Search results for: security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5241

Search results for: security awareness

4161 Multi-Generational Analysis of Perception and Acceptance of Mental Illnesses: Current Indian Context

Authors: Anvi Kumar

Abstract:

This paper explores the attitudes and awareness of multiple generations ranging from Boomers I to GenZ (i.e. from 1954 to 2012) towards mental health issues. A convenient sample of 191 people was gathered in India aged 11-77. 20 people each were considered from 5 generational cohorts, namely- Boomers I, Boomers II, Gen X, Millennials, and Gen Z. The study tool comprised a survey that included demographic questions and the Community Attitude towards Mental Illness (CAMI) scale by Taylor & Dear (1981). Descriptive statistics, ANOVA, and Bonferonni’s post-hoc analysis have been used to perform the analysis. The findings reveal that the level of kindness towards those who struggle with mental health varies through certain age groups. An overall sense of exclusion of those struggling with mental health is prevalent among all age groups. GenZ’s awareness of mental health issues is primarily via social media, as against the rest of the generations seeking it from close relatives and friends. The study’s findings suggest a need to investigate further the quality of mental health knowledge content and its consumption pattern. Understanding the dynamics of information sharing and the potential for biases requires further discovery.

Keywords: attitude, behaviour, mental illness, Gen Z, millennials, Gen Y, multi-generations, generational differences

Procedia PDF Downloads 71
4160 A Comparative Genre-Based Study of Research Articles' Method and Results Sections Authored by Iranian and English Native Speakers

Authors: Mohammad Amin Mozaheb, Mahnaz Saeidi, Saeideh Ahangari, Saeideh Ahangari

Abstract:

The present genre-driven study aims at comparing moves and sub-moves deployed by Iranian and English medical writers while writing their research articles in English. To obtain the goals of the study, the researchers randomly selected a number of medical articles and compared them using Nwogu (1997)’s model. The results of relevant statistical tests, Chi-square tests for goodness of fit, used for comparing the two groups of the articles dubbed IrISI (Iranian ISI articles) and EISI (English ISI articles) have shown that no significant difference exists between the two groups of the articles in terms of the moves and sub-moves used in the method and results sections of them. The findings can be beneficial for people interested in English for Specific Purposes (ESP) and medical experts. The findings can also increase language awareness and genre awareness among researchers who are interested in publishing their research outcomes in ISI-indexed journals in the Islamic Republic of Iran and some other world countries.

Keywords: writing, ESP, research articles, medical sciences, language, scientific writing

Procedia PDF Downloads 364
4159 Subjective Well-Being, Emotional Regulation and Motivational Orientation of Competition Athletes

Authors: Cristina Costa-Lobo, Priscila Martins, Silvia Amado Cordeiro, Ana Campina

Abstract:

Behavior directed toward high levels of sports performance and excellence implies task-focused processes, processes of cognitive and emotional regulation. This research aims to understand if subjective well-being, emotional regulation, and motivational orientation influence the performance of competitive athletes. The sample of this study is a non-probabilistic convenience sample, consisting of 50 male athletes, aged 14 to 15 years, who belong to training teams integrated in the pedagogical department of a sports club in the North of Portugal. In terms of performance, the distinction between team A and team B is due to the championships in which the respective athletes participate. Team A participates in national championships where the levels of demand and challenge are more pronounced and the team B only participates in championships at the district level. Was verified the internal consistency of the subjective happiness scale, the emotional regulation scale, and the motivational orientation questionnaire. SPSS, version 22.0, was used in the data treatment. When comparing the dimensions of emotional regulation with performance, it can be seen that athletes with lower sports scores have higher levels of emotional control and emotional self-awareness. As far as situational responsiveness is concerned, only the emotional self-control dimension and the emotional self-awareness dimension show an influence on the income, although, contrary to what would be expected, they appear to be associated with lower incomes. When comparing the motivational orientation with the athletic performance, it is verified that the athletes with the highest performance present an ego-oriented motivation, evidencing the athletes with a lower performance athletic tendency towards the task orientation. Only the ego-oriented dimension seems to be associated with high sport performance. The motivational orientation for the ego and the dimensions emotional control and emotional self-awareness are presented in this study as having influence on sports performance. Following these studies that have shown concern with the characterization of the best athletes and the promotion of higher sports performances, this work contributes to the signaling of psychological variables associated with high sports income.

Keywords: subjective well-being, emotional regulation, motivational orientation, sports performance

Procedia PDF Downloads 271
4158 Cultural Heritage Education in Preschools: Preschool Teachers' Perspectives

Authors: Yasemin Yücesan, Gabriela Portugal, Maria Figueiredo

Abstract:

This paper presents a part of an ongoing study on preschool teachers' perspectives and pedagogical practices regarding cultural heritage education. Accordingly, this study is based on a quantitative survey. The study area is Türkiye, and the research participants are preschool teachers actively teaching in preschool education institutions. It is necessary to encourage children to understand the past and cultural heritage values at an early age. Moreover, raising awareness of cultural heritage in preschool children is crucial for recognising and preserving this heritage. Therefore, it is very important to provide people with cultural heritage knowledge at an early age, as the preschool period is a key factor in raising awareness of this issue. In the preschool education programme implemented in Türkiye, it is stated that cultural heritage education is important in early childhood and should be included in the programme. However, although it is stated that cultural heritage education should be included in the preschool education programme, it is not clearly stated which subjects will be included in the programme and what kind of practices will be carried out. Therefore, this study examines the perspectives and pedagogical practices of preschool teachers working in preschool education institutions toward cultural heritage education.

Keywords: cultural heritage, early childhood education, pedagogical practices, preschool teacher

Procedia PDF Downloads 18
4157 Consumer Preferences for Low-Carbon Futures: A Structural Equation Model Based on the Domestic Hydrogen Acceptance Framework

Authors: Joel A. Gordon, Nazmiye Balta-Ozkan, Seyed Ali Nabavi

Abstract:

Hydrogen-fueled technologies are rapidly advancing as a critical component of the low-carbon energy transition. In countries historically reliant on natural gas for home heating, such as the UK, hydrogen may prove fundamental for decarbonizing the residential sector, alongside other technologies such as heat pumps and district heat networks. While the UK government is set to take a long-term policy decision on the role of domestic hydrogen by 2026, there are considerable uncertainties regarding consumer preferences for ‘hydrogen homes’ (i.e., hydrogen-fueled appliances for space heating, hot water, and cooking. In comparison to other hydrogen energy technologies, such as road transport applications, to date, few studies have engaged with the social acceptance aspects of the domestic hydrogen transition, resulting in a stark knowledge deficit and pronounced risk to policymaking efforts. In response, this study aims to safeguard against undesirable policy measures by revealing the underlying relationships between the factors of domestic hydrogen acceptance and their respective dimensions: attitudinal, socio-political, community, market, and behavioral acceptance. The study employs an online survey (n=~2100) to gauge how different UK householders perceive the proposition of switching from natural gas to hydrogen-fueled appliances. In addition to accounting for housing characteristics (i.e., housing tenure, property type and number of occupants per dwelling) and several other socio-structural variables (e.g. age, gender, and location), the study explores the impacts of consumer heterogeneity on hydrogen acceptance by recruiting respondents from across five distinct groups: (1) fuel poor householders, (2) technology engaged householders, (3) environmentally engaged householders, (4) technology and environmentally engaged householders, and (5) a baseline group (n=~700) which filters out each of the smaller targeted groups (n=~350). This research design reflects the notion that supporting a socially fair and efficient transition to hydrogen will require parallel engagement with potential early adopters and demographic groups impacted by fuel poverty while also accounting strongly for public attitudes towards net zero. Employing a second-order multigroup confirmatory factor analysis (CFA) in Mplus, the proposed hydrogen acceptance model is tested to fit the data through a partial least squares (PLS) approach. In addition to testing differences between and within groups, the findings provide policymakers with critical insights regarding the significance of knowledge and awareness, safety perceptions, perceived community impacts, cost factors, and trust in key actors and stakeholders as potential explanatory factors of hydrogen acceptance. Preliminary results suggest that knowledge and awareness of hydrogen are positively associated with support for domestic hydrogen at the household, community, and national levels. However, with the exception of technology and/or environmentally engaged citizens, much of the population remains unfamiliar with hydrogen and somewhat skeptical of its application in homes. Knowledge and awareness present as critical to facilitating positive safety perceptions, alongside higher levels of trust and more favorable expectations for community benefits, appliance performance, and potential cost savings. Based on these preliminary findings, policymakers should be put on red alert about diffusing hydrogen into the public consciousness in alignment with energy security, fuel poverty, and net-zero agendas.

Keywords: hydrogen homes, social acceptance, consumer heterogeneity, heat decarbonization

Procedia PDF Downloads 107
4156 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 137
4155 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 141
4154 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 252
4153 Error Analysis of Students’ Freewriting: A Study of Adult English Learners’ Errors

Authors: Louella Nicole Gamao

Abstract:

Writing in English is accounted as a complex skill and process for foreign language learners who commit errors in writing are found as an inevitable part of language learners' writing. This study aims to explore and analyze the learners of English-as-a foreign Language (EFL) freewriting in a University in Taiwan by identifying the category of mistakes that often appear in their freewriting activity and analyzing the learners' awareness of each error. Hopefully, this present study will be able to gain further information about students' errors in their English writing that may contribute to further understanding of the benefits of freewriting activity that can be used for future purposes as a powerful tool in English writing courses for EFL classes. The present study adopted the framework of error analysis proposed by Dulay, Burt, and Krashen (1982), which consisted of a compilation of data, identification of errors, classification of error types, calculation of frequency of each error, and error interpretation. Survey questionnaires regarding students' awareness of errors were also analyzed and discussed. Using quantitative and qualitative approaches, this study provides a detailed description of the errors found in the students'freewriting output, explores the similarities and differences of the students' errors in both academic writing and freewriting, and lastly, analyzes the students' perception of their errors.

Keywords: error, EFL, freewriting, taiwan, english

Procedia PDF Downloads 102
4152 Epidemiology, Knowledge, Attitude, and Practices among Patients of Stroke

Authors: Vijay nandmer, Ajay Nandmer

Abstract:

Stigmatized psycho-social perception poses a serious challenge and source of discrimination which impedes stroke patients from attaining a satisfactory quality of life. The present study was aimed to obtain information on knowledge, attitudes and practices (KAP) of stroke patients in the institute. We included 1000 people in our random sampling survey. Demographic details and responses to a questionnaire assessing the knowledge, attitude and practices were recorded. Although the majority of the patients belonged to low socioeconomic strata, the literacy rate was reasonably high (96.3%). A large majority (91.3%) of people had heard about stroke and (85.2%) knew that stroke can be treated with modern drugs. However, a negative attitude was reflected in the belief that stroke happens due to supernatural powers (hawa lagne se) (50.6%). Analysis of the data revealed regional differences in KAP which could be attributed to local Factors, such as literacy, awareness about stroke, and practice of different systems of medicine. Some of the differences can also be attributed to a category of study population whether it included patients or non-stroke individuals since the former are likely to have less negative attitudes than the public. There is a need to create awareness about stroke on a nation-wide basis to dispel the misconceptions and stigma through effective and robust programs with the aim to lessen the disease burden.

Keywords: epidemiology, sroke, literacy, stroke

Procedia PDF Downloads 383
4151 Identifying the Level of Awareness on Value Management Practice amongst Construction Practitioners in Nigeria

Authors: Alhassan Dahiru

Abstract:

Value management is widely accepted technique of eliminating unnecessary cost at different stages of project development that maximizes the functional value of a project by managing its evolution and development from concept to completion. Many construction industry practitioners are not aware of Value Management practice, and its use is less widespread in Nigeria. The aim of this research is to identify the level of awareness on value management practice amongst construction practitioners with a view to contribute to the improvement of the implementation of value management practice in the Nigerian construction industry. In this study, construction practitioners have been chosen as respondents from the 6 geopolitical zones of the federation including FCT Abuja. Through the survey, a total number of 360 semi-structured questionnaires were administered and 284 were returned and remained good for the analysis. The results indicate that most of the respondents were aware of the value management concept and issues surrounding construction industry in Nigeria, while about 32% of the respondents were not aware of its potential benefits. Therefore, organisations should review their techniques and processes from time to time for improvement on effective service delivery. Additionally, a change management strategy should also be part of every organization to ease the introduction of new techniques such as value management. There is also the need for more value management training workshops and seminars in order to enlighten the participants of the construction industry on the principles, concept, and techniques involved in the value management process.

Keywords: sustainability, value management, construction practitioners, Nigeria

Procedia PDF Downloads 222
4150 Examining K-12 In-Service Teachers’ Comfort Level with the Social Model of Disability and Its Impact on Inclusive Measures in the Classroom

Authors: Frederic Fovet

Abstract:

Inclusive provisions have been statutorily mandated in North America for now over two decades. Despite a growing body of literature around inclusive practices, many in-service teachers continue to express difficulties when it comes to tangible implementation of inclusion in the everyday classroom. While there is debate around the various forms inclusion can take (UDL, differentiation, personalization, etc.), there appears to be a more significant hurdle in getting in-service teachers to fully embrace inclusion both as a goal and a practice. This paper investigates teachers’ degree of awareness around the Social Model of Disability. It argues that teachers often lack basic awareness of disability studies, more particularly of the Social Model of Disability, and that this has a direct impact on their capacity to conceptualize and embrace inclusion. The paper draws from the researcher’s experience as a graduate instructor with in-service teachers, as well as from his experience as a consultant working with schools and school boards. The methodology chosen here is phenomenology, and it draws on tools such as auto-ethnography. The paper opens a discussion around the reform and transformation of pre-service teacher training. It argues that disability studies should be integrated into teacher training as it plays a key role in having teachers develop a theoretical understanding of disability as a social construct.

Keywords: disability, K-12, inclusion, social model, in-service teachers

Procedia PDF Downloads 182
4149 The Effects of High-frequency rTMS Targeting the Mirror Neurons on Improving Social Awareness in ASD, the Preliminary Analysis of a Pilot Study

Authors: Mitra Assadi, Md. Faan

Abstract:

Background: Autism Spectrum Disorder (ASD) in a common neurodevelopmental disorder with limited pharmacological interventions. Transcranial Magnetic Stimulation (rTMS) has produced promising results in ASD, although there is no consensus regarding optimal targets or stimulation paradigms. A prevailing theory in ASD attributes the core deficits to dysfunction of the mirror neurons located in the inferior parietal lobule (IPL) and inferior frontal gyrus (IFG). Methods: Thus far, 11 subjects with ASD, 10 boys and 1 girl with the mean age of 13.36 years have completed the study by receiving 10 session of high frequency rTMS to the IPL. The subjects were randomized to receive stimulation on the left or right IPL and sham stimulation to the opposite side. The outcome measures included the Social Responsiveness Scale – Second Edition (SRS-2) and Delis-Kaplan Executive Function System (D-KEFS) Verbal Fluency task. Results: None of the 11 subjects experienced any adverse effects. The rTMS did not produce any improvement in verbal fluency, nor there was any statistically significant difference between the right versus left sided stimulation. Analysis of social awareness on SRS-2 (SRS-AWR) indicated a close to significant effect of the treatment with a small to medium effect size. After removing a single subject with Level 3 ASD, we demonstrated a close to significant improvement on SRS-AWR with a large effect size. The analysis of the data 3-month post TMS demonstrated return of the SRS-AWR values to baseline. Conclusion: This preliminary analysis of the 11 subjects who have completed our study thus far shows a favorable response to high frequency rTMS stimulation of the mirror neurons/IPL on social awareness. While the decay of the response noted during the 3-month follow-up may be considered a limitation of rTMS, the presence of the improvement, especially the effect size despite the small sample size, is indicative of the efficacy of this technique.

Keywords: rTMS, autism, scoial cognition, mirror neurons

Procedia PDF Downloads 61
4148 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 292
4147 Occupational Safety Need Analysis for Turkey and Europe

Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci

Abstract:

This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.

Keywords: Europe, need analysis, occupational safety, Turkey, vocational education

Procedia PDF Downloads 427
4146 'It Is a Sin to Be in Love with a Disabled Woman': Stigma, Rejection and Intersections of Womanhood and Violence among Physically Disabled Women Living in South Africa

Authors: Ingrid Van Der Heijden, Naeemah Abrahams, Jane Harries

Abstract:

Background: Commonly, womanhood is defined as the qualities considered to be natural to or characteristic of a woman. However, womanhood is not a static concept; it is contextual and negotiable. For women with disabilities, gender roles or ‘qualities’ of womanhood are often overstated or contradicted because of assumptions of weakness, passivity, asexuality and infertility. Currently, little is known about how disability stigma intersects with notions of womanhood to make women with disabilities vulnerable to violence, or how women navigate this intersection to prevent or protect themselves from violence. Objective: To describe how the stigmatized constructions of womanhood and disability promote women with physical disabilities’ exposure to or protection from violence. Methods: Qualitative data for this paper comes from a doctoral study involving women with disabilities living in Cape Town, South Africa. It presents data from repeat in-depth interviews with 30 women with a range of physical impairments. Women attending protective workshops, rehabilitative centers and residential care facilities for people living with disabilities were invited to participate. Consent procedures and interviews were conducted by the first author (who is herself a woman living with a physical disability), and a female research assistant/translator who is a qualified occupational therapist. Reasonable accommodation is central to the methodology and the study as a whole. Findings: Descriptive and thematic analyses reveal how stigma and local constructions around womanhood, as well as women’s self-image and physical limitations, promotes women’s exposure to psychological, physical and sexual violence. It reveals how disabled women feel they are presumed incapable of living up to expectations of a ‘proper’ woman. This plays out as psychological violence, with women reporting that they feel ‘devalued,' ‘rejected’ and deprived of lasting intimate relationships. Furthermore, forms of psychological violence perpetuate physical and sexual violence. Women also discuss using strategies to prevent violence; by refusing to date, avoiding certain places or avoiding isolation, creating awareness, hiding their physical impairments, and exaggerating their ‘femininity.' Implications: Service providers need to be made aware of women’s violence experiences, and provide a range of accessible psychological and mental health services to women living with disabilities, as well as raising awareness around disability, and violence prevention, among caregivers, men, and women. Violence awareness and prevention interventions need to involve disability experts, researchers and people with disabilities.

Keywords: disability, gender, stigma, violence awareness and prevention interventions

Procedia PDF Downloads 347
4145 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: attack modelling, crime commission process, crime script, situational crime prevention

Procedia PDF Downloads 123
4144 Biodiversity of the National Production through Companion Plants Analysis

Authors: Astrid Rivera, Diego Villatoro

Abstract:

The world population increases at an accelerated pace, and it is essential to find solutions to feed the population. Nevertheless, crop diversity has significantly decreased in the last years, and the increase in food production is not the optimal solution. It is essential to consider the origin of the food, the nutriment contributions, among other dimensions. In this regard, biodiversity plays an indispensable role when designing an effective strategy to face the actual food security problems. Consequently, the purpose of this work is to analyze biodiversity in the Mexican national food production and suggest a proper crop selection based on companion plants, for which empirical and experimental knowledge shows a better scenery than current efforts. As a result, we get a set of crop recommendations to increase production in sustainable and nutritive planning. It is essential to explore more feasible options to advance sustainable development goals beyond an economic aspect.

Keywords: biodiversity, food security, companion plats, nutrition

Procedia PDF Downloads 195
4143 Sustainable Electricity Generation Mix for Kenya from 2015 to 2035

Authors: Alex Maina, Mwenda Makathimo, Adwek George, Charles Opiyo

Abstract:

This research entails the simulation of three possible power scenarios for Kenya from 2015 to 2035 using the Low Emissions Analysis Platform (LEAP). These scenarios represent the unfolding future electricity generation that will fully satisfy the demand while considering the following: energy security, power generation cost and impacts on the environment. These scenarios are Reference Scenario (RS), Nuclear Scenario (NS) and More Renewable Scenario (MRS). The findings obtained reveals that the most sustainable scenario while comparing the costs was found to be the coal scenario with a Net Present Value (NPV) of $30,052.67 million though it has the highest Green House Gases (GHGs) emissions. However, the More Renewable Scenario (MRS) had the least GHGs emissions but was found to be a most expensive scenario to implement with an NPV of $30,733.07 million.

Keywords: energy security, Kenya, low emissions analysis platform, net-present value, greenhouse gases

Procedia PDF Downloads 87
4142 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 263
4141 Thai Perception on Litecoin Value

Authors: Toby Gibbs, Suwaree Yordchim

Abstract:

This research analyzes factors affecting the success of Litecoin Value within Thailand and develops a guideline for self-reliance for effective business implementation. Samples in this study included 119 people through surveys. The results revealed four main factors affecting the success as follows: 1) Future Career training should be pursued in applied Litecoin development. 2) Didn't grasp the concept of a digital currency or see the benefit of a digital currency. 3) There is a great need to educate the next generation of learners on the benefits of Litecoin within the community. 4) A great majority didn't know what Litecoin was. The guideline for self-reliance planning consisted of 4 aspects: 1) Development planning: by arranging meet up groups to conduct further education on Litecoin and share solutions on adoption into every day usage. Local communities need to develop awareness of the usefulness of Litecoin and share the value of Litecoin among friends and family. 2) Computer Science and Business Management staff should develop skills to expand on the benefits of Litecoin within their departments. 3) Further research should be pursued on how Litecoin Value can improve business and tourism within Thailand. 4) Local communities should focus on developing Litecoin awareness by encouraging street vendors to accept Litecoin as another form of payment for services rendered.

Keywords: litecoin, mining, confirmations, payment method

Procedia PDF Downloads 179
4140 The Effectiveness of a Six-Week Yoga Intervention on Body Awareness, Warnings of Relapse, and Emotion Regulation among Incarcerated Females

Authors: James Beauchemin

Abstract:

Introduction: The incarceration of people with mental illness and substance use disorders is a major public health issue, with social, clinical, and economic implications. Yoga participation has been associated with numerous psychological benefits; however, there is a paucity of research examining impacts of yoga with incarcerated populations. The purpose of this study was to evaluate effectiveness of a six-week yoga intervention on several mental health-related variables, including emotion regulation, body awareness, and warnings of substance relapse among incarcerated females. Methods: This study utilized a pre-post, three-arm design, with participants assigned to intervention, therapeutic community, or general population groups. A between-groups analysis of covariance (ANCOVA) was conducted across groups to assess intervention effectiveness using the Difficulties in Emotion Regulation Scale (DERS), Scale of Body Connection (SBC), and Warnings of Relapse (AWARE) Questionnaire. Results: ANCOVA results for warnings of relapse (AWARE) revealed significant between-group differences F(2, 80) = 7.15, p = .001; np2 = .152), with significant pairwise comparisons between the intervention group and both the therapeutic community (p = .001) and the general population (p = .005) groups. Similarly, significant differences were found for emotional regulation (DERS) F(2, 83) = 10.521, p = .000; np2 = .278). Pairwise comparisons indicated a significant difference between the intervention and general population (p = .01). Finally, significant differences between the intervention and control groups were found for body awareness (SBC) F(2, 84) = 3.69, p = .029; np2 = .081). Between-group differences were clarified via pairwise comparisons, indicating significant differences between the intervention group and both the therapeutic community (p = .028) and general population groups (p = .020). Implications: Study results suggest that yoga may be an effective addition to integrative mental health and substance use treatment for incarcerated women, and contributes to increasing evidence that holistic interventions may be an important component for treatment with this population. Specifically, given the prevalence of mental health and substance use disorders, findings revealed that changes in body awareness and emotion regulation may be particularly beneficial for incarcerated populations with substance use challenges as a result of yoga participation. From a systemic perspective, this proactive approach may have long-term implications for both physical and psychological well-being for the incarcerated population as a whole, thereby decreasing the need for traditional treatment. By integrating a more holistic, salutogenic model that emphasizes prevention, interventions like yoga may work to improve the wellness of this population, while providing an alternative or complementary treatment option for those with current symptoms.

Keywords: yoga, mental health, incarceration, wellness

Procedia PDF Downloads 135
4139 Analysis of Improved Household Solid Waste Management System in Minna Metropolis, Niger State, Nigeria

Authors: M. A. Ojo, E. O. Ogbole, A. O. Ojo

Abstract:

This study analysed improved household solid waste management system in Minna metropolis, Niger state. Multi-staged sampling technique was used to administer 155 questionnaires to respondents, where Minna was divided into two income groups A and B based on the quality of the respondent’s houses. Primary data was collected with the aid of structured questionnaires and analysed using descriptive statistics to obtain results for the socioeconomic characteristics of respondents, types of waste generated and methods of disposing solid waste, the level of awareness and reliability of waste disposal methods as well as the willingness of households to pay for solid waste management in the area. The results revealed that majority of the household heads in the study area were male, 94.20% of the household heads fell between the ages of 21 and 50 and also that 96.80% of them had one form of formal education or the other. The results also revealed that 47.10% and 43.20% of the households generated food wastes and polymers respectively as a major constituent of waste disposed. The results of this study went further to reveal that 81.90% of the household heads were aware of the use of collection cans as a method of waste disposal while only 32.90% of them considered the method highly reliable. Multiple regression was used to determine the factors affecting the willingness of households to pay for waste disposal in the study area. The results showed that 76.10% of the respondents were willing to pay for solid waste management which indicates that households in Minna are concerned and willing to cater for their immediate environment. The multiple regression results revealed that age, income, environmental awareness and household expenditure have a positive and statistically significant relationship with the willingness of households to pay for waste disposal in the area while household size has a negative and statistically significant relationship with households’ willingness to pay. Based on these findings, it was recommended that more waste management services be made readily available to residents of Minna, waste collection service should be privatised to increase their effectiveness through increased competition and also that community participatory approach be used to create more environmental awareness amongst residents.

Keywords: household, solid waste, management, WTP

Procedia PDF Downloads 294
4138 Towards A New Maturity Model for Information System

Authors: Ossama Matrane

Abstract:

Information System has become a strategic lever for enterprises. It contributes effectively to align business processes on strategies of enterprises. It is regarded as an increase in productivity and effectiveness. So, many organizations are currently involved in implementing sustainable Information System. And, a large number of studies have been conducted the last decade in order to define the success factors of information system. Thus, many studies on maturity model have been carried out. Some of this study is referred to the maturity model of Information System. In this article, we report on development of maturity models specifically designed for information system. This model is built based on three components derived from Maturity Model for Information Security Management, OPM3 for Project Management Maturity Model and processes of COBIT for IT governance. Thus, our proposed model defines three maturity stages for corporate a strong Information System to support objectives of organizations. It provides a very practical structure with which to assess and improve Information System Implementation.

Keywords: information system, maturity models, information security management, OPM3, IT governance

Procedia PDF Downloads 437
4137 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 113
4136 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 378
4135 Climate Smart Agriculture: Nano Technology in Solar Drying

Authors: Figen Kadirgan, M. A. Neset Kadirgan, Gokcen A. Ciftcioglu

Abstract:

Addressing food security and climate change challenges have to be done in an integrated manner. To increase food production and to reduce emissions intensity, thus contributing to mitigate climate change, food systems have to be more efficient in the use of resources. To ensure food security and adapt to climate change they have to become more resilient. The changes required in agricultural and food systems will require the creation of supporting institutions and enterprises to provide services and inputs to smallholders, fishermen and pastoralists, and transform and commercialize their production more efficiently. Thus there is continously growing need to switch to green economy where simultaneously causes reduction in carbon emissions and pollution, enhances energy and resource-use efficiency; and prevents the loss of biodiversity and ecosystem services. Smart Agriculture takes into account the four dimensions of food security, availability, accessibility, utilization, and stability. It is well known that, the increase in world population will strengthen the population-food imbalance. The emphasis on reduction of food losses makes a point on production, on farmers, on increasing productivity and income ensuring food security. Where also small farmers enhance their income and stabilize their budget. The use of solar drying for agricultural, marine or meat products is very important for preservation. Traditional sun drying is a relatively slow process where poor food quality is seen due to an infestation of insects, enzymatic reactions, microorganism growth and micotoxin development. In contrast, solar drying has a sound solution to all these negative effects of natural drying and artificial mechanical drying. The technical directions in the development of solar drying systems for agricultural products are compact collector design with high efficiency and low cost. In this study, using solar selective surface produced in Selektif Teknoloji Co. Inc. Ltd., solar dryers with high efficiency will be developed and a feasibility study will be realized.

Keywords: energy, renewable energy, solar collector, solar drying

Procedia PDF Downloads 221
4134 Digital Preservation Policies in the Institutional Repositories of Brazilian Federal Universities

Authors: Laerte Pereira da Silva Júnior, Maria Manuel Borges

Abstract:

Institutional Repositories (IR) are complex constructs that depend on political, cultural and technological aspects. Because IRs are a mirror of the organization's intellectual production, their main function is to make that production available worldwide, and also to consider its long term preservation. To this end, there is a need to define clearly the digital preservation policies supported by political decisions. There are several guidelines about the definition of digital preservation policies focusing in different themes from preservation planning to rights and restriction management, sustainability planning, etc., but this work aims to verify the implementation of digital preservation policies on the Institutional Repositories of the Federal Universities of Brazil. The methodology used was to check the information available on the websites of the IRs selected against two fields of the OpenDOAR, policies and OpenDOAR ID, to verify the existence of digital preservation policies. For this purpose a sample of the 21 of the 25 IRs registered at the Directory of Open Access Repositories (DOAR) was used, which is about 1/3 rd of the total of the brazilian universities. The 4 IRs that presented no information by the OpenDOAR team were desconsidered. The main conclusion is that most of the IRs of these universities have no polices clearly stated or no policies at all, and that there is a need to include these concerns at the top level management of IRs. The number of initiatives in digital preservation policies around the world stress the need of awareness of its importance in Brazil and requires measures to raise this awareness.

Keywords: Brazil, digital preservation policies, institutional repositories, openDOAR

Procedia PDF Downloads 529
4133 Integrated Farming Barns as a Strategy for National Food Security

Authors: Ilma Ulfatul Janah, Ibnu Rizky Briwantara, Muhammad Afif

Abstract:

The agricultural sector is one of the sectors that contribute to national development. The benefit of the agricultural sector can be felt directly by the majority of Indonesian people. Indonesia is one of the agricultural countries and most of the people working in the agricultural sector. Hence, the agricultural sector’s become the second sector which has contributed greatly to the growth of Gross Domestic Product (GDP) after the manufacture sector. Based on the National Medium Term Development Plan (RPJMN) from 2015 to 2019, one of the targets to be achieved by the Indonesian government is rice’s self-sufficient. Rice is the main food commodities which as most people in Indonesia, and it is making Indonesian government attempt self-sufficient in rice. Indonesia as an agricultural country becomes one of the countries that have a lower percentage of food security than other ASEAN countries. Rice self-sufficiency can be created through agricultural productivity and the availability of a market for the output. There are some problems still to be faced by the farmers such as farmer exchange rate is low. The low exchange rate of farmers showed that the level of the welfare’s Indonesian farmers is still low. The aims of this paper are to resolve problems related to food security and improve the welfare of the national rice farmers. The method by using materials obtained from the analysis of secondary data with the descriptive approach and conceptual framework. Integrated Farmers barn raising rice production is integrated and managed by the government coupled with the implementation of technology in the form of systems connected and accessible to farmers, namely 'SIBUNGTAN'.

Keywords: agriculture, self-sufficiency, technology, productivity

Procedia PDF Downloads 243
4132 Identifying the Phases of Indian Agriculture Towards Desertification: An Introspect of Karnataka State, India

Authors: Arun Das

Abstract:

Indian agriculture is acclaimed from the dates of Indus civilization (2500 BC). Since this time until the day, there were tremendous expansion in terms of space and technology has taken place. Abrupt growth in technology took place past one and half century. Consequent to this development, the land which was brought under agriculture in the initial stages of introducing agriculture for the first time, that land is not possessing the same physical condition. Either it has lost the productive capacity or modified into semi agriculture land. On the grounds of its capacity and interwoven characteristics seven phases of agriculture scenario has been identified. Most of the land is on the march of desertification. Identifying the stages and the phase of the agriculture scenario is most relevant from the point of view of food security at regional, national and at global level. Secondly decisive measure can put back the degenerating environmental condition into arrest. GIS and Remote sensing applications have been used to identify the phases of agriculture.

Keywords: agriculture phases, desertification, deforestation, foods security, transmigration

Procedia PDF Downloads 425