Search results for: cyber security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5326

Search results for: cyber security awareness

4246 A Qualitative Study on Cyberbullying and Traditional Bullying among Taiwanese High School Students

Authors: Chia-Wen Wang, Patou Masika Musumari, Teeranee Techasrivichien, S. Pilar Suguimoto, Chang-Chuan Chan, Masako Ono-Kihara, Masahiro Kihara

Abstract:

Background: In recent years, a particular form of bullying, referred to as 'cyberbullying' has emerged along with the rapid expansion of the Internet, social network services (SNSs) and smart phones. Many Asian countries, including Taiwan, are faced with both the cyberbullying and the traditional form of bullying. This study aims to explore Taiwanese adolescents’ experiences, perceptions and opinions regarding cyberbullying and traditional bullying through the perspective of victim, perpetrator, or witness. Method: This is a qualitative study using face-to-face in-depth interviews guided by a semi-structured questionnaire among high school students -aged 16 to 18 years- in Taipei, Taiwan. The participants were recruited through convenience sampling from five high schools between June and November 2016. Interviews were digitally recorded, transcribed, and analyzed using the thematic analysis approach. Results: Forty-eight participants were recruited, of which, 14 (29.2%) reported had ever experienced bullying. Specifically, 7 participants (14.6%) reported had ever been victims of cyberbullying, 1 (2%) had been victims of traditional bullying, and 6 (12.5%) had been victims of both cyber and traditional bullying. The majority (70.8%) reported had ever witnessed acts of bullying; however, none of the participants recognized had ever been a perpetrator of bullying. Cyberbullying mostly happens on social media (Facebook and Instagram) or LINE instant messaging application, and included upload and sharing of degrading pictures and videos of victims, as well as gossip and mean messages by the perpetrators. The anonymous and public nature of social media groups in schools made it easier to perpetrate bullying. The victim of traditional bullying reported being the target of verbal attack because of his physical appearance. Regardless of the type of bullying, victims reported feeling bad, angry, or depressed as a result of being bullied. Witnesses of both cyber- and traditional bullying cited physical appearance (e.g. having the big/flat bust or big butt, or overweight or obese) and disability as the most reasons of being a bullying victim. Conclusion: Both cyberbullying and traditional bullying had negative emotional and psychological impacts on victims. This study warrants further research to assess the extent of this phenomenon and understand the characteristics of perpetrators, victims, and witnesses to inform the design of tailored interventions using appropriate channels of dissemination.

Keywords: cyberbullying, traditional bullying, social media, adolescents

Procedia PDF Downloads 328
4245 Foreign Language Anxiety: Perceptions and Attitudes in the Egyptian ESL Classroom

Authors: Shaden S. Attia

Abstract:

This study investigated foreign language anxiety (FLA) and teachers’ awareness of its presence in the Egyptian ESL classrooms and how FLA correlates with different variables such as four language skills, students' sex, and activities used in class. A combination of quantitative and qualitative instruments was used in order to investigate the previously mentioned variables, which included five interviews with teachers, six classroom observations, a survey for teachers, and a questionnaire for students. The findings of the study revealed that some teachers were aware of the presence of FLA, with some of them believing that other teachers, however, are not aware of this phenomenon, and even when they notice anxiety, they do not always relate it to learning a foreign language. The results also showed that FLA was affected by students’ sex, different language skills, and affective anxieties; however, teachers were unaware of the effect of these variables. The results demonstrated that both teachers and students preferred group and pair work to individual activities as they were more relaxing and less anxiety-provoking. These findings contribute to raising teachers' awareness of FLA in ESL classrooms and how it is affected by different variables.

Keywords: foreign language anxiety, situation specific anxiety, skill-specific anxiety, teachers’ perceptions

Procedia PDF Downloads 135
4244 The Sound of Getting Closer: A Phenomenological Research of the Senses of Proximity and Touch

Authors: Marcello Lussana

Abstract:

Closer is a wireless system developed by the “Design Research Lab” of the UdK Berlin that is able to detect the proximity and touch between two (or more) persons. We have been using this system for one performance and one installation: in both cases, the proximity and touch events of the two participants have been sonified using the software Supercollider. In this paper, we are going to focus on the actual experience of the participants involved, especially related to the awareness of their body, their level of proprioception and how they felt in their body and in connection with the other person. In order to give value to the lived experience of the participant, a phenomenological method described and developed by Professor Claire Petitmengin has been used. This strategy allowed the interviewees to become aware of their subjective experience, and describe it with great precision. This is essential in order to understand the actual state of consciousness of the users. Our aim is to research the senses of proprioception, touch, and proximity: as they all involve a pre-reflective state of consciousness, they are central for the understanding of human perception. The interviews revealed how this experience could improve and increase proprioception and awareness of your body.

Keywords: interactive sound, phenomenology, pre-reflective, proprioception, subjective experience

Procedia PDF Downloads 228
4243 Evaluation of the Role of Theatre for Development in Combating Climate Change in South Africa

Authors: Isaiah Phillip Smith, Sam Erevbenagie Usadolo, Pamela Theresa Tancsik

Abstract:

This paper is part of ongoing doctoral research that examines the role of Theatre for Development (TfD) in addressing climate change in the Mosuthu community in Reservoir Hills, Durban, South Africa. The context of the research underscores the pressing challenges facing South Africa, including drought, water shortages, deterioration of land, and civil unrest that require innovative approaches to the mitigation of climate change. TfD, described as a dialogical form of theatre that allows communities to express and contribute to development, emerges as a strategic medium for engaging communities in the process. The research problem focused on the unexamined potential of TfD in promoting community involvement and critical awareness of climate change. The study objectives included assessing the community's understanding of climate change, exploring TfD's potential as a participatory tool, examining its role in community mobilization, and developing recommendations for its effective implementation. A review of relevant literature and preliminary investigations in the research community indicates that TfD is an effective medium for promoting societal transformation and engaging marginalized communities. Through culturally resonant narratives, TfD can instill a deeper understanding of environmental challenges, fostering empathy and motivating behavioural changes. By integrating community voices and cultural elements, TfD serves as a powerful catalyst for promoting climate change awareness and inspiring collective action within the South African context. This research contributes to the global discourse on innovative approaches to climate change awareness and action.

Keywords: TfD, climate change, community involvement, societal transformation, culture

Procedia PDF Downloads 33
4242 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies

Authors: Arun Prabhakar

Abstract:

Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.

Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling

Procedia PDF Downloads 126
4241 An Approach of High Scalable Production Capacity by Adaption of the Concept 'Everything as a Service'

Authors: Johannes Atug, Stefan Braunreuther, Gunther Reinhart

Abstract:

Volatile markets, as well as increasing global competition in manufacturing, lead to a high demand of flexible and agile production systems. These advanced production systems in turn conduct to high capital expenditure along with high investment risks. Developments in production regarding digitalization and cyber-physical systems result to a merger of informational- and operational technology. The approach of this paper is to benefit from this merger and present a framework of a production network with scalable production capacity and low capital expenditure by adaptation of the IT concept 'everything as a service' into the production environment.

Keywords: digital manufacturing system, everything as a service, reconfigurable production, value network

Procedia PDF Downloads 325
4240 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices

Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman

Abstract:

The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.

Keywords: hospital, light fidelity, Li-Fi, medical devices, security

Procedia PDF Downloads 84
4239 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han

Abstract:

As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.

Keywords: actuator, user authentication, security evaluation, haptic actuator

Procedia PDF Downloads 332
4238 World on the Edge: Migration and Cross Border Crimes in West Africa

Authors: Adeyemi Kamil Hamzah

Abstract:

The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.

Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation

Procedia PDF Downloads 210
4237 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment

Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

Abstract:

In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.

Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment

Procedia PDF Downloads 161
4236 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security

Authors: Carmen J. Savelli, Romy Conzade

Abstract:

Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.

Keywords: food safety, food security, nutrition, policy

Procedia PDF Downloads 397
4235 Incarcerated Students' Participation Rates in Open Distance Education: Exploring the Role of South African Universities

Authors: Veisiwe Gasa

Abstract:

Many higher institutions of education that offer Open Distance Learning (ODL) and e-Learning have opened their doors to accommodate prisoners who want to further their studies. The provision of education for prisoners in South Africa emanates from a number of reasons. The alarmingly high numbers of the prison population in South Africa has called for the government to provide desperate measures. It is on these premises that the provision of higher education in prison is recommended. Higher education is recommended because of the belief that it creates employability and thereby reduces recidivism. Using targeted sampling, 5 universities were required to elaborate on their awareness strategies, how they ensure that Distance Education is accessible to the prisoners and also the ways in which they cater to the needs of incarcerated students. The research findings reveal that there is so little that has been done by these particular institutions to cater for prisoners. This raises a concern and indicates a need to raise awareness of the value of higher and distance education among prisoners. It also calls for higher education institutions to make prisons aware of their course offerings.

Keywords: e-Learning, incarcerated students, open distance learning, recidivism

Procedia PDF Downloads 175
4234 Managing the Architectural Heritage of Tripoli-Libya: The Red Castle as a Case Study

Authors: Eman Mohamed Ali Elalwani

Abstract:

The Libyan heritage buildings are currently facing a number of crises that pose a threat to their structural integrity, functionality, and overall performance. One of the challenges pertains to the loss of community identity, which has arisen due to the lack of awareness and unconscious behavior of the residents. An additional issue arises from inadequate site management practices, including the implementation of modern techniques and innovative building materials that are incompatible with structural elements, resulting in the deformation of certain sections of the buildings. The security concerns of the city, along with the ongoing civil conflict, fostered a conducive environment for violations, resulting in the vandalism of certain monuments in the city. However, the degradation of this valuable heritage is mainly attributed to the city's neglect and pollution. The elevated groundwater level resulting from pollution has led to erosion in the building's foundations. Mitigating these negative consequences through strategic interventions and rehabilitation is required to preserve this treasure. In order to assist the local community in recovering from those crises, this paper stated a viable strategy for promoting preservation efforts that aimed at safeguarding the heritage sites while also providing guidance to decision-makers and the local community on how to avoid these crises, preserve, enhance, and recognize the significance of the Libyan heritage.

Keywords: cultural heritage, historical buildings, Tripoli’s old city, Red Castle, crises, preservation

Procedia PDF Downloads 107
4233 Determinants of International Volatility Passthroughs of Agricultural Commodities: A Panel Analysis of Developing Countries

Authors: Tetsuji Tanaka, Jin Guo

Abstract:

The extant literature has not succeeded in uncovering the common determinants of price volatility transmissions of agricultural commodities from international to local markets, and further, has rarely investigated the role of self-sufficiency measures in the context of national food security. We analyzed various factors to determine the degree of price volatility transmissions of wheat, rice, and maize between world and domestic markets using GARCH models with dynamic conditional correlation (DCC) specifications and panel-feasible generalized least square models. We found that the grain autarky system has the potential to diminish volatility pass-throughs for three grain commodities. Furthermore, it was discovered that the substitutive commodity consumption behavior between maize and wheat buffers the volatility transmissions of both, but rice does not function as a transmission-relieving element, either for the volatilities of wheat or maize. The effectiveness of grain consumption substitution to insulate the pass-throughs from global markets is greater than that of cereal self-sufficiency. These implications are extremely beneficial for developing governments to protect their domestic food markets from uncertainty in foreign countries and as such, improves food security.

Keywords: food security, GARCH, grain self-sufficiency, volatility transmission

Procedia PDF Downloads 139
4232 Climate Change and Human Migration

Authors: Sungwoo Park

Abstract:

The paper attempts to investigate the correlation between climate change and migration that has caused violent disputes in some regions of the world. Recently, NGOs and educational institutions have proposed claims that migratory patterns and violent uprisings are intertwined with climate change. Thus, the paper is primarily concerned with collecting evidences provided from scholars, validating this significant connection between climate change and migration, and evaluating and suggesting current and future research approaches respectively to enhance the acknowledgment and protection of environmental refugees. In order to examine the linkage of environmental migration, primary sources, such as political speeches, and secondary sources like theses from environmental policy analysts, books, and reports are used. More specifically, the investigation focuses on an civil war in Syria to draw a connection between environmental migration and violent dispute that threatens the global security. The examination undertaken specifically analyzes examples where forced migration occurred due to climate change. In Bangladesh, Pakistan, and Kiribati, residents have been at risk of fleeing their countries because of abnormal climate patterns, such as the rise of sea level or an excessive heat stress. As the brutal uprising in Syria has proven that climate change can pose a significant threat to global security, correlation between climate change and migration is surely worth delving into.

Keywords: climate change, climate migration, global security, refugee crisis

Procedia PDF Downloads 329
4231 Assessment of Rural Youth Adoption of Cassava Production Technologies in Southwestern Nigeria

Authors: J. O. Ayinde, S. O. Olatunji

Abstract:

This study assessed rural youth adoption of cassava production technologies in Southwestern, Nigeria. Specifically, it examine the level of awareness and adoption of cassava production technologies by rural youth, determined the extent of usage of cassava production technologies available to the rural youth, examined constrains to the adoption of cassava production technologies by youth and suggested possible solutions. Multistage sampling procedure was adopted for the study. In the first stage, two states were purposively selected in southwest, Nigeria which are Osun and Oyo states due to high level of cassava production and access to cassava production technology in the areas. In the second stage, purposive sampling technique was used to select two local governments each from the states selected which are Ibarapa central (Igbo-Ora) and Ibarapa East (Eruwa) Local Government Areas (LGAs) in Oyo state; and Ife North (Ipetumodu) and Ede South (Oke Ireesi) LGAs in Osun State. In the third stage, proportionate sampling technique was used to randomly select five, four, six and four communities from the selected LGAs respectively representing 20 percent of the rural communities in them, in all 19 communities were selected. In the fourth stage, Snow ball sampling technique was used to select about 7 rural youths in each community selected to make a total of 133 respondents. Validated structured interview schedule was used to elicit information from the respondents. The data collected were analyzed using both descriptive and inferential statistics to summarize and test the hypotheses of the study. The results show that the average age of rural youths participating in cassava production in the study area is 29 ± 2.6 years and 60 percent aged between 30 and 35 years. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). The result also reveals that the average size of farm land of the respondents is 2.5 ± 0.3 hectares. Also, more male (67.4 %) were involved in cassava production than females (32.6 %). Also, extent of usage of the technologies (r = 0.363, p ≤ 0.01) shows significant relationship with level of adoption of the technologies. Household size (b = 0.183; P ≤ 0.01) and membership of social organizations were significant at 0.01 (b = 0.331; P ≤ 0.01) while age was significant at 0.10 (b = 0.097; P ≤ 0.05). On the other hand 0.01, years of residence (b = - 0.063; P ≤ 0.01) and income (b = - 0.204; P ≤ 0.01) had negative values and implies that a unit increase in each of these variables would decrease extent of usage of the Cassava production technologies. It was concluded that the extent of usage of the technologies in the communities will affect the rate of adoption positively and this will change the negative perception of youths on cassava production thereby ensure food security in the study area.

Keywords: assessment, rural youths’, Cassava production technologies, agricultural production, food security

Procedia PDF Downloads 198
4230 Survey on Awareness, Knowledge and Practices: Managing Osteoporosis among Practitioners in a Tertiary Hospital, Malaysia

Authors: P. H. Tee, S. M. Zamri, K. M. Kasim, S. K. Tiew

Abstract:

This study evaluates the management of osteoporosis in a tertiary care government hospital in Malaysia. As the number of admitted patients having osteoporotic fractures is on the rise, osteoporotic medications are an increasing financial burden to government hospitals because they account for half of the orthopedic budget and expenditure. Comprehensive knowledge among practitioners is important to detect early and avoid this preventable disease and its serious complications. The purpose of this study is to evaluate the awareness, knowledge, and practices in managing osteoporosis among practitioners in Hospital Tengku Ampuan Rahimah (HTAR), Klang. A questionnaire from an overseas study in managing osteoporosis among primary care physicians is adapted to Malaysia’s Clinical Practice Guideline of Osteoporosis 2012 (revised 2015) and international guidelines were distributed to all orthopedic practitioners in HTAR Klang (including surgeons, orthopedic medical officers), endocrinologists, rheumatologists and geriatricians. The participants were evaluated on their expertise in the diagnosis, prevention, treatment decision and medications for osteoporosis. Collected data were analyzed for all descriptive and statistical analyses as appropriate. All 45 participants responded to the questionnaire. Participants scored highest on expertise in prevention, followed by diagnosis, treatment decision and lastly, medication. Most practitioners stated that own-initiated continuing professional education from articles and books was the most effective way to update their knowledge, followed by attendance in conferences on osteoporosis. This study confirms the importance of comprehensive training and education regarding osteoporosis among tertiary care physicians and surgeons, predominantly in pharmacotherapy, to deliver wholesome care for osteoporotic patients.

Keywords: awareness, knowledge, osteoporosis, practices

Procedia PDF Downloads 115
4229 Agro-Insurance and Farming Development Opportunities in Georgia

Authors: Tamar Lazariashvili

Abstract:

Introduction: The agro-insurance has great importance for agricultural development in the country. In the article, the insurance market of the Georgian agricultural sector has been studied, the level of interest of farmers with insurance products and the trend of demand for those products are revealed; also, the importance of insurance is substantiated. Methodology: The following research methods are applied in the presented paper: statistical (selection, grouping, observation, trend) and qualitative research (in-depth interview with farmers). They claim that the main reason for aggravation is the low level of trust, less awareness about the conditions of the insurance contract. In order to eradicate distrust towards agro-insurance, it is recommended to increase awareness of insured farmers in terms of an insurance agreement. In the case of disputable issues between insurance companies and the customers (farmers), it is advisable to enact the Mediation Service, which will be able to protect the rights of insured farmers. Main Findings: Insurance companies prefer to deal with large farmers, the number of them is very small in Georgia as the credit market. The government interference in this sector is also a very cautious topic. However, the government can strengthen the awareness of farmers about the characteristics and advantages of the insurance system in order to increase the number of insured and reduce insurance premiums for farmers. Conclusion: Enactment of agro-insurance will increase the interest and confidence of financial institutions in the farming sector, financial resources will be accessible to the farmers that will facilitate the stable development of the sector in the country. The size of the agro-insurance market in the country should be increased, and the new territories should be covered. The State must have an obligation to ensure the risk of farmers and subsidize insurance companies. Based on the analysis of the insurance market, the conclusions on agro-insurance issues and the relevant recommendations are proposed.

Keywords: Agro-insurance, agricultural product, Agro-market, farming

Procedia PDF Downloads 108
4228 Study of Components and Effective Factors on Organizational Commitment of Khoramabad Branchs Islamic Azad University’s Faculty Members

Authors: Mehry Daraei

Abstract:

The goal of this study was to survey the components and affective factors on organizational commitment of Islamic Azad university Khoramabad Baranch’s faculty members. The research method was correlation by causal modeling and data were gathered by questionnaire. Statistical society consisted of 147 faculty members in Islamic Azad University Khoramabad Branch and sample size was determined as 106 persons by Morgan’s sample table that were selected by class sampling. Correlation test, T-single group test and path analysis test were used for analysis of data. Data were analyzed by Lisrel software. The results showed that organizational corporate was the most effective element on organizational commitment and organizational corporate, experience work and organizational justice were only in direct relation with organizational commitment. Also, job security had direct and indirect effect on OC. Job security had effect on OC by gender. Gender variable had direct and indirect effect on OC. Gender had effect on OC by organizational corporate. Job opportunities out of university also had direct and indirect effect on OC, which means job opportunities had indirect effect on OC by organizational corporate.

Keywords: organization, commitment, job security, Islamic Azad University

Procedia PDF Downloads 304
4227 Secure Transfer of Medical Images Using Hybrid Encryption

Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 425
4226 Perception of Nurses and Caregivers on Fall Preventive Management for Hospitalized Children Based on Ecological Model

Authors: Mirim Kim, Won-Oak Oh

Abstract:

Purpose: The purpose of this study was to identify hospitalized children's fall risk factors, fall prevention status and fall prevention strategies recognized by nurses and caregivers of hospitalized children and present an ecological model for fall preventive management in hospitalized children. Method: The participants of this study were 14 nurses working in medical institutions and having more than one year of child care experience and 14 adult caregivers of children under 6 years of age receiving inpatient treatment at a medical institution. One to one interview was attempted to identify their perception of fall preventive management. Transcribed data were analyzed through latent content analysis method. Results: Fall risk factors in hospitalized children were 'unpredictable behavior', 'instability', 'lack of awareness about danger', 'lack of awareness about falls', 'lack of child control ability', 'lack of awareness about the importance of fall prevention', 'lack of sensitivity to children', 'untidy environment around children', 'lack of personalized facilities for children', 'unsafe facility', 'lack of partnership between healthcare provider and caregiver', 'lack of human resources', 'inadequate fall prevention policy', 'lack of promotion about fall prevention', 'a performanceism oriented culture'. Fall preventive management status of hospitalized children were 'absence of fall prevention capability', 'efforts not to fall', 'blocking fall risk situation', 'limit the scope of children's activity when there is no caregiver', 'encourage caregivers' fall prevention activities', 'creating a safe environment surrounding hospitalized children', 'special management for fall high risk children', 'mutual cooperation between healthcare providers and caregivers', 'implementation of fall prevention policy', 'providing guide signs about fall risk'. Fall preventive management strategies of hospitalized children were 'restrain dangerous behavior', 'inspiring awareness about fall', 'providing fall preventive education considering the child's eye level', 'efforts to become an active subject of fall prevention activities', 'providing customed fall prevention education', 'open communication between healthcare providers and caregivers', 'infrastructure and personnel management to create safe hospital environment', 'expansion fall prevention campaign', 'development and application of a valid fall assessment instrument', 'conversion of awareness about safety'. Conclusion: In this study, the ecological model of fall preventive management for hospitalized children reflects various factors that directly or indirectly affect the fall prevention of hospitalized children. Therefore, these results can be considered as useful baseline data for developing systematic fall prevention programs and hospital policies to prevent fall accident in hospitalized children. Funding: This study was funded by the National Research Foundation of South Korea (grant number NRF-2016R1A2B1015455).

Keywords: fall down, safety culture, hospitalized children, risk factors

Procedia PDF Downloads 149
4225 Exploring Cybersecurity and Phishing Attacks within Healthcare Institutions in Saudi Arabia: A Narrative Review

Authors: Ebtesam Shadadi, Rasha Ibrahim, Essam Ghadafi

Abstract:

Phishing poses a significant threat as a cybercrime by tricking end users into revealing their confidential and sensitive information. Attackers often manipulate victims to achieve their malicious goals. The increasing prevalence of Phishing has led to extensive research on this issue, including studies focusing on phishing attempts in healthcare institutions in the Kingdom of Saudi Arabia. This paper explores the importance of analyzing phishing attacks, specifically focusing on those targeting the healthcare industry. The study delves into the tactics, obstacles, and remedies associated with these attacks, all while considering the implications for Saudi Vision 2030.

Keywords: phishing, cybersecurity, cyber threat, social engineering, vision 2030

Procedia PDF Downloads 18
4224 Creative Thinking through Mindful Practices: A Business Class Case Study

Authors: Malavika Sundararajan

Abstract:

This study introduces the use of mindfulness techniques in the classroom to make individuals aware of how the creative thinking process works, resulting in more constructive learning and application. Case observation method was utilized within a classroom setting in a graduate class in the Business School. It entailed, briefing the student participants about the use of a template called the dots and depths map, and having them complete it for themselves, compare it to their team members and reflect on the outputs. Finally, they were debriefed about the use of the template and its value to their learning and creative application process. The major finding is the increase in awareness levels of the participants following the use of the template, leading to a subsequent pursuit of diverse knowledge and acquisition of relevant information and not jumping to solutions directly, which increased their overall creative outputs for the given assignment. The significant value of this study is that it can be applied to any classroom on any subject as a powerful mindfulness tool which increases creative problem solving through constructive knowledge building.

Keywords: connecting dots, mindful awareness, constructive knowledge building, learning creatively

Procedia PDF Downloads 127
4223 Linguistic Politeness in Higher Education Teaching Chinese as an Additional Language

Authors: Leei Wong

Abstract:

Changes in globalized contexts precipitate changing perceptions concerning linguistic politeness practices. Within these changing contexts, misunderstanding or stereotypification of politeness norms may lead to negative consequences such as hostility or even communication breakdown. With China’s rising influence, the country is offering a vast potential market for global economic development and diplomatic relations and opportunities for intercultural interaction, and many outside China are subsequently learning Chinese. These trends bring both opportunities and pitfalls for intercultural communication, including within the important field of politeness awareness. One internationally recognized benchmark for the study and classification of languages – the updated 2018 CEFR (Common European Framework of Reference for Language) Companion Volume New Descriptors (CEFR/CV) – classifies politeness as a B1 (or intermediate) level descriptor on the scale of Politeness Conventions. This provides some indication of the relevance of politeness awareness within new globalized contexts for fostering better intercultural communication. This study specifically examines Bald on record politeness strategies presented in current beginner TCAL textbooks used in Australian tertiary education through content-analysis. The investigation in this study involves the purposive sampling of commercial textbooks published in America and China followed by interpretive content analysis. The philosophical position of this study is therefore located within an interpretivist ontology, with a subjectivist epistemological perspective. It sets out with the aim to illuminate the characteristics of Chinese Bald on record strategies that are deemed significant in the present-world context through Chinese textbook writers and curriculum designers. The data reveals significant findings concerning politeness strategies in beginner stage curriculum, and also opens the way for further research on politeness strategies in intermediate and advanced level textbooks for additional language learners. This study will be useful for language teachers, and language teachers-in-training, by generating awareness and providing insights and advice into the teaching and learning of Bald on record politeness strategies. Authors of textbooks may also benefit from the findings of this study, as awareness is raised of the need to include reference to understanding politeness in language, and how this might be approached.

Keywords: linguistic politeness, higher education, Chinese language, additional language

Procedia PDF Downloads 91
4222 Impact of Global Climate Change on Economy of Pakistan: How to Ensure Sustainable Food and Energy Production

Authors: Sabahat Zahra

Abstract:

The purpose of this research is to present the changing global environment and its potential impacts on sustainable food and energy production at global level, particularly in Pakistan. The food and energy related-economic sector has been subjected to negative consequences due to recent extreme changes in weather conditions, particularly in developing countries. Besides continuous modifications in weather, population is also increasing by time, therefore it is necessary to take special steps and start effective initiatives to cope with the challenges of food and energy security to fight hunger and for economic stability of country. Severe increase in temperature and heat waves has also negative impacts on food production as well as energy sustainability. Energy (in terms of electricity) consumption has grown up than the production potential of the country as a consequence of increasing warm weather. Ultimately prices gone up when there is more consumption than production. Therefore, all these aspects of climate change are interrelated with socio-economic issues. There is a need to develop long-term policies on regional and national levels for maintainable economic growth. This research presents a framework-plan and recommendations for implementation needed to mitigate the potential threats due to global climate change sustainable food and energy production under climate change in the country.

Keywords: climate changes, energy security, food security, global climate change

Procedia PDF Downloads 332
4221 Emotional Intelligence: Strategies in the Sphere of Leadership

Authors: Raghavi Janaswamy, Srinivas Janaswamy

Abstract:

Emotional Intelligence (EI) measures the degree to which individuals can identify, understand and manage emotions. Indeed, it highlights the intricate relationship between thoughts, feelings, and behavior of an individual. In today's world, EI competencies appear to be more valuable compared to cognitive and/or technical expertise. Higher EI endows realistic confidence to perceive challenges with positive thinking and, in turn, offers a steady growth as well as the speed of work and discerning ability. It certainly plays a vital role for aspirants to ascend the organizational ladder and distinguishes outstanding leaders from the rest. Emotional maturity further reflects on the behavioral pattern toward dealing with self and the immediate environment. Indeed, it aids in cementing inter-personal relations at a workplace with a thorough understanding and certainly paves the way for leaders to their prosperity as well as organizational growth. Herein, EI contributions to an individual, team, and organizational success are discussed with an emphasis on the required tools to acquire higher EI traits. The strategies for promoting self-awareness, empathy, and social skills and changing trends of the new programs for the EI improvement are also highlighted.

Keywords: emotional intelligence, leadership, organizational growth, self-awareness skills

Procedia PDF Downloads 69
4220 Northern Ghana’s Sustainable Food Systems: Evaluating the Impact of International Development

Authors: Maxwell Ladogo Abilla

Abstract:

As evidence from the 2007–2008 and 2010 global food and financial crises revealed that food systems were under stress, the idea of sustainable food systems rose to prominence in the discussion of food security. The idea suggests moving away from a conception of food security that emphasizes production in favor of one that is more socially and environmentally conscious and interested in tackling a wide range of issues that have rendered the food system dysfunctional. This study evaluates the efforts made by international development organizations to increase food security in the area, taking into account the persistence of poverty and food insecurity in northern Ghana, utilizing the idea of sustainable food systems as the evaluation criterion. The study used triangulation to address the research questions by combining qualitative interview data with documentary analysis. To better comprehend the concept of sustainability, a variety of discourses and concepts are used, which results in the development of eight doable objectives for attaining sustainable food systems. The study finds that the food system in northern Ghana is unsustainable because of three kinds of barriers, with the practical objectives of developing sustainable food systems serving as the assessment criteria (natural, cultural and economic, and institutional). According to an evaluation of the World Food Programme's development support in northern Ghana, regional challenges to attaining sustainable food systems continue to be unaddressed by global development initiatives. Due to institutional constraints, WFP's interventions fell short of their promise. By demonstrating the need for development partners to enhance institutional efficiency and coordination, enable marginalized communities to access their rights, and prioritize agricultural irrigation in the area, the study makes a contribution to development policy and practice in northern Ghana.

Keywords: sustainable, food security, development, institutional

Procedia PDF Downloads 75
4219 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 484
4218 The Role of Non-Native Plant Species in Enhancing Food Security in Sub-Saharan Africa

Authors: Thabiso Michael Mokotjomela, Jasper Knight

Abstract:

Intensification of agricultural food production in sub-Saharan Africa is of paramount importance as a means of increasing the food security of communities that are already experiencing a range of environmental and socio-economic stresses. However, achieving this aim faces several challenges including ongoing climate change, increased resistance of diseases and pests, extreme environmental degradation partly due to biological invasions, land tenure and management practices, socio-economic developments of rural populations, and national population growth. In particular, non-native plant species tend to display greater adaptation capacity to environmental stress than native species that form important food resource base for human beings, thus suggesting a potential for usage to shift accordingly. Based on review of the historical benefits of non-native plant species in food production in sub-Saharan Africa, we propose that use of non-invasive, non-native plant species and/or the genetic modification of native species might be viable options for future agricultural sustainability in this region. Coupled with strategic foresight planning (e.g. use of biological control agents that suppress plant species’ invasions), the consumptive use of already-introduced non-native species might help in containment and control of possible negative environmental impacts of non-native species on native species, ecosystems and biodiversity, and soil fertility and hydrology. Use of non-native species in food production should be accompanied by low cost agroecology practices (e.g. conservation agriculture and agrobiodiversity) that may promote the gradual recovery of natural capital, ecosystem services, and promote conservation of the natural environment as well as enhance food security.

Keywords: food security, invasive species, agroecology, agrobiodiversity, socio-economic stresses

Procedia PDF Downloads 352
4217 [Keynote Talk]: Quest for Sustainability in the Midst of Conflict Between Climate and Energy Security

Authors: Deepak L. Waikar

Abstract:

Unprecedented natural as well as human made disasters have been responsible for loss of hundreds of thousands of lives, injury & displacement of millions of people and damages in billions of dollars in various parts of the world. Scientists, experts, associations and united nation have been warning about colossal disregard for human safety and environment in exploiting natural resources for insatiable greed for economic growth and rising lavish life style of the rich. Usual blame game is routinely played at international forums & summits by vested interests in developing and developed nations, while billions of people continue to suffer in abject energy poverty. Energy security, on the other hand, is becoming illusive with the dominance of few players in the market, poor energy governance mechanisms, volatile prices and geopolitical conflicts in supply chain. Conflicting scenarios have been cited as one of the major barriers for transformation to a low carbon economy. Policy makers, researchers, academics, businesses, industries and communities have been evaluating sustainable alternatives, albeit at snail’s pace. This presentation focuses on technologies, energy governance, policies & practices, economics and public concerns about safe, prudent & sustainable harnessing of energy resources. Current trends and potential research & development projects in power & energy sectors which students can undertake will be discussed. Speaker will highlight on how youths can be engaged in meaningful, safe, enriching, inspiring and value added self-development programmes in our quest for sustainability in the midst of conflict between climate and energy security.

Keywords: clean energy, energy policy, energy security, sustainable energy

Procedia PDF Downloads 474