Search results for: cyber security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5326

Search results for: cyber security awareness

4336 Customer Adoption and Attitudes in Mobile Banking in Sri Lanka

Authors: Prasansha Kumari

Abstract:

This paper intends to identify and analyze customer adoption and attitudes towards mobile banking facilities. The study uses six perceived characteristics of innovation that can be used to form a favorable or unfavorable attitude toward an innovation, namely: Relative advantage, compatibility, complexity, trailability, risk, and observability. Collected data were analyzed using Pearson Chi-Square test. The results showed that mobile bank users were predominantly males. There is a growing trend among young, educated customers towards converting to mobile banking in Sri Lanka. The research outcomes suggested that all the six factors are statistically highly significant in influencing mobile banking adoption and attitude formation towards mobile banking in Sri Lanka. The major reasons for adopting mobile banking services are the accessibility and availability of services regardless of time and place. Over the 75 percent of the respondents mentioned that savings in time and effort and low financial costs of conducting mobile banking were advantageous. Issue of security was found to be the most important factor that motivated consumer adoption and attitude formation towards mobile banking. Main barriers to mobile banking were the lack of technological skills, the traditional cash‐carry banking culture, and the lack of awareness and insufficient guidance to using mobile banking.

Keywords: compatibility, complexity, mobile banking, observability, risk

Procedia PDF Downloads 185
4335 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 222
4334 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 191
4333 Mental Health Awareness and Help Seeking Among Adolescents in Kerala

Authors: Fathima M. A., Milu Maria Anto

Abstract:

Aim: The current study aims to explore the understanding about Mental Health and the likelihood to seek help for mental health problems among adolescents in the state of Kerala (India). Method: A cross sectional exploratory design was used. Samples were selected using convenience sampling. Ninety nine high school and higher secondary school students who had enrolled in the program “Responsible Adolescents (READ)” organized by MKMS Education from Kerala participated in this study. The data for the present study was collected using google forms prior to the commencement of the READ programme. Open-ended questions were used to explore the understanding of participants about mental health, mental health problems, causes of mental health problems and the role of mental health professionals. The likelihood to seek help (from friends, parents, teachers and mental health professionals) for mental health problems was assessed using a visual analogue scale. Further open-ended questions were used to identify what changes in teachers and parents will make them feel more comfortable to approach them when they need help. Content analysis was used to identify themes and coded data was further analyzed using correlation. Results: The results show that students have a fair idea about what Mental Health is. Even though the majority is familiar with the names of mental health disorders, relatively fewer students identify it as irregularity in mental functions such as thoughts, emotions and behaviors. The students tend to attribute symptoms of mental health problems as the cause of mental health problems. Very few students have the understanding that biological variations and adverse childhood experiences are primary causes for the development of mental health problems. Less than half of the students were aware of the role of psychiatrists and psychologists in mental health treatment. The students were more likely to seek help from parents and friends during distress. They had a medium inclination to seek help from mental health professionals and showed even lower likelihood to seek help from teachers. The majority of the students responded that they would be more comfortable approaching teachers if they were more open-minded and approachable as well as non-judgmental and non-dismissive. Conclusion: Findings show that there is inadequate awareness among adolescents about mental health problems and their causes. There is a lack of understanding about the roles of two main mental health professionals which can pose a big hurdle in accessing adequate help from the appropriate professional at the right time. The low likelihood to seek help from teachers for mental health problems is very concerning. The major barriers reported by the students in seeking help from teachers were the judgmental and dismissive approach. The findings throw light on the current level of awareness about mental health and mental health help-seeking, which can be utilized in framing mental health awareness programs for students as well as teachers.

Keywords: Mental Health Awareness, Adolescent Mental Health, Help Seeking Behavior, School Mental Health

Procedia PDF Downloads 246
4332 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 504
4331 Awareness and Willingness of Signing 'Consent Form in Palliative Care' in Elderly Patients with End Stage Renal Disease

Authors: Hsueh Ping Peng

Abstract:

End-stage renal disease most commonly occurs in the elderly population. Elderly people are approaching the end of their lives, and when facing major life-threatening situations, apart from aggressive medical treatment, they can also choose treatment methods such as hospice care to improve their quality of life. The purpose of this study was to investigate factors associated with the awareness and willingness to sign hospice and palliative care consent forms in elderly with end-stage renal disease. This study used both quantitative, cross-sectional study designs. In the quantitative section, 110 elderly patients (aged 65 or above) with end-stage renal disease receiving conventional hemodialysis were recruited as study participants from a medical center in Taipei City. Data were collected using structured questionnaires. Study tools included basic demographic data, questionnaires on the awareness and perception of hospice and palliative care, etc. After collecting the data, data analysis was conducted using SPSS 20.0 statistical software, including descriptive statistics, chi-square test, logistic regression, and other inferential statistics. The results showed that the average age of participants was 71.6 years old, more males than females, average years of dialysis was 6.1 years and most subjects rated their self-perceived health status as fair. Results of the study are summarized as follows: Elderly people with end-stage renal disease did not have sufficient knowledge and awareness about hospice and palliative care. Influencing factors included level of education, marital status, years of dialysis and age, etc. Demographic factors influencing the signing of consent forms included gender, marital status, and age, which all showed significant impacts. Factors taken into consideration when signing consent forms included awareness of hospice care, understanding the relevant definitions of hospice care, and understanding that consent may be modified or cancelled at any time; it was predicted that people who knew more about ways to receive hospice care or more related definitions were more willing to sign the consent forms. In the qualitative study section, 10 participants who signed the consent form, five male, and 5 female, between the ages of 65-90, have completed the semi-structured interviews. Analysis of the interviews revealed six themes: (1) passing away peacefully, (2) autonomy on arrangements of life and death, (3) unwillingness to increase family and social burden, (4) friends and relatives’ experience influencing the decision to give consent, (5) sharing information to facilitate the giving of consent, (6) facing each day with ease, to reflect the experience and factors of consideration for elderly with end-stage renal disease when signing consent forms. The results of this study provides the awareness, thoughts and feelings of elderly with end-stage renal disease on signing consent forms, and serve as a future reference for the dialysis unit to enhance the promotion of hospice and palliative care and related caregiving measures, thereby improving the quality of life and care for elderly people with end-stage renal disease.

Keywords: end-stage renal disease, hemodialysis, hospice and palliative care, awareness, willingness

Procedia PDF Downloads 151
4330 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 71
4329 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks

Authors: Sulemana Ibrahim

Abstract:

Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.

Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks

Procedia PDF Downloads 45
4328 Gender issues in Law and society in India

Authors: Sunil Gaikwad

Abstract:

Gender discrimination is a very prevalent and much used word in the legal parlance. , The more socially, culturally, economically and educationally backward the community, the more gender discrimination is seen there. Gender discrimination is a worldwide Phenomena. In India it was more prevalent, due to illiteracy, bad social and religious customs. in Indian family system male child is considered as inheritor of the family clan, support for parents in their old age and girls as the property of others and unnecessary load on parents and on property as the dowry has to be give at her marriage as also some festivals like Raksha Bandhan and Bhau Teej during Deepawali (wherein having brother is compulsory)insist on having a male child in the family, hence most couples try to give birth only to male child at the cost of female child, hence the female feticide was going on a large scale due to which, sex ratio had considerably decreased creating problem for geeting groom for bride groom thereby putting question mark on family system. To redo the damage done to the society due to the female feticide Government of India has enacted various Laws and introduced various welfare schemes for the upliftment of girl child and also launched countrywide awareness campaign to create awareness among people about the importance of girl child and punitive laws for infanticide which is now bearing fruits but still cases of female feticide are coming fore. There is an urgent need to go to the roots of the problem and to find practicable and effective legal and social measures to overcome this issue, and the purpose of this research paper is the same. The research paper discusses in detail the reasons and superstitions that are responsible for the gender discriminations and comes out with effective measures including necessary and effective changes in the existing Laws, effective awareness campaign against religious superstitions for gender equality. For this research paper doctrinal research methodology is used to drive the research to its logical conclusion, for which various primary and secondary sources literature has been perused and studied. It is worth noting that while working on the paper suggestions and recommendations and conclusions have been drawn where it is suggested and concluded that there is an urgent need to re think about the festivals which encourages gender discriminations, to sensitize and create ample of awareness among people by effectively utilizing Radio, Television, Social Media folk arts, public shows and to make existing laws more effective and strict implementation for the purpose and zero tolerance for female feticide.

Keywords: awareness, effective laws, female foeticide, festivals, superstitions

Procedia PDF Downloads 71
4327 ‘Saying’ the Nuclear Power in France: Evolution of the Images and Perceptions of a Sensitive Theme

Authors: Jandot Aurélia

Abstract:

As the nuclear power is a sensitive field leading to controversy, the quality of the communication about it is important. Between 1965 and 1981, in France, this one had gradually changed. This change is studied here in the main French news magazine L’Express, in connection with several parameters. As this represents a huge number of copies and occurrences, thus a considerable amount of information; this paper is focused on the main articles as well as the main “mental images”. These ones are important, as their aim is to direct the thought of the readers, and as they have led the public awareness to evolve. Over this 17 years, two trends are in confrontation: The first one is promoting the perception of the nuclear power, while the second one is discrediting it. These trends are organized in two axes: the evolution of engineering, and the risks. In both cases, the changes in the language allow discerning the deepest intentions of the magazine editing, over a period when the nuclear technology, to there a laboratory object accompanied with mystery and secret, has become a social issue seemingly open to all.

Keywords: French news magazine, mental images, nuclear power, public awareness

Procedia PDF Downloads 292
4326 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 115
4325 Informal Governance as Response to Institutional Paralysis

Authors: Stefanie Kasparek

Abstract:

The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.

Keywords: agenda-setting, decision-making, international governance, UNSC

Procedia PDF Downloads 178
4324 Consideration of Whether Participation in the International '16 Days of Activism against Gender Based Violence' Campaign Is an Effective Teaching Tool for Raising Awareness and Understanding of Gender Based Violence

Authors: Kayliegh Richardson, Ana Speed

Abstract:

The international campaign, '16 Days of Activism against Gender Based Violence', seeks to raise awareness and understanding of gender based violence in a variety of settings. The campaign requires its participants to join in for advancing the right to education and challenging violence, discrimination, and inequality and take into account intersections such as gender, race, ethnicity, religion, sexual orientation, socio-economic status and other social identifiers. The authors of this paper are both clinic supervisors at Northumbria University in Newcastle Upon Tyne, England. As part of their research project, the authors are going to ask final year students on the MLaw degree at Northumbria University to become involved in the campaign by participating in a variety of awareness-raising activities during the course of the 16 days, which runs from 27 November 2017 until 10 December 2017. As part of the campaign, the authors will be running the following activities for students to participate in 1. Documentary showing of Banaz, a love story followed by discussion group. 2. 16 blogs for 16 days. Students will contribute to our family law blog over the 16 days, with articles about gender based violence. 3. Guest lecture on domestic violence (potentially run by a domestic violence organisation) 4. Workshop by Professor Ruth Lewis who will be presenting her innovative research in gender based violence and online abuse. 5. Poster competition - the students are asked to submit a poster about the different forms of gender based violence or proposals for ending violence against women and girls. The research aims are to identify whether participation in the project: 1. increases the students' engagement with issues of gender justice 2. is an effective educational tool for raising the students' awareness and understanding of gender based violence in its many forms. 3. increases the students' understanding of the domestic and international framework for protecting victims (in particular women and children) of gender based violence. After the activities, an impartial, experienced researcher will be holding a focus group with volunteering students to discuss their experiences of participating in the activities and whether they felt that participation in the project achieved the aims set out above. This paper will discuss the activities undertaken by the students and will address the data gathered during the focus group. Finally, the authors will discuss their thoughts on whether awareness of gender-based violence and other international family law issues can be appropriately raised in an educational setting.

Keywords: gender based violence, clinical legal education, international family law, domestic abuse

Procedia PDF Downloads 325
4323 Social Awareness and Praxical Knowledge

Authors: F. Saptouw, L. Reddy

Abstract:

Tertiary institutions are often faced with a challenge when incorporating social awareness into course content. The information campaigns in the media often alienate the viewers and the knowledge is not readily assimilated into the students’ consciousness. This paper will present a discussion of the results of collaborative teaching projects run by the Michaelis School of fine art and the HIV/AIDS, Inclusivity and Change Unit (HAICU) at the University of Cape Town. In these projects the artistic process is employed to generate ‘praxical knowledge’ in the student body about socially relevant issues like HIV-AIDS, Gender-Based Violence (GBV) and sexual identity, specifically LGBTQI. The combination of lectures, group discussions and the creative process has been a very successful way to disseminate information amongst the student population. Evidence of the project’s success will be provided by referencing interviews, focus groups as well as surveys done with the participants. This paper will conclude by arguing for the positive role of practice-led research in developing a socially conscious public.

Keywords: art, education, HIV-AIDS, practice-led research

Procedia PDF Downloads 305
4322 Environmental Awareness on Formal Education Level: A Program Approach through Physical Education Course

Authors: Jocelyn Floresca

Abstract:

This paper aimed to present the by-product of the introduction of environmental ecology awareness on a formal education level utilizing the program course of Physical Education, particularly in the tertiary level. It is based on the premise that the radical need for environmental protection may not only necessarily be the work of people in the pure sciences but also deemed necessary to look into more avenues of the school setting particularly in the field of Physical Education. In the Philippines, most schools’ Physical Education focuses on the advancement of sports, fitness and wellness which are mostly done in the confines of a closed building. The paper dwells into the introduction of Physical Education as an outdoor recreation activity where in the participants of the study had the opportunity to indulge in activities undertaken outside the confines of buildings and going into large areas of the environment. It looked into the individual participant’s environmental social behaviour and effects on the participant’s perceptions in terms of the set objectives of Physical Education before and after the study’s intervention. The study utilized the formal course in Physical Education on nature walks, mountaineering and bird watching as interventions to gain perceptions and understanding. The introduction of the environmental ecology activities as a formal Physical Education course has resulted in deeper awareness that led to understanding the need to protect the environment, appreciation of the value of natural areas and acquiring behaviour for a sustainable use of the environment during the practice of Physical Education. Also, prior to the introduction of environmental ecology in Physical Education as a formal study; participants have no knowledge of what dwells in the identified sites of intervention. Whereas after the study, participants were able to identify various species of birds and plants found in the sites of the study that may lead to further conservation of the particular species.

Keywords: appreciation, conservation, environmental ecology, outdoor

Procedia PDF Downloads 274
4321 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 126
4320 Shocking Shortage: The Electrical Trade Crisis in the Eastern Cape, South Africa

Authors: Amore Gerber, Gerrit Crafford

Abstract:

This research paper explores the root causes of the shortage of professional electricians in the Eastern Cape, South Africa. The primary objectives are to identify the underlying reasons contributing to this deficit, analyze the consequences of the shortage, and propose practical solutions to address this critical issue. The research employed an interpretivist paradigm and an inductive approach. Qualitative data was gathered through semi-structured interviews with professional electricians working in the Eastern Cape. Thematic analysis was used to identify common themes and comprehensively understand the issue. The analysis revealed that the shortage of electricians can be attributed primarily to training challenges and a lack of awareness within the industry. This shortage has significant repercussions, as it has led to the proliferation of unqualified electricians, exacerbating the problem. The study identified two key solutions to address this issue: promoting education and trade programs and transforming electrical instruction and education. The research was conducted in the Eastern Cape and reflects the viewpoints of professional electricians. Results may differ in other locations or where the effects are investigated from a client’s perspective. The research uncovers the root causes of the electrician shortage and offers valuable insights for devising effective solutions to address these challenges. This paper adds a significant dimension to the current literature gap. The study's findings underscore deficiencies in awareness and training as fundamental factors driving the shortage of electricians, emphasizing the urgent need to address these issues to bridge the gap.

Keywords: electrician shortage, skill gap, training, awareness

Procedia PDF Downloads 44
4319 Mobile Cloud Computing: How to Improve

Authors: Abdullah Aljumah, Tariq Ahamad

Abstract:

The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.

Keywords: Cloud Computing, MCC, SAAS, computer interaction

Procedia PDF Downloads 355
4318 Knowledge Level of Mothers in Wet Nursery and Breast Milk Banking

Authors: Seyda Can, Meryem Unulu

Abstract:

Objective: Breast milk is the most fundamental nutritional element for the healthy growth and development of newborns as they supply all the necessary components. Various obstacles such as diseases of mother and child, allergies of the baby, and insufficient breastmilk affect breast-feeding adversely. The wet nursery or breast milk banking is the most important source in providing the nutrients closest to the ideal for the newborn. Despite increasing opinions about its benefits, breast milk banking practice is controversial because of reasons such as ethical problems, traditional beliefs and attitudes, security concerns of families and lack of knowledge. It is thought that the results of this study will create the data for studies to raise the awareness of the society regarding wet nursery, and milk banks. Method: The study was planned and performed in descriptive type. The population of the study consists of mothers that gave birth between October-November 2017 in a public hospital in Turkey, and the sample consisted of 205 mothers chosen by improbable sampling method from the population and accepted to participate in the study. While gathering data, a survey consisting of 33 questions designed to determine the socio-demographic characteristics and their views on wet nursery and breast milk banking. Written ethical committee and institution permit was taken. Before the interview, participants were informed about the purpose and content of the study and oral permit was taken. Result: When the distribution of 205 mothers according to their individual characteristics, it was detected that their age average was 28,16±5,23 and 63,4 of mothers (n=130) had normal delivery. It was determined that clear majority of mothers, 75,6% (n=155) had no breast-feeding problems and 75,1% (n=154) fed the baby only with breast milk. It was detected that 18,5% (n=38) would accept a stranger to be a wet nurse and 60% (n=123) would donate milk if there is a breast milk bank. It was detected 33,2 % (n=68) of participant mothers want to make use of breast milk bank if there is a situation that prevents breast feeding, 38,5 % (n=79) of mothers think breast milk bank would be problematic religiously. Statistical difference was detected between the educational status of women and the rate of wanting breast milk bank practice. As the educational status of mothers increased, their rate of wanting breast milk bank practice increased. Conclusion: It is essential that every baby is breastfed by its mother primarily. However, when this is not possible, in order to implement wet nursery and breast milk banking as an extension of national breast-feeding policy, regulations need to be made and worries should be eased. Also, organizing training programs are also really important to raise awareness of the society and mothers.

Keywords: breast feeding, breast milk, milk banks, wet nursery

Procedia PDF Downloads 147
4317 Climate Change and Food Security in Nigeria: The World Bank Assisted Third National Fadama Development Programme (Nfdp Iii) Approach in Rivers State, Niger Delta, Nigeria

Authors: Temple Probyne Abali

Abstract:

Port Harcourt, Rivers State in the Niger Delta region of Nigeria is bedeviled by the phenomenon of climatechange, posing threat to food security and livelihood. This study examined a 4 decadel (1980-2020) trend of climate change as well as its socio-economic impact on food security in the region. Furthermore, to achieve sustainable food security and livelihood amidst the phenomenon, the study adopted the World Bank Assisted Third National Fadama Development Programme approach. The data source for climate change involved secondary data from Nigeria Meteorological Agency (NIMET). Consequently, the results for climate change over the 4decade period were displayed in tables, charts and maps for the expected changes. Data sources on socio-economic impact of food security and livelihood were acquired through questionnairedesign. A purposive random sampling technique was used in selecting 5 coastal communities inthe region known for viable economic potentials for agricultural development and the resultswere analyzed using Analysis of Variance (ANOVA). The Participatory Rural Appraisal (PRA) technique of the World Bank for needs assessment wasadopted in selecting 5 agricultural sub-project proposals/activities based on groups’ commoneconomic interest from a total of 1,000 farmers each drawn from the 5 communities of differentage groups including men, women, youths and the vulnerable. Based on the farmers’ sub-projectinterests, the various groups’ Strength, Weakness, Opportunities and Threats (SWOT), Problem Listing Matrix, Skill Gap Analysis as well as EIAson their sub-project proposals/activities were analyzed with substantialMonitoring and Evaluation (M & E), using the Specific, Measurable, Attribute, Reliable and Time bound (SMART)approach. Based on the findings from the PRA technique, the farmers recorded considerableincreaseinincomeofover200%withinthe5yearprojectplan(2008-2013).Thestudyrecommends capacity building and advisory services on this PRA innovation. By so doing, there would be a sustainable increase in agricultural production and assured food security in an environmental friendly manner, in line with the United Nation’s Sustainable Development Goals(SDGs).

Keywords: climate change, food security, fadama, world bank, agriculture, sdgs

Procedia PDF Downloads 79
4316 A Fast, Reliable Technique for Face Recognition Based on Hidden Markov Model

Authors: Sameh Abaza, Mohamed Ibrahim, Tarek Mahmoud

Abstract:

Due to the development in the digital image processing, its wide use in many applications such as medical, security, and others, the need for more accurate techniques that are reliable, fast and robust is vehemently demanded. In the field of security, in particular, speed is of the essence. In this paper, a pattern recognition technique that is based on the use of Hidden Markov Model (HMM), K-means and the Sobel operator method is developed. The proposed technique is proved to be fast with respect to some other techniques that are investigated for comparison. Moreover, it shows its capability of recognizing the normal face (center part) as well as face boundary.

Keywords: HMM, K-Means, Sobel, accuracy, face recognition

Procedia PDF Downloads 312
4315 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union

Authors: María Elena Menéndez Ibáñez

Abstract:

After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.

Keywords: border control, immigration, international cooperation, national security

Procedia PDF Downloads 121
4314 Privacy Policy Prediction for Uploaded Image on Content Sharing Sites

Authors: Pallavi Mane, Nikita Mankar, Shraddha Mazire, Rasika Pashankar

Abstract:

Content sharing sites are very useful in sharing information and images. However, with the increasing demand of content sharing sites privacy and security concern have also increased. There is need to develop a tool for controlling user access to their shared content. Therefore, we are developing an Adaptive Privacy Policy Prediction (A3P) system which is helpful for users to create privacy settings for their images. We propose the two-level framework which assigns the best available privacy policy for the users images according to users available histories on the site.

Keywords: online information services, prediction, security and protection, web based services

Procedia PDF Downloads 339
4313 Nurses Care Practices at End of Life in Intensive Care Units in the Kingdom of Bahrain

Authors: M. Yaqoob, C. S. O’Neill, S. Faraj, C. L. O’Neill

Abstract:

This paper presents the preliminary findings from a study exploring nurse’s contributions to end of life decisions and to the care of dying patients in ICU units in the Kingdom of Bahrain. The process of dying is complex as medical clinicians are frequently unable to say with certainty when death will occur. It is generally accepted that end of life care begins when it is possible to know that death is imminent. Nurses do not make medical treatment decisions when caring for a dying patient. There are, however, many other types of decisions made when a patient is approaching the end of life and nurses are either formally or informally part of these decision making processes. This study explored nurses care practices at the end of life, in two ICU units in large hospitals in the Kingdom of Bahrain. The research design was a grounded theory approach. Ten nurses participated, six of whom were Bahraini nationals and four were Indian. A core category death avoidance talk was supported by three major subcategories, degrees of involvement in decision making; signalling and creating an awareness of death; care shifting from dying patients to family. Despite nurses asserting that they carried out the orders of doctors and had no role in decision making processes at end of life this study showed that there were degrees of nurse involvement. Doctors frequently discussed the patient’s clinical condition with nurses and also sought information regarding the family. Information about the family was of particular relevance if the doctor was considering a DNR order, which the nurses equated with dying. Families were not always informed when a DNR decision was made. When families were not informed the nurses engaged in sophisticated rituals signalling and creating awareness to family members that the death of their loved one was near. This process also involved a subtle shifting of care from the dying patient to the family. This seminar paper will focus particularly on how nurses signal and create an awareness of death in an ICU setting. The findings suggest that despite the avoidance of death talk in the ICU nurses indirectly convey and create an awareness that death is near to family members.

Keywords: decision making, dying patients, end of life, intensive care unit

Procedia PDF Downloads 370
4312 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security

Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna

Abstract:

Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.

Keywords: cipher text, cryptography, plaintext, raaga

Procedia PDF Downloads 272
4311 Novel Fluorescent High Density Polyethylene Composites for Fused Deposition Modeling 3D Printing in Packaging Security Features

Authors: Youssef R. Hassan, Mohamed S. Hasanin, Reda M. Abdelhameed

Abstract:

Recently, innovations in packaging security features become more important to see the originality of packaging in industrial application. Luminescent 3d printing materials have been a promising property which can provides a unique opportunity for the design and application of 3D printing. Lack emission of terbium ions, as a source of green emission, in salt form prevent its uses in industrial applications, so searching about stable and highly emitter material become essential. Nowadays, metal organic frameworks (MOFs) play an important role in designing light emitter material. In this work, fluorescent high density polyethylene (FHDPE) composite filament with Tb-benzene 1,3,5-tricarboxylate (Tb-BTC) MOFs for 3D printing have been successfully developed.HDPE pellets were mixed with Tb-BTC and melting extrustion with single screw extruders. It was found that Tb-BTCuniformly dispersed in the HDPE matrix and significantly increased the crystallinity of PE, which not only maintained the good thermal property but also improved the mechanical properties of Tb-BTC@HDPE composites. Notably, the composite filaments emitted ultra-bright green light under UV lamp, and the fluorescence intensity increased as the content of Tb-BTC increased. Finally, several brightly luminescent exquisite articles could be manufactured by fused deposition modeling (FDM) 3D printer with these new fluorescent filaments. In this context, the development of novel fluorescent Tb-BTC@HDPE composites was combined with 3D printing technology to amplified the packaging Security Features.

Keywords: 3D printing, fluorescent, packaging, security

Procedia PDF Downloads 82
4310 Framework for Explicit Social Justice Nursing Education and Practice: A Constructivist Grounded Theory Research

Authors: Victor Abu

Abstract:

Background: Social justice ideals are considered as the foundation of nursing practice. These ideals are not always clearly integrated into nursing professional standards or curricula. This hinders concerted global nursing agendas for becoming aware of social injustice or engaging in action for social justice to improve the health of individuals and groups. Aim and objectives: The aim was to create an educational framework for empowering nursing students for social justice awareness and action. This purpose was attained by understanding the meaning of social justice, the effect of social injustice, the visibility of social justice learning, and ways of integrating social justice in nursing education and practice. Methods: Critical interpretive methodologies and constructivist grounded theory research designs guided the processes of recruiting nursing students (n = 11) and nurse educators (n = 11) at a London nursing university to participate in interviews and focus groups, which were analysed by coding systems. Findings: Firstly, social justice was described as ethical practices that enable individuals and groups to have good access to health resources. Secondly, social injustice was understood as unfair practices that caused minimal access to resources, social deprivation, and poor health. Thirdly, social justice learning was considered to be invisible in nursing education due to a lack of explicit modules, educator knowledge, and organisational support. Lastly, explicit modules, educating educators, and attracting leaders’ support were suggested as approaches for the visible integration of social justice in nursing education and practice. Discussion: This research proposes approaches for nursing awareness and action for the development of critical active nurse-learner, critical conscious nurse-educator, and servant nurse leader. The framework on Awareness for Social Justice Action (ASJA) created in this research is an approach for empowering nursing students for social justice practices. Conclusion: This research contributes to and advocates for greater nursing scholarship to raise the spotlight on social justice in the profession.

Keywords: social justice, nursing practice, nursing education, nursing curriculum, social justice awareness, social justice action, constructivist grounded theory

Procedia PDF Downloads 31
4309 Exploration of Competitive Athletes’ Superstition in Taiwan: "Miracle" and "Coincidence"

Authors: Shieh Shiow-fang

Abstract:

Superstitious thoughts or actions often occur during athletic competitions. Often "superstitious rituals" have a positive impact on the performance of competitive athletes. Athletes affirm the many psychological benefits of religious beliefs mostly in a positive way. Method: By snowball sampling, we recruited 10 experienced competitive athletes as participants. We used in-person and online one-to-one in-depth interview to collect their experiences about sport superstition. The total interview time was 795 minutes. We analyzed the raw data with the grounded theory processes suggested by Strauss and Corbin (1990). Results: The factors affecting athlete performance are ritual beliefs, taboo awareness, learning norms, and spontaneous attribution behaviors. Conclusion: We concluded that sports superstition reflects several psychological implications. The analysis results of this paper can provide another research perspective for the future study of sports superstition behavior.

Keywords: superstition, taboo awareness, learning norms, competitive athlete

Procedia PDF Downloads 63
4308 “Friction Surfaces” of Airport Emergency Plan

Authors: Jakub Kraus, Vladimír Plos, Peter Vittek

Abstract:

This article focuses on the issue of airport emergency plans, which are documents describing reactions to events with impact on aviation safety or aviation security. The article specifically focuses on the use and creation of emergency plans, where could be found a number of disagreements between different stakeholders, for which the airport emergency plan applies. Those are the friction surfaces of interfaces, which is necessary to identify and ensure them smooth process to avoid dangerous situations or delay.

Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system, friction surfaces of airport emergency plan, interfaces of processes

Procedia PDF Downloads 501
4307 Energy Consumption, Emission Absorption and Carbon Emission Reduction on Semarang State University Campus

Authors: Dewi Liesnoor Setyowati, Puji Hardati, Tri Marhaeni Puji Astuti, Muhammad Amin

Abstract:

Universitas Negeri Semarang (UNNES) is a university with a vision of conservation. The impact of the UNNES conservation is the existence of a positive response from the community for the effort of greening the campus and the planting of conservation value in the academic community. But in reality,  energy consumption in UNNES campus tends to increase. The objectives of the study were to analyze the energy consumption in the campus area, to analyze the absorption of emissions by trees and the awareness of UNNES citizens in reducing emissions. Research focuses on energy consumption, carbon emissions, and awareness of citizens in reducing emissions. Research subjects in this study are UNNES citizens (lecturers, students and employees). The research area covers 6 faculties and one administrative center building. Data collection is done by observation, interview and documentation. The research used a quantitative descriptive method to analyze the data. The number of trees in UNNES is 10,264. Total emission on campus UNNES is 7.862.281.56 kg/year, the tree absorption is 6,289,250.38 kg/year. In UNNES campus area there are still 1,575,031.18 kg/year of emissions, not yet absorbed by trees. There are only two areas of the faculty whose trees are capable of absorbing emissions. The awareness of UNNES citizens in reducing energy consumption is seen in change the habit of: using energy-saving equipment (65%); reduce energy consumption per unit (68%); do energy literacy for UNNES citizens (74%). UNNES leaders always provide motivation to the citizens of UNNES, to reduce and change patterns of energy consumption.

Keywords: energy consumption, carbon emission absorption, emission reduction, energy literation

Procedia PDF Downloads 229