Search results for: cyber security education
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9771

Search results for: cyber security education

8481 Multimedia Technologies Utilisation as Predictors of Lecturers’ Teaching Effectiveness in Colleges of Education in South-West, Nigeria

Authors: Abel Olusegun Egunjobi, Olusegun Oyeleye Adesanya

Abstract:

Teaching effectiveness of lecturers in a tertiary institution in Nigeria is one of the determinants of the lecturer’s productivity. In this study, therefore, lecturers’ teaching effectiveness was examined vis-à-vis their multimedia technologies utilisation in Colleges of Education (CoE) in South-West, Nigeria. This is for the purpose of ascertaining the relationship and contribution of multimedia technologies utilisation to lecturers’ teaching effectiveness in Nigerian colleges of education. The descriptive survey research design was adopted in the study, while a multi-stage sampling procedure was used in the study. A stratified sampling technique was used to select colleges of education, and a simple random sampling method was employed to select lecturers from the selected colleges of education. A total of 862 lecturers (627 males and 235 females) were selected from the colleges of education used for the study. The instrument used was lecturers’ questionnaire on multimedia technologies utilisation and teaching effectiveness with a reliability coefficient of 0.85 at 0.05 level of significance. The data collected were analysed using descriptive statistics, multiple regression, and t-test. The findings showed that the level of multimedia technologies utilisation in colleges of education was low, whereas lecturers’ teaching effectiveness was high. Findings also revealed that the lecturers used multimedia technologies purposely for personal and professional developments, so also for up to date news on economic and political matters. Also, findings indicated that laptop, Ipad, CD-ROMs, and computer instructional software were the multimedia technologies frequently utilised by the lecturers. There was also a significant difference in the teaching effectiveness between lecturers in the Federal and State COE. The government should, therefore, make adequate provision for multimedia technologies in the COE in Nigeria for lecturers’ utilisation in their instructions so as to boost their students’ learning outcomes.

Keywords: colleges of education, lecturers’ teaching effectiveness, multimedia technologies utilisation, Southwest Nigeria

Procedia PDF Downloads 127
8480 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia

Authors: Saleh Dabil

Abstract:

This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: (1) the supermarket profile (volume, location, standard and type of the store), (2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), (3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first is ‘the well distributing of the duties and responsibilities between the employees especially for security purposes’. Second is ‘installation of strong security system’ and ‘making well-designed store layout’. Third is ‘giving training for general employees’ and ‘to give periodically security skills training of employees’. There are other suggestions in the study can be looked up in the text.

Keywords: organized crime, retail, theft, loss prevention, store environment

Procedia PDF Downloads 183
8479 A Medical Vulnerability Scoring System Incorporating Health and Data Sensitivity Metrics

Authors: Nadir A. Carreon, Christa Sonderer, Aakarsh Rao, Roman Lysecky

Abstract:

With the advent of complex software and increased connectivity, the security of life-critical medical devices is becoming an increasing concern, particularly with their direct impact on human safety. Security is essential, but it is impossible to develop completely secure and impenetrable systems at design time. Therefore, it is important to assess the potential impact on the security and safety of exploiting a vulnerability in such critical medical systems. The common vulnerability scoring system (CVSS) calculates the severity of exploitable vulnerabilities. However, for medical devices it does not consider the unique challenges of impacts to human health and privacy. Thus, the scoring of a medical device on which human life depends (e.g., pacemakers, insulin pumps) can score very low, while a system on which human life does not depend (e.g., hospital archiving systems) might score very high. In this paper, we propose a medical vulnerability scoring system (MVSS) that extends CVSS to address the health and privacy concerns of medical devices. We propose incorporating two new parameters, namely health impact, and sensitivity impact. Sensitivity refers to the type of information that can be stolen from the device, and health represents the impact on the safety of the patient if the vulnerability is exploited (e.g., potential harm, life-threatening). We evaluate fifteen different known vulnerabilities in medical devices and compare MVSS against two state-of-the-art medical device-oriented vulnerability scoring systems and the foundational CVSS.

Keywords: common vulnerability system, medical devices, medical device security, vulnerabilities

Procedia PDF Downloads 154
8478 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 387
8477 Internationalization and Management of Linguistic Diversity In Multilingual Higher Education Institutions: Lecturers’ Experience From Three Universities in Europe

Authors: Argyro Maria Skourmalla

Abstract:

Internationalization and management of linguistic diversity in Higher Education (HE) have gained much attention in research in the last few years. Internationalization policies in HE aims at promoting the dual role of Higher Education Institutions (HEIs), civilization and competitiveness. In the context of the European Union, the European Education Area initiative aims at “inclusive national education and training systems” through networking and exchange between HEIs. However, the use of English as a ‘lingua academica’ in the place of the official, national, and regional/minority languages raises questions regarding linguistic diversity, linguistic rights and concerns that have to do with the scientific weakening of these languages. In fact, the European Civil Society Platform for Multilingualism, in the Declaration for Multilingualism in Higher Education, draws attention to the use of English at the expense of other regional/national languages and the impact of English-only language policy on an epistemological level. The above issues were brought up during semi-structured interviews with lecturing staff coming from three multilingual Universities in Europe. Lecturers shared their experiences and the practices they use to manage linguistic diversity in these three Universities. Findings show that even though different languages are used in teaching across disciplines, English -or ‘Globish’ as mentioned during an interview- is widely used in research. Despite English being accepted as the “lingua academica,” issues regarding loss of identity come up

Keywords: higher education, internationalization, linguistic diversity, teaching, research, English

Procedia PDF Downloads 72
8476 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 285
8475 Linking Museum Education with School Curriculum: Primary Education Case Study Grade 4

Authors: Marwa Hanafy

Abstract:

The objective of linking the museum with school curriculum is to focus on the values and principles of the educational standards of the fourth grade as "equality, cooperation, allegiance, belonging, participation, peace, tolerance, pride and patriotism, etc." through activities, discussion, exhibits, etc., which can help the students to develop their characters and be useful for their society. For example, there is a lesson in Module 3 assess the role of women as mothers and queens, here this research will focus on the value of women and respect them through statues or images of women which support and affect positively on the students who will apply these Morals to themselves and to the community by dependency. It cannot be denied that the students have to be a part of the museum educational programs which have designed for them, by giving them the opportunity to participate, talk, discuss and express their opinions and hear them in the museums, this may be an effective way to confirm that the interests of children are taken into account.

Keywords: museum education, primary school education, school curriculum, informal learning

Procedia PDF Downloads 131
8474 Transforming Integrative Maker Education for STEM Learning

Authors: Virginia Chambers, Kamryn York, Mark Marnich

Abstract:

T.I.M.E. for STEM (Transforming Integrative Maker Education for STEM learning) focuses on improving the quality and effectiveness of STEM education for pre-service teachers through a focus on the integration of maker space pedagogy. This National Science Foundation-funded project primarily focuses on undergraduate pre-service teaching students majoring in elementary education. The study contributes to the knowledge about teaching and learning by developing, implementing, and assessing faculty development, interactive instruction, and STEM lesson plan development. This project offers a valuable opportunity to improve STEM thinking skills by formally integrating STEM concepts throughout the pre-service teacher curriculum using an interdisciplinary approach. T.I.M.E. for STEM utilizes a maker space laboratory at Point Park University in Pittsburgh, PA, USA. However, the project design is such that other institutions of higher education can replicate the program with or without a physical maker space lab as the project’s findings and “maker mindset” are employed. Utilizing qualitative research methodology, the project investigates the following research question: What do pre-service teachers (education students) and faculty members identify as areas of pedagogical growth in STEM learning and teaching in a makerspace environment? This research highlights the impact of makerspace pedagogy on improving STEM education learning outcomes through an interdisciplinary constructivist approach. The project is expected to have a multiplier effect as it impacts STEM disciplinary and higher education faculty, pre-service teachers, and teacher preparation programs at other universities that benefit from what is learned at Point Park University. Ultimately, the future elementary students of the well-prepared pre-service teachers steeped in maker pedagogy and STEM content will have the potential to develop higher-level thinking skills and improve their mathematics and scientific achievement, which are essential for the 21st century STEM workforce.

Keywords: maker education, STEM learning, teacher education, elementary education

Procedia PDF Downloads 100
8473 Evaluating Global ‘Thing’ Security of Consumer Products

Authors: Achutha Raman

Abstract:

Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable.

Keywords: cybersecurity, FOTA, Internet of Things, transnational privacy

Procedia PDF Downloads 205
8472 Comparison of E-learning and Face-to-Face Learning Models Through the Early Design Stage in Architectural Design Education

Authors: Gülay Dalgıç, Gildis Tachir

Abstract:

Architectural design studios are ambiencein where architecture design is realized as a palpable product in architectural education. In the design studios that the architect candidate will use in the design processthe information, the methods of approaching the design problem, the solution proposals, etc., are set uptogetherwith the studio coordinators. The architectural design process, on the other hand, is complex and uncertain.Candidate architects work in a process that starts with abstre and ill-defined problems. This process starts with the generation of alternative solutions with the help of representation tools, continues with the selection of the appropriate/satisfactory solution from these alternatives, and then ends with the creation of an acceptable design/result product. In the studio ambience, many designs and thought relationships are evaluated, the most important step is the early design phase. In the early design phase, the first steps of converting the information are taken, and converted information is used in the constitution of the first design decisions. This phase, which positively affects the progress of the design process and constitution of the final product, is complex and fuzzy than the other phases of the design process. In this context, the aim of the study is to investigate the effects of face-to-face learning model and e-learning model on the early design phase. In the study, the early design phase was defined by literature research. The data of the defined early design phase criteria were obtained with the feedback graphics created for the architect candidates who performed e-learning in the first year of architectural education and continued their education with the face-to-face learning model. The findings of the data were analyzed with the common graphics program. It is thought that this research will contribute to the establishment of a contemporary architectural design education model by reflecting the evaluation of the data and results on architectural education.

Keywords: education modeling, architecture education, design education, design process

Procedia PDF Downloads 128
8471 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 108
8470 Analysis of Learning Difficulties among Preservice Students towards Science Education

Authors: Nahla Khatib

Abstract:

This study investigated several learning difficulties that affected the classroom learning experience of preservice students who are studying general science and methods of teaching science students at Faculty of Educational Studies at the Arab Open University (AOU) in Amman, Jordan. The focus questions for this study were to find answers for the following: 1. What are the main areas of learning difficulty among preservice students towards science education? 2. What are the main aspects of reducing obstacles towards success in science education? To achieve this goal, the researcher prepared a questionnaire which included 30 items to point out the learning difficulties among preservice students towards science education. The questionnaire was distributed among students enrolled in the general science courses 1&2 and methods of teaching science courses at the beginning of the spring semester of year (2013-2014). After collecting the filled questionnaire a descriptive statistical analysis was carried out (means and standard deviation) for the items of the questionnaire. After analyzing the data statistically our findings showed that student control–factors as well as course controlled factor, factors related to the nature of science, and factors related to the role of instructor affected student success toward science education. The study was concluded with a number of recommendations.

Keywords: nature of science, preservice teachers, science education, learning difficulties

Procedia PDF Downloads 342
8469 The Pedagogical Functions of Arts and Cultural-Heritage Education with ICTs in Museums – A Case Study of FINNA and Google Art

Authors: Pei Zhao, Sara Sintonen, Heikki Kynäslahti

Abstract:

Digital museums and arts galleries have become popular in museum education and management. Museum and arts galleries website is one of the most effective and efficient ways. Google, a corporation specializing in Internet-related services and projects, not only puts high-resolution arts images online, but also uses augmented-reality in digital art gallery. The Google Art Project, Google’s production, provides users a platform in appreciating and learning arts. After Google Art Project, more and more countries released their own museum and arts gallery websites, like British Paining in BBC, and FINNA in Finland. Pedagogical function in these websites is one of the most important functions. In this paper, we use Google Art Project and FINNA as the case studies to investigate what kinds of pedagogical functions exist in these websites. Finally, this paper will give the recommendation to digital museums and websites development, especially the pedagogical functions development, in the future.

Keywords: arts education, cultural-heritage education, education with ICTs, pedagogical functions

Procedia PDF Downloads 537
8468 Vocational Education: A Synergy for Skills Acquisition and Global Learning in Colleges of Education in Ogun State, Nigeria

Authors: Raimi, Kehinde Olawuyi, Omoare Ayodeji Motunrayo

Abstract:

In the last two decades, there has been rising youth unemployment, restiveness, and social vices in Nigeria. The relevance of Vocational Education for skills acquisition, global learning, and national development to address these problems cannot be underestimated. Thus, the need to economically empower Nigerian youths to be able to develop the nation and meet up in the ever-changing global learning and economy led to the assessment of Vocational Education as Synergy for the Skills Acquisition and Global Learning in Ogun State, Nigeria. One hundred and twenty out of 1,500 students were randomly selected for this study. Data were obtained through a questionnaire and were analyzed with descriptive statistics and Chi-square. The results of the study showed that 59.2% of the respondents were between 20 – 24 years of age, 60.8% were male, and 65.8% had a keen interest in Vocational Education. Also, 90% of the respondents acquired skills in extension/advisory, 78.3% acquired skills in poultry production, and 69.1% acquired skills in fisheries/aquaculture. The major constraints to Vocational Education are inadequate resource personnel (χ² = 10.25, p = 0.02), inadequate training facilities (x̅ = 2.46) and unstable power supply (x̅ = 2.38). Results of Chi-square showed significance association between constraints and Skills Acquisition (χ² = 12.54, p = 0.00) at p < 0.05 level of significance. It was established that Vocational Education significantly contributed to students’ skills acquisition and global learning. This study, therefore, recommends that inadequate personnel should be looked into by the school authority in order not to over-stretch the available staff of the institution while the provision of alternative stable power supply (solar power) is also essential for effective teaching and learning process.

Keywords: vocational education, skills acquisition, national development, global learning

Procedia PDF Downloads 117
8467 Reformed Curricula for the Religious Educational Institutions in Pakistan and the Muslim World

Authors: Hafiz Khubaib Ur Rehman Awan

Abstract:

Education used to play a central role in the formation and transfiguration of society since early times, owing in part to the centrality of scripture and its study in the human circles. According to the Islamic purpose of education, its pivotal contribution in the society is to produce a balanced growth of the entire persona of an individual through training the spirit, intellect, rational self, feelings, and bodily senses such that faith is infused into the whole personality. The purpose of this study is to attempt the exploration of the development of the Islamic religious curriculum in the Islamic world with an emphasis on Pakistan because this homeland came into existence under the name of Islam. This study persists of necessary historical background on the curricular reform of religious education in Pakistan and their impact on it and the suburban countries. However, the mainstay of this paper bases on reform in the religious education curriculum and the challenges faced by Pakistan and the Islamic world. Some suggestions are positioned at the end for areas of Islamic religious education and the improvement of Islamic curricular reform, especially in Pakistan and generally in Muslim countries.

Keywords: curricula, religious educational institutions, Pakistan, Muslim world, educational, religious , curricula

Procedia PDF Downloads 126
8466 The Techno-Pedagogical Pivot: Designing and Implementing a Digital Writing Tool

Authors: Justin D. Olmanson, Katrina S. Kennett, Bill Cope

Abstract:

In the field of education technology, innovation is often tightly coupled to recent technological inventions and emerging technologies. Despite this, some scholars have argued that using established technologies in new pedagogical or curricular ways recasts them and places them once more under the umbrella of emerging education technologies. In this study, we trace how an innovative education technology design emerged, not from a technological breakthrough, but rather via a techno-pedagogical pivot. We describe the design and impact of a digital writing tool created to scaffold student self-evaluation of academic texts. We theorize about and trace how innovation can also emerge from a pivot, namely how leveraging existing practices in new ways can create pedagogically and experientially innovative learning opportunities. After describing the design of Info Writer, we unpack the results of a study based on an implementation the tool, and then theorize and reflect on the way the design process and study findings suggest that pivoting an existing practice can lead to innovative education technology designs.

Keywords: design, education, revision, technology, writing

Procedia PDF Downloads 450
8465 Free Secondary Education in Tanzania: Prospects, Challenges, and Proposals

Authors: Yazidu Saidi Mbalamula

Abstract:

Free Basic Education (FBE) policy implementation in Secondary Schools has been one of thrilled undertaking both to the government and household in Tanzania. On the one hand, the government has achieved citizenry acceptance to responsibility and accountability, and on the other hand, the household has been relieved from social costs that were unbearable and deprived many Tanzanians access to basic education and secondary education in particular. Specifically, this study presents a descriptive survey conducted in two districts of Kagera region located at the northern part of Tanzania. Three objectives were pursued to identify achievements realized and challenges in the FBE implementation, and also stakeholders’ proposals were explored on how to improve FBE implementation. A sample of 91 respondents, including school managers, teachers, students, and parents, were involved in the study. Both questionnaires and interviews were used whereby the quantitative data were analyzed using Statistical Package for Social Sciences (SPSS), and content analysis was used to analyze the qualitative data. The results show that implementation of free education policy in secondary schools had far positive impact on the improvement of school management, school attendance, reduced school drop-out, reduced parents-school managers conflicts, and increased enrollment rates. Notwithstanding that, the political machinery remains instrumental to instigate policy reforms in education sector. Nevertheless, the alienating interests of politibureau, often top-down and blanketed by superficial government redness, can hardly be feasible to wield such huge programme given staggering stakeholders’ awareness of the actual requirements and unlatching resources to back up policy implementation. The study recommends that further studies on stakeholders’ conceptions on the FBE and equity of financing of basic education in Tanzania.

Keywords: capitation grant, CCM, free basic education, kagera, education policy

Procedia PDF Downloads 61
8464 Threat of Islamic State of Khorasan in Pakistan and Afghanistan Region: Impact on Regional Security

Authors: Irfan U. Din

Abstract:

The growing presence and operational capacity of Islamic State aka Daesh, which emerged in Pak-Afghan region in 2015, poses a serious threat to the already fragile state of the security situation in the region. This paper will shed light on the current state of IS-K network in the Pak-Afghan region and will explain how its presence and operational capacity in the northern and central Afghanistan has increased despite intensive military operations against the group in Nangarhar province – the stronghold of IS-K. It will also explore the role of Pakistani Taliban in the emergence and expansion of IS-K in the region and will unveil the security implication of growing nexus of IS-K and transnational organized groups for the region in Post NATO withdrawal scenario. The study will be qualitative and will rely on secondary and primary data to explore the topic. For secondary data existing literature on the topic will be extensively reviewed while for primary data in-depth interviews will be conducted with subject experts, Taliban commanders, and field researchers.

Keywords: Islamic State of Khorasan (IS-K), North Atlantic Treaty Organization (NATO), Pak-Afghan Region, Transnational Organized Crime (TNOC)

Procedia PDF Downloads 283
8463 Conscious Capitalism, Conscious Leadership, and Contemplative Management Education: Exploring Pedagogical Implications

Authors: Charlie Yang

Abstract:

The idea that business practitioners urgently need a more holistic and humanistic philosophy about the free market economy has gained some attraction among business practitioners and business professors. Those who have endorsed “conscious capitalism” as an emerging business philosophy also contended that business education should be grounded in a more positive understanding of capitalism, which enables future business leaders to have a greater impact on the world. This study is designed to critically examine the theoretical foundations of conscious capitalism and its practical and pedagogical possibilities as an emerging business movement. Based on the analysis of qualitative data collected through reflective essays written by business students, I will discuss the pedagogical and practical implications for developing conscious leadership in the context of more transformative and contemplative management education.

Keywords: conscious capitalism, conscious leadership, contemplative management education, contemplative pedagogy

Procedia PDF Downloads 60
8462 Neuropsychological Testing in a Multi-Lingual Society: Normative Data for South African Adults in More Than Eight Languages

Authors: Sharon Truter, Ann B. Shuttleworth-Edwards

Abstract:

South Africa is a developing country with significant diversity in languages spoken and quality of education available, creating challenges for fair and accurate neuropsychological assessments when most available neuropsychological tests are obtained from English-speaking developed countries. The aim of this research was to compare normative data on a spectrum of commonly used neuropsychological tests for English- and Afrikaans-speaking South Africans with relatively high quality of education and South Africans with relatively low quality of education who speak Afrikaans, Sesotho, Setswana, Sepedi, Tsonga, Venda, Xhosa or Zulu. The participants were all healthy adults aged 18-60 years, with 8-12 years of education. All the participants were tested in their first language on the following tests: two non-verbal tests (Rey Osterrieth Complex Figure Test and Bell Cancellation Test), four verbal fluency tests (category, phonemic, verb and 'any words'), one verbal learning test (Rey Auditory Verbal Leaning Test) and three tests that have a verbal component (Trail Making Test A & B; Symbol Digit Modalities Test and Digit Span). Descriptive comparisons of mean scores and standard deviations across the language groups and between the groups with relatively high versus low quality of education highlight the importance of using normative data that takes into account language and quality of education.

Keywords: cross-cultural, language, multi-lingual, neuropsychological testing, quality of education

Procedia PDF Downloads 151
8461 Transformative Leadership and Learning Management Systems Implementation: Leadership Practices in Instructional Design for Online Learning

Authors: Felix Brito

Abstract:

With the growth of online learning, several higher education institutions have attempted to incorporate technology in their curriculum. Successful technology implementation projects really on technology infrastructure and on the acceptance of education professionals towards innovation. This research study is aimed at illustrating the relevance of the human component in technology implementation projects in higher education by describing the Learning Management System implementation project executed by instructional designers working for a higher education institution in the southeast region of the United States. An analysis of the Transformative Leadership Theory, the Technology Acceptance Model, and the Diffusion of Innovation Process provide the support for a solid understanding of this issue and address recommendations for future technology implementation projects in higher education institutions.

Keywords: diffusion of innovation process, instructional design, leadership, learning management systems, online learning, technology acceptance model, transformative leadership theory

Procedia PDF Downloads 312
8460 Counter-Terrorism and Civil Society in Nigeria

Authors: Emeka Thaddues Njoku

Abstract:

Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.

Keywords: counter-terrorism, civil society organizations, freedom, terrorism

Procedia PDF Downloads 372
8459 An Assumption to Philippine Air Transportation Sustainability in Global Pandemic: Way Forward

Authors: Marwin M. Dela Cruz

Abstract:

Aviation as a transport sector is supportive of the seventeen (17) Sustainable Goals espoused by the United Nations. Air Transport Action Group (ATAG) states that over 18.1 million indirect jobs globally were sustained through the purchase of goods and services by companies in the aviation industry. This supply chain activity contributed approximately $816.4 billion to global GDP. This was achieved through numerous actions to lessen economic uncertainty and challenges. Its impact is not just a by-product of economic activity but of the facilities it generates. As the aviation industry is unifying its efforts, education and training should also come with it. The need for aviation education and training and a well-crafted regulatory policy initiated by lawmakers can provide a better aviation education. The Philippine State College of Aeronautics (PhilSCA), being the only government Higher Education Institution (HEI) in the Philippines, is given a very distinct congressional mandate to offer aviation-related courses to afford those in the aviation industry the opportunity to pursue studies. Having this, the industry has become the precursor and venue of present-day communities. In addition, it becomes an essential measure of a better life.

Keywords: Philippine state college of aeronautics, aviation industry, sustainable goals, aviation education

Procedia PDF Downloads 60
8458 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 270
8457 Emerging Technologies in Distance Education

Authors: Eunice H. Li

Abstract:

This paper discusses and analyses a small portion of the literature that has been reviewed for research work in Distance Education (DE) pedagogies that I am currently undertaking. It begins by presenting a brief overview of Taylor's (2001) five-generation models of Distance Education. The focus of the discussion will be on the 5th generation, Intelligent Flexible Learning Model. For this generation, educational and other institutions make portal access and interactive multi-media (IMM) an integral part of their operations. The paper then takes a brief look at current trends in technologies – for example smart-watch wearable technology such as Apple Watch. The emergent trends in technologies carry many new features. These are compared to former DE generational features. Also compared is the time span that has elapsed between the generations that are referred to in Taylor's model. This paper is a work in progress. The paper therefore welcome new insights, comparisons and critique of the issues discussed.

Keywords: distance education, e-learning technologies, pedagogy, generational models

Procedia PDF Downloads 452
8456 Development of National Education Policy-2020 Aligned Student-Centric-Outcome-Based-Curriculum of Engineering Programmes of Polytechnics in India: Faculty Preparedness and Challenges Ahead

Authors: Jagannath P. Tegar

Abstract:

The new National Education Policy (NEP) 2020 of Govt. of India has envisaged a major overhaul of the education system of India, in particular, the revamping of the Curriculum of Higher Education. In this process, the faculty members of the Indian universities and institutions have a challenging role in developing the curriculum, which is a shift from the traditional (content-based) curriculum to a student-centric- outcome-based Curriculum (SC-OBC) to be implemented in all of the Universities and institutions. The efforts and initiatives on the design and implementation of SC-OBC are remarkable in the engineering and technical education landscape of the country, but it is still in its early stages and many more steps are needed for the successful adaptation in every level of Higher Education. The premier institute of Govt. of India (NITTTR, Bhopal) has trained and developed the capacity and capability among the teachers of Polytechnics on the design and development of Student Centric - Outcome Based Curriculum and also providing academic consultancy for reforming curriculum in line of NEP- 2020 envisions for the states such as Chhattisgarh, Bihar and Maharashtra to make them responsibly ready for such a new shift in Higher Education. This research-based paper is on three main aspects: 1) the level of acceptance and preparedness of teachers /faculty towards NEP-2020 and student-centred outcome-based learning. 2) the extent of implementing NEP-2020 and student-centered outcome-based learning at Indian institutions/ universities and 3) the challenges of implementing NEP-2020 and student-centered outcome-based learning outcome-based education in the Indian context. The paper content will inspire curriculum designers and developers to prepare SC-OBC that meets the specific needs of industry and society at large, which is intended in the NEP-2020 of Govt. of India

Keywords: outcome based curriculum, student centric learning, national education policy -2020, implementation of nep-2020. outcome based learning, higher education curriculum

Procedia PDF Downloads 67
8455 The Influence of Production Hygiene Training on Farming Practices Employed by Rural Small-Scale Organic Farmers - South Africa

Authors: Mdluli Fezile, Schmidt Stefan, Thamaga-Chitja Joyce

Abstract:

In view of the frequently reported foodborne disease outbreaks caused by contaminated fresh produce, consumers have a preference for foods that meet requisite hygiene standards to reduce the risk of foodborne illnesses. Producing good quality fresh produce then becomes critical in improving market access and food security, especially for small-scale farmers. Questions of hygiene and subsequent microbiological quality in the rural small-scale farming sector of South Africa are even more crucial, given the policy drive to develop small-scale farming as a measure for reinforcement of household food security and reduction of poverty. Farming practices and methods, throughout the fresh produce value chain, influence the quality of the final product, which in turn determines its success in the market. This study’s aim was to therefore determine the extent to which training on organic farming methods, including modules such as Importance of Production Hygiene, influenced the hygienic farming practices employed by eTholeni small-scale organic farmers in uMbumbulu, KwaZulu-Natal- South Africa. Questionnaires were administered to 73 uncertified organic farmers and analysis showed that a total of 33 farmers were trained and supplied the local Agri-Hub while 40 had not received training. The questionnaire probed respondents’ attitudes, knowledge of hygiene and composting practices. Data analysis included descriptive statistics such as the Chi-square test and a logistic regression model. Descriptive analysis indicated that a majority of the farmers (60%) were female, most of which (73%) were above the age of 40. The logistic regression indicated that factors such as farmer training and prior experience in the farming sector had a significant influence on hygiene practices both at 5% significance levels. These results emphasize the importance of training, education and farming experience in implementing good hygiene practices in small-scale farming. It is therefore recommended that South African policies should advocate for small-scale farmer training, not only for subsistence purposes, but also with an aim of supplying produce markets with high fresh produce.

Keywords: small-scale farmers, leafy salad vegetables, organic produce, food safety, hygienic practices, food security

Procedia PDF Downloads 415
8454 Mental Health Literacy in Ghana: Consequences of Religiosity, Education, and Stigmatization

Authors: Peter Adu

Abstract:

Although research on the concept of Mental Health Literacy (MHL) is growing internationally, to the authors’ best of knowledge, the beliefs and knowledge of Ghanaians on specific mental disorders have not yet been explored. This vignette study was conducted to explore the relationships between religiosity, education, stigmatization, and MHL among Ghanaians using a sample of laypeople (N = 409). The adapted questionnaire presented two vignettes (depression and schizophrenia) about a hypothetical person. The results revealed that more participants were able to recognize depression (47.4%) than schizophrenia (15.9%). Religiosity was not significantly associated with recognition of mental disorders (MHL) but was positively related with both social and personal stigma for depression and negatively associated with personal and perceived stigma for schizophrenia. Moreover, education was found to relate positively with MHL and negatively with perceived stigma. Finally, perceived stigma was positively associated with MHL, whereas personal stigma for schizophrenia related negatively to MHL. In conclusion, education but not religiosity predicted identification accuracy, but both predictors were associated with various forms of stigma. Findings from this study have implications for MHL and anti-stigma campaigns in Ghana and other developing countries in the region.

Keywords: depression, education, mental health literacy, religiosity, schizophrenia

Procedia PDF Downloads 143
8453 The Emotional Education in the Development of Intercultural Competences

Authors: Montserrrat Dopico Gonzalez, Ramon Lopez Facal

Abstract:

The development of a critical, open and plural citizenship constitutes one of the main challenges of the school institution in the present multicultural societies. Didactics in Social Sciences has conducted important contributions to the development of active methodologies to promote the development of the intercultural competencies of the student body. Research in intercultural education has demonstrated the efficiency of the cooperative learning techniques to improve the intercultural relations in the classroom. Our study proposes to check the effect that, concerning the development of intercultural competencies of the student body, the emotional education can have in the context of the use of active methodologies such as the learning by projects and the cooperative learning. To that purpose, a programme of intervention based on activities focussed on controversial issues related to cultural diversity has been implemented in several secondary schools. Through a methodology which combines intercultural competence scales with interviews and also with the analysis of the school body’s productions, the persistence of stereotypes against immigration and the efficacy of the introduction of emotional education elements in the development of intercultural competencies have both been observed.

Keywords: active methodologies, didactics in social sciences, intercultural competences, intercultural education

Procedia PDF Downloads 145
8452 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 286