Search results for: security education
8937 Citizenship Education and Access to Information for Political Socialization and Unity in Nigeria
Authors: Alh Rauf Bello Bella
Abstract:
The main purpose of citizenship education if properly executed is to create awareness and enlightenment in the society to bring tolerance and political unity among the people. For the citizenry to have a meaningful participation for the achievement of this objective in a modern society where democracy thrives, all citizens should also have access to information on all matters affecting their lives and well-being. The paper therefore examines the scope of citizenship education and the complementary role of information providers in the quest for political socialization and national unity. It emphasizes some issues of national unity which should be addressed through proper enlightenment of the citizenry and access to relevant and timely information at the grassroots.Keywords: citizenship education, national unity, political socialization, Nigeria
Procedia PDF Downloads 4758936 An Investigation into the Views of Distant Science Education Students Regarding Teaching Laboratory Work Online
Authors: Abraham Motlhabane
Abstract:
This research analysed the written views of science education students regarding the teaching of laboratory work using the online mode. The research adopted the qualitative methodology. The qualitative research was aimed at investigating small and distinct groups normally regarded as a single-site study. Qualitative research was used to describe and analyze the phenomena from the student’s perspective. This means the research began with assumptions of the world view that use theoretical lenses of research problems inquiring into the meaning of individual students. The research was conducted with three groups of students studying for Postgraduate Certificate in Education, Bachelor of Education and honors Bachelor of Education respectively. In each of the study programmes, the science education module is compulsory. Five science education students from each study programme were purposively selected to participate in this research. Therefore, 15 students participated in the research. In order to analysis the data, the data were first printed and hard copies were used in the analysis. The data was read several times and key concepts and ideas were highlighted. Themes and patterns were identified to describe the data. Coding as a process of organising and sorting data was used. The findings of the study are very diverse; some students are in favour of online laboratory whereas other students argue that science can only be learnt through hands-on experimentation.Keywords: online learning, laboratory work, views, perceptions
Procedia PDF Downloads 1438935 Re-Thinking Humanism as a Guiding Philosophy of Education: A Critical Reflection on Ethiopian Higher Education Institutions
Authors: Sisay Tamrat Ayalew
Abstract:
This paper explores the concept of humanism as a guiding philosophy in education, specifically focusing on Ethiopian Higher Education Institutions (EHEIs). It highlights the perceived lack of humanistic elements within the educational system and the resulting intellectual and moral decay among students. The aim of this study is to critically reflect on the essence of humanism and its relevance to Ethiopian higher education. By examining the philosophy and practice of humanism, the paper seeks to evaluate the existing state of EHEIs in relation to this educational approach. The methodology employed in this research is qualitative. The study relies primarily on literature review and analysis of policy documents to gain insights into the subject matter. A hermeneutic approach is utilized to interpret the realities observed in various contexts. The key finding of this paper is that Ethiopian higher education institutions lack humanistic elements in their educational practices. This deficiency contributes to the overall moral and intellectual decay among students. The study accentuates that humanism is not merely an optional extra but an essential tool for creating a clean academic environment and fostering the holistic development of students.Keywords: humanism, higher education, human dignity, intellectual decadence, moral sickness
Procedia PDF Downloads 758934 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 1518933 Actual and Perceived Financial Sophistication and Wealth Accumulation: The Role of Education and Gender
Authors: Christina E. Bannier, Milena Neubert
Abstract:
This study examines the role of actual and perceived financial sophistication (i.e., financial literacy and confidence) for individuals’ wealth accumulation. Using survey data from the German SAVE initiative, we find strong gender- and education-related differences in the distribution of the two variables: Whereas financial literacy rises in formal education, confidence increases in education for men but decreases for women. As a consequence, highly-educated women become strongly underconfident, while men remain overconfident. We show that these differences influence wealth accumulation: The positive effect of financial literacy is stronger for women than for men and is increasing in women’s education but decreasing in men’s. For highly-educated men, however, overconfidence closes this gap by increasing wealth via stronger financial engagement. Interestingly, female underconfidence does not reduce current wealth levels though it weakens future-oriented financial engagement and may thus impair future wealth accumulation.Keywords: financial literacy, financial sophistication, confidence, wealth, household finance, behavioral finance, gender, formal education
Procedia PDF Downloads 2658932 Nation Building versus Self Determination: Thai State’s Response to Insurgency in South
Authors: Sunaina Sunaina
Abstract:
The emergence of Thailand as a modern nation was amalgamation of several minority groups. Eventually, the nation tried to mitigate these diversities in the name of nationalism in the backdrop of colonial powers presence in neighboring nations. However, the continued imposition of modern nation building processes (which is a western concept) in the post-colonial era deepen the feelings of alienation among the minority groups and leads to separatist conflicts. It is significant that whatever form these conflicts take, will impact the security of nation as well as the region of Southeast Asia. This paper tries to explore the possible factors behind the state policies adopted by the government of Thailand to manage the insurgency in Southern provinces in the south. The protracted insurgency in the South has historical roots as Pattani kingdom had glorious period whether it was trade or commerce or education and its assimilation was never accepted by the leaders of these areas. But after assimilation of southern provinces in the state, it has been the state policy as an important factor in promoting or mitigating the insurgency. Initial protests from the elite class of southern provinces inflated into a more organized and violent uprising after Second World War. It was only the decade of 1990s that a relative peace could prevail for some time. The violence reemerged in 2004 with more intensity and till today this area is suffering with violence. Period of different Prime Ministers dealt this insurgency in different ways sometimes very hard line approach had been adopted especially under Primeminstership of Thaksin Shinawatra. Recently, the peace talks which were started during the period of Yinglunck Shinawatra and were carried forward by Junta government also halted. And again, the region stays in a very volatile state. Violence in these provinces not only questions the capability of government to provide political solution to the problem, but also emerges as a major threat to the internal security of the state. The current era where global terrorism is spreading fast, such vulnerable areas may work as a new ground for its proliferation in Southeast Asia. The paper attempts to understand how Thailand’s historical experience of security determines a different approach to national unity which limits the prospects for autonomy in the South. In conjunction with this experience it is nature of national politics and leadership that influences the nature of policies on the ground in Southern Thailand. The paper also tries to bring out conflict between state sovereignty and self-determination as demanded by many in the southern provinces.Keywords: insurgency, southern Thailand, security, nation building
Procedia PDF Downloads 1248931 Leveraging Engineering Education and Industrial Training: Learning from a Case Study
Authors: Li Wang
Abstract:
The explosive of technology advances has opened up many avenues of career options for engineering graduates. Hence, how relevant their learning at university is very much dependent on their actual jobs. Bridging the gap between education and industrial practice is important, but it also becomes evident how both engineering education and industrial training can be leveraged at the same time and balance between what students should grasp at university and what they can be continuously trained at the working environment. Through a case study of developing a commercial product, this paper presents the required level of depth of technical knowledge and skills for some typical engineering jobs (for mechanical/materials engineering). It highlights the necessary collaboration for industry, university, and accreditation bodies to work together to nurture the next generation of engineers.Keywords: leverage, collaboration, career, industry, engineering education
Procedia PDF Downloads 958930 Project-Based Learning in Engineering Education
Authors: M. Greeshma, V. Ashvini, P. Jayarekha
Abstract:
Project based learning (PBL) is a student-driven educational framework and offers the student an opportunity for in-depth investigations of courses. This paper presents the need of PBL in engineering education for the student to graduate with a capacity to design and implement complex problems. The implementation strategy of PBL and its related challenges are presented. The case study that energizes the engineering curriculum with a relevance to the real-world of technology along with its benefits to the students is also included.Keywords: PBL, engineering education, curriculum, implement complex
Procedia PDF Downloads 4718929 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 398928 Gifted Disadvantage in Education Safety Net: A Reality Check: A Case Study From India
Authors: Jyoti Sharma
Abstract:
Although notion of giftedness is a reality, yet it swings along the pendulum of equality and excellence. At times, nurturance of gifted abilities becomes a struggle of better catchment of resources and facilities. Those from affluent setup are blessed with better support system whereas gifted children from disadvantaged group suffer from submissive upbringing. In developing countries like India, with diverse demographic profiles, socio-cultural diversity and economic disparity, the very concept of equality in education face severe challenge. The present paper presents the dichotomy of ideology of equality and excellence in education practices. It highlights the need of wider vision, better policy making and decentralized implementation services to allow gifted children to enjoy what they are; dream what they can be; and promote what they will be.Keywords: gifted, disadvantaged, education safety net, India
Procedia PDF Downloads 5268927 Towards Understanding the Notions of Quality Education among Internationally-Accredited Christian Schools in Southeast Asia
Authors: Selaphares Jatico Tajale
Abstract:
This research aims to understand the notions of quality education by conducting case studies among internationally-accredited Christian schools in Southeast Asia. Five internationally-accredited Christian schools from Cambodia, Indonesia, Malaysia, The Philippines, and Singapore will be chosen as cases for this study. This study will utilize the processes of interviews, filling up of questionnaires, and writing of reflections in order to obtain data and relevant information. These processes will be conducted through multi-sectoral respondents such as administrators, academic heads, and faculty. This study employs five aspects within the realm of education as guides in the formulation of questionnaire and guide questions in the interview, namely: a) school context, b) classroom, c) quality assurance, d) stakeholders, e) faculty and staff. Guide interview questions and questions in the questionnaires are formulated to uncover information on how those five aspects were managed to achieve desired student learning outcomes and uncover other information useful for the study.Keywords: internationally-accredited, notions of quality education, quality education, quality education in Southeast Asia
Procedia PDF Downloads 2388926 A Review on Factors Influencing Implementation of Secure Software Development Practices
Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin
Abstract:
More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.Keywords: secure software development, software development, software security, systematic literature review
Procedia PDF Downloads 3768925 Career Anchors and Domain Specialization in Management Education: A Deviation Analysis
Authors: Santosh Kumar Sharma
Abstract:
In view of management education with special reference to India, it has been noted that students have deviations between their career anchors and domain of specialization. As a consequence, they face problems in their summer internships and placements in the corporate sector. Eventually, they either change their career track or leave the management profession, which is a serious concern from the perspective of human capital. However, there is no substantial literature in the given context. Therefore, the present study contributes to the global discourse of management education and its spillover effect on human resource management. The objective of the present study is to analyze the deviation between career anchors and domain specialization with reference to management education in India. The present study is exploratory in nature, wherein data has been collected from a significant number of post-graduate students who are pursuing management education from a premium business school in India, followed by descriptive analysis. The present research contributes to the professional development of management students from the perspective of human capital, which is eventually related to various factors of the Indian economy.Keywords: India, management education, domain specialization, placements
Procedia PDF Downloads 878924 Brazilian Public Security: Governability and Constitutional Change
Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari
Abstract:
Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.Keywords: public security, governability, rule of law, federalism
Procedia PDF Downloads 6778923 The Pen Is Mightier than the Sword: Kurdish Language Policy in Turkey
Authors: Irene Yi
Abstract:
This paper analyzes the development of Kurdish language endangerment in Turkey and Kurdish language education over time. It examines the historical context of the Turkish state, as well as reasons for the Turkish language hegemony. From a linguistic standpoint, the Kurdish language is in danger of extinction despite a large number of speakers, lest Kurdish language education is more widely promoted. The paper argues that Kurdish is no longer in a stable diglossic state; if the current trends continue, the language will lose its vitality. This paper recognizes the importance of education in preserving the language while discussing the changing political and institutional regard for Kurdish education. Lastly, the paper outlines solutions to the issue by looking at a variety of proposals, from creating a Kurdistan to merely changing the linguistic landscape in Turkey. After analysis of possible solutions in terms of realistic ability and effectiveness, the paper concludes that changing linguistic landscape and increasing Kurdish language education are the most ideal first steps in a long fight for Kurdish linguistic equality.Keywords: endangered, Kurdish, oppression, policy
Procedia PDF Downloads 1498922 Development of a Data Security Model Using Steganography
Authors: Terungwa Simon Yange, Agana Moses A.
Abstract:
This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.Keywords: steganography, cryptography, encryption, decryption, secrecy
Procedia PDF Downloads 2648921 Problems in Lifelong Education Course in Information and Communication Technology
Authors: Hisham Md.Suhadi, Faaizah Shahbodin, Jamaluddin Hashim, Nurul Huda Mahsudi, Mahathir Mohd Sarjan
Abstract:
The study is the way to identify the problems that occur in organizing short courses lifelong learning in the information and communication technology (ICT) education which are faced by the lecturer and staff at the Mara Skill Institute and Industrial Training Institute in Pahang, Malaysia. The important aspects of these issues are classified to five which are selecting the courses administrative. Fifty lecturers and staff were selected as a respondent. The sample is selected by using the non-random sampling method purpose sampling. The questionnaire is used as a research instrument and divided into five main parts. All the data that gain from the questionnaire are analyzed by using the SPSS in term of mean, standard deviation and percentage. The findings showed that there are the problems occur in organizing the short course for lifelong learning in ICT education.Keywords: lifelong Education, information and communication technology, short course, ICT education, courses administrative
Procedia PDF Downloads 4538920 Disability, Technology and Inclusion: Fostering and Inclusive Pedagogical Approach in an Interdisciplinary Project
Authors: M. Lopez-Pereyra, I. Cisneros Alvarado, M. Del Socorro Lobato Alba
Abstract:
This paper aims to discuss a conceptual, pedagogical approach that foster inclusive education and that create an awareness of the use of assistive technology in Mexico. Interdisciplinary understanding of disabilities and the use of assistive technology as a frame for an inclusive education have challenged the reality of the researchers’ participation in decision-making. Drawing upon a pedagogical inquiry process within an interdisciplinary academic project that involved the sciences, design, biotechnology, psychology and education fields, this paper provides a discussion on the challenges of assistive technology and inclusive education in interdisciplinary research on disabilities and technology project. This study is frame on an educational action research design where the team is interested in integrating, disability, technology, and inclusion, theory, and practice. Major findings include: (1) the concept of inclusive education as a strategy for interdisciplinary research; (2) inclusion as a pedagogical approach that challenges the creation of assistive technology from diverse academic fields; and, (3) inclusion as a frame, problem-focused, for decision-making. The findings suggest that inclusive pedagogical approaches provide a unique insight into interdisciplinary teams on disability and assistive technology in education.Keywords: assistive technology, inclusive education, inclusive pedagogy, interdisciplinary research
Procedia PDF Downloads 1898919 A False Introduction: Teaching in a Pandemic
Authors: Robert Michael, Kayla Tobin, William Foster, Rachel Fairchild
Abstract:
The COVID-19 pandemic has caused significant disruptions in education, particularly in the teaching of health and physical education (HPE). This study examined a cohort of teachers that experienced being a preservice and first-year teacher during various stages of the pandemic. Qualitative data collection was conducted by interviewing six teachers from different schools in the Eastern U.S. over a series of structured interviews. Thematic analysis was employed to analyze the data. The pandemic significantly impacted the way HPE was taught as schools shifted to virtual and hybrid models. Findings revealed five major themes: (a) You want me to teach HOW?, (b) PE without equipment and six feet apart, (c) Behind the Scenes, (d) They’re back…I became a behavior management guru, and (e) The Pandemic Crater. Overall, this study highlights the significant challenges faced by preservice and first-year teachers in teaching physical education during the pandemic and underscores the need for ongoing support and resources to help them adapt and succeed in these challenging circumstances.Keywords: teacher education, preservice teachers, first year teachers, health and physical education
Procedia PDF Downloads 1838918 Signs, Signals and Syndromes: Algorithmic Surveillance and Global Health Security in the 21st Century
Authors: Stephen L. Roberts
Abstract:
This article offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The article traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This article demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This article argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the article also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this article demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice of global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.Keywords: algorithms, global health, pandemic, surveillance
Procedia PDF Downloads 1838917 A Sociological Study of Rural Women Attitudes toward Education, Health and Work outside Home in Beheira Governorate, Egypt
Authors: A. A. Betah
Abstract:
This research was performed to evaluate the attitudes of rural women towards education, health and work outside the home. The study was based on a random sample of 147 rural women, Kafr-Rahmaniyah village was chosen for the study because its life expectancy at birth for females, education and percentage of females in the labor force, were the highest in the district. The study data were collected from rural female respondents, using a face-to-face questionnaire. In addition, the study estimated several factors like age, main occupation, family size, monthly household income, geographic cosmopolites, and degree of social participation for rural women respondents. Using Statistical Package for the Social Sciences (SPSS), data were analyzed by non-parametric statistical methods. The main finding in this study was a significant relationship between each of the previous variables and each of rural women’s attitudes toward education, health, and work outside home. The study concluded with some recommendations. The most important element is ensuring attention to rural women’s needs, requirements and rights via raising their health awareness, education and their contributions in their society.Keywords: attitudes, education, health, rural women, work outside home
Procedia PDF Downloads 2948916 Influence of Entrepreneurial Passion in the Relationship between the Entrepreneurship Education and Entrepreneurial Intention: The Case of Moroccan Students
Authors: Soukaina Boutaky, Abdelhak Sahibeddine
Abstract:
A study was carried out among students who have especially a scientific and technical educational background and who had opportunities to benefit from a program entrepreneurship course of 50 hours; at Higher School of Technology Khenifra, Morocco. This article has as a goal to explain the relationship between entrepreneurial education, entrepreneurial passion and entrepreneurial intention. The authors chose Bandura’s theory of social cognition as a theoretical framework. The modeling methods equation is adopted to analyze the hypotheses by SMART PLS for 188 students. The results show a strong positive relationship between entrepreneurial education and entrepreneurial passion. They also reveal that entrepreneurship education affects entrepreneurial intention through the effect of entrepreneurial passion, particularly among women than men. In addition, this study contributes in a theoretical way to the level of the relationship between entrepreneurial education and entrepreneurial passion, and these results provide educators and public decision-makers with advice on the importance of entrepreneurship training based on emotional traits such as passion; which constitutes a key and essential element to encourage young graduates to choose an entrepreneurial career as an alternative option or to develop entrepreneurial passion among the business leaders of tomorrow.Keywords: entrepreneurship education, entrepreneurial passion, entrepreneurial intention, equation modeling methods
Procedia PDF Downloads 1928915 Evaluating the Effectiveness of Methods That Increase the Knowledge of Youths about the Sexually Transmitted Diseases
Authors: Gonul Kurt, Semra Aciksoz
Abstract:
All types of interventions that increase the knowledge and awareness of youths about Sexually Transmitted Diseases (STD) are considered to be important for safe sex life and sexual health. The aim of this study was to determine the knowledge levels of nursing students about STD and evaluate the effectiveness of peer education and brochure methods to increase the knowledge and awareness about STD. This interventional study was carried out by participation of nursing students attending the first and second grade in a school of nursing on February–May 2015. The study participants were 200 undergraduate nursing student volunteers. The students were given education by peer trainers and brochure methods. First-grade students were divided into five groups with block randomization method and each group were given education by five peer trainers. Second-grade students were given education with brochure by the researchers. The knowledge level of study groups was evaluated before and after educational intervention. The data were collected using the “Data Collection Form” and “Sexually Transmitted Diseases Information Form”. The questionnaire forms developed by the researchers after the literature review. The SPSS 15.0 package software was used for the evaluation of the data obtained from the study. Data were analyzed by Mann-Whitney-U-Test, Wilcoxon Signed Ranks Test and Mc Nemar Test. A p value of <0.05 was regarded as statistically significant. All of participants in the study were female nursing students. The mean age of students was 18.99±0.32 years old in the peer education group and 20.04±0.37 in the brochure education group. There was no statistically significant difference between knowledge levels of the students in both groups before the education (p>0.05). It was determined that an increase in knowledge levels of the students in both groups after the education. This increase was statistically significant (p<0.05). It was determined that knowledge level of the students about STD in brochure group was higher than the peer education group (p<0.001). The results of this study indicate that brochure education method was more effective than the peer education method in both increasing knowledge and awareness about STD.Keywords: education method, knowledge, nursing students, sexually transmitted diseases
Procedia PDF Downloads 2958914 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud
Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal
Abstract:
Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid
Procedia PDF Downloads 3178913 AMBICOM: An Ambient Computing Middleware Architecture for Heterogeneous Environments
Authors: Ekrem Aksoy, Nihat Adar, Selçuk Canbek
Abstract:
Ambient Computing or Ambient Intelligence (AmI) is emerging area in computer science aiming to create intelligently connected environments and Internet of Things. In this paper, we propose communication middleware architecture for AmI. This middleware architecture addresses problems of communication, networking, and abstraction of applications, although there are other aspects (e.g. HCI and Security) within general AmI framework. Within this middleware architecture, any application developer might address HCI and Security issues with extensibility features of this platform.Keywords: AmI, ambient computing, middleware, distributed-systems, software-defined networking
Procedia PDF Downloads 2838912 Centering Critical Sociology for Social Justice and Inclusive Education
Authors: Al Karim Datoo
Abstract:
Abstract— The presentation argues for an urgent case to center and integrate critical sociology in enriching potency of educational thought and practice to counteract inequalities and social injustices. COVID phenomenon has starkly exposed burgeoning of social-economic inequalities and widening marginalities which have been historically and politically constructed through deep-seated social and power imbalances and injustices in the world. What potent role could education possibly play to combat these issues? A point of departure for this paper highlights increasing reductionist and exclusionary ‘mind-set’ of education that has been developed through trends in education such as: the commodification of knowledge, standardisation, homogenization, and reification which are products of the positivist ideology of knowledge coopted to serve capitalist interests. To redress these issues of de-contextualization and de-humanization of education, it is emphasized that there is an urgent need to center the role of interpretive and critical epistemologies and pedagogies of social sciences. In this regard, notions of problem-posing versus problem-solving, generative themes, instrumental versus emancipatory reasoning will be discussed. The presentation will conclude by illustrating the pedagogic utility of these critically oriented notions to counteract the social reproduction of exclusionary and inequality in and through education.Keywords: Critical pedagogy, social justice, inclusion , education
Procedia PDF Downloads 1128911 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps
Authors: Mohamed Sarrab, Hadj Bourdoucen
Abstract:
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.Keywords: mobile application, run-time verification, usable security, direct information flow
Procedia PDF Downloads 3798910 Harnessing the Opportunities of E-Learning and Education in Promoting Literacy in Nigeria
Authors: Victor Oluwaseyi Olowonisi
Abstract:
The paper aimed at presenting an overview on the concept of e-learning as it relates to higher education and how it provides opportunities for students, instructors and the government in developing the educational sector. It also touched on the benefits and challenges attached to e-learning as a new medium of reaching more students especially in the Nigerian context. The opportunities attributed to e-learning in the paper includes breaking boundaries barriers, reaching a larger number of students, provision of jobs for ICT experts, etc. In contrary, poor power supply, cost of implementation, poor computer literacy, technophobia (fear of technology), computer crime and system failure were some of the challenges of e-learning discussed in the paper. The paper proffered that the government can help the people gain more from e-learning through its financing. Also, it was stated that instructors/lecturers and students need to undergo training on computer application in order for e-learning to be more effective in developing higher education in Nigeria.Keywords: e-learning, education, higher education, increasing literacy
Procedia PDF Downloads 2678909 Exploring Content of Home-Based Care Education After Caesarean Section Provided by Nurse Midwives in Maternity Units
Authors: Mdoe Mwajuma Bakari, Mselle Lilian Teddy, Kibusi Stephen Mathew
Abstract:
Background: Due to the increase of caesarean section (CS), many women are discharge early to their home. Women should be aware on how to take care of themselves at home after CS. Evidence shows non-uniform health education on home care after CS are provided to post CS mothers because of lack of standard home care guideline on home after CS; as existing guidelines explore only care of women in hospital setting, for health care workers. There is a need to develop post CS home care guide; exploring contents of home based care education after CS provided by nurse midwives will inform the development of the guide. Objective: To explore the content of health education provided by nurse midwives to post CS mother about home care after hospital discharge in Dodoma, Tanzania. Methodology: An exploratory qualitative study using in-depth interview was conducted in this study using triangulation of data collection method; where 14 nurse midwives working in maternity unit and 11 post CS mother attending their post-natal clinic were recruited. Content analysis was used to generate themes that describe health education information provided by nurse midwives to post CS mother about home care after hospital discharge. Results: The study found that, nutrition health education, maternal and newborn hygiene care of caesarean wound at home were the component of health education provided to post CS mothers by nurse midwives. Contradicting instruction were found to be provided to post CS mothers. Conclusion: This study reported non-uniform health education provided by the nurse midwives on home care after CS. Despite of the fact that nurse midwives recognizes the need to provide health education to the post CS mothers, there is a need to develop home care guideline as a reference for their education to ensure uniform package of education is provided to post CS mothers in order to improve recovery of post CS mothers from CS.Keywords: caesarean section, home care, discharge education, homecare after caesarean section
Procedia PDF Downloads 978908 Inclusive Education for Deaf and Hard-of-Hearing Students in China: Ideas, Practices, and Challenges
Authors: Xuan Zheng
Abstract:
China is home to one of the world’s largest Deaf and Hard of Hearing (DHH) populations. In the 1980s, the concept of inclusive education was introduced, giving rise to a unique “learning in regular class (随班就读)” model tailored to local contexts. China’s inclusive education for DHH students is diversifying with innovative models like special education classes at regular schools, regular classes at regular schools, resource classrooms, satellite classes, and bilingual-bimodal projects. The scope extends to preschool and higher education programs. However, the inclusive development of DHH students faces challenges. The prevailing pathological viewpoint on disabilities persists, emphasizing the necessity for favorable auditory and speech rehabilitation outcomes before DHH students can integrate into regular classes. In addition, inadequate support systems in inclusive schools result in poor academic performance and increased psychological disorders among the group, prompting a notable return to special education schools. Looking ahead, China’s inclusive education for DHH students needs a substantial shift from “learning in regular class” to “sharing equal regular education.” Particular attention should be devoted to the effective integration of DHH students who employ sign language into mainstream educational settings. It is crucial to strengthen regulatory frameworks and institutional safeguards, advance the professional development of educators specializing in inclusive education for DHH students, and consistently enhance resources tailored to this demographic. Furthermore, the establishment of a robust, multidimensional, and collaborative support network, engaging both families and educational institutions, is also a pivotal facet.Keywords: deaf, hard of hearing, inclusive education, China
Procedia PDF Downloads 52