for smallholders’ limited access to the milk value chain. To estimate the true average participation effects of milk value chain for participated households, the outcome variables (food security) of farm households who participated in milk value chain are compared with the outcome variables if the farm households had not participated. The PSM analysis reveals smallholder’s participation in milk value chain has a significant positive effect on household income, food security and nutrition. Smallholder farmers who are participated in milk chain are better by 15 quintals crops production and 73 percent of per capita calorie intakes in food availability and access respectively than smallholder farmers who are not participated in the market. Similarly, the participated households are better in dietary quality by 112 percents than non-participated households. Finally, smallholders’ who are participated in milk value chain are better in reducing household vulnerability to food insecurity by an average of 130 percent than non participated households. The results also shows income earned from milk value chain participation contributed to reduce capital’s constraints of the participated households’ by higher farm income and total household income by 5164 ETB and 14265 ETB respectively. This study therefore, confirms the potential role of smallholders’ participation in food value chain to get out of poverty trap through improving rural household income, food security and nutrition. Therefore, identified the determinants of smallholder participation in milk value chain and the participation effects on food security in the study areas are worth considering as a positive knock for policymakers and development agents to tackle the poverty trap in the study area in particular and in the country in general.Keywords: effects, food security and nutrition, milk, participation, smallholders, value chain
Procedia PDF Downloads 345