Search results for: public security
6815 A Study of Students’ Perceptions of Technology in Petaling District
Authors: Ahmad Masduki Bin Selamat
Abstract:
Malaysia is becoming a developed country by the year 2020, the problem is that little is known about the perceptions and curricular values of Malaysian high school students who have taken Living Skills as a subject in the regular public school. How these students perceive technology in their daily lives, in the country’s development and in global context, is not known. The study involved form 4 students from four public schools in Petaling District. The study found that the Petaling District students’ knowledge of technology were good, where 76.6 % of them scored 50% marks and above during the achievement test. In addition, it was also found that only excellent and squatter students perceived technology education as important as a school subject, compared to those students from the urban area. It was found that students preferred business and entrepreneurship topics rather than the other Living Skills curriculum. The study suggests that students should be exposed to technology education from the early years of schooling (preschool to secondary). In addition, the acquisition of skills, the evaluation, revision and modification of the instruction as well as the curriculum should be enforced.Keywords: technology education, living skills, curricular values, public schools
Procedia PDF Downloads 4516814 Designing for Sustainable Public Housing from Property Management and Financial Feasibility Perspectives
Authors: Kung-Jen Tu
Abstract:
Many public housing properties developed by local governments in Taiwan in the 1980s have deteriorated severely as these rental apartment buildings aged. The lack of building maintainability considerations during project design phase as well as insufficient maintenance funds have made it difficult and costly for local governments to maintain and keep public housing properties in good shape. In order to assist the local governments in achieving and delivering sustainable public housing, this paper intends to present a developed design evaluation method to be used to evaluate the presented design schemes from property management and financial feasibility perspectives during project design phase of public housing projects. The design evaluation results, i.e. the property management and financial implications of presented design schemes that could occur later during the building operation and maintenance phase, will be reported to the client (the government) and design schemes revised consequently. It is proposed that the design evaluation be performed from two main perspectives: (1) Operation and property management perspective: Three criteria such as spatial appropriateness, people and vehicle circulation and control, property management working spaces are used to evaluate the ‘operation and PM effectiveness’ of a design scheme. (2) Financial feasibility perspective: Four types of financial analyses are performed to assess the long term financial feasibility of a presented design scheme, such as operational and rental income analysis, management fund analysis, regular operational and property management service expense analysis, capital expense analysis. The ongoing Chung-Li Public Housing Project developed by the Taoyuan City Government will be used as a case to demonstrate how the presented design evaluation method is implemented. The results of property management assessment as well as the annual operational and capital expenses of a proposed design scheme are presented.Keywords: design evaluation method, management fund, operational and capital expenses, rental apartment buildings
Procedia PDF Downloads 3086813 Civil Service Reforms in Kazakhstan and Its Influence on Modernization
Authors: Aliya Idrissova
Abstract:
Civil service (public administration) is an important social institution of society properties. Civil service institution had a significant impact on modernization processes in Kazakhstan through ensuring the functioning of all the subsystems of social life. This article is an attempt to analyses the reforms of public service institution in Kazakhstan and to assess its influence on modernization processes.Keywords: civil service, Kazakhstan, modernization, a national model of civil service, civil service reforms, bureaucracy
Procedia PDF Downloads 3926812 Adaptive Reuse of Lost Urban Space
Authors: Rana Sameeh
Abstract:
The city is the greatest symbol of human civilization and has been built for safety and comfort. However, uncontrolled urban growth caused some anonymous and unsightly images of the cities such as unused or abandoned spaces. When social interaction is missed in a public space it means the public space is lost since public spaces reflect the social life and interaction of people. Accordingly; this space became one of the most meaningless parts of the cities and has broken the continuity of the urban fabric. Lost urban spaces are the leftover unstructured landscape within the urban fabric. They are generally the unrecognized urban areas that are in need of redesign, since they have a great value that can add to their surrounding urban context. The research significance lies within the importance of urban open spaces, their value and their impact on the urban fabric. The research also addresses the reuse and reclamation of lost urban spaces in order to increase the percentage of green areas along the urban fabric, provide urban open spaces, develop a sustainable approach towards urban landscape and enhance the quality of the public open space and user experience. In addition, the reuse of lost space will give it the identity and function it lacks while also providing places for presence, spending time and observing. Creating continuity in a broken urban fabric represents an exploratory process in the relationship between infrastructure and the urban fabric and seeks to establish an architectural solution to leftover space within the city. In doing so, the research establishes a framework (criteria) for adaptive reuse of lost urban space throughout inductive and deductive methodology, analytical methodology; by analyzing some relevant examples and similar cases of lost spaces and finally through field methodology; by applying the achieved criteria on a case study in Alexandria and carrying on SWOT analysis and evaluation of the potentials of this case study.Keywords: adaptive reuse, lost urban space, quality of public open space, urban fabric
Procedia PDF Downloads 6486811 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India
Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer
Abstract:
The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.Keywords: East Himalaya, local community, wild edible plants, nutrition, food security
Procedia PDF Downloads 2626810 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners
Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi
Abstract:
Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression
Procedia PDF Downloads 2226809 Effectiveness of Blended Learning in Public School During Covid-19: A Way Forward
Authors: Sumaira Taj
Abstract:
Blended learning is emerged as a prerequisite approach for teaching in all schools after the outbreak of the COVID-19 pandemic. However, how much public elementary and secondary schools in Pakistan are ready for adapting this approach and what should be done to prepare schools and students for blended learning are the questions that this paper attempts to answer. Mixed-method research methodology was used to collect data from 40 teachers, 500 students, and 10 mothers. Descriptive statistics was used to analyze quantitative data. As for as readiness is concerned, schools lack resources for blended/ virtual/ online classes from infra-structure to skills, parents’ literacy level hindered students’ learning process and teachers’ skills presented challenges in a smooth and swift shift of the schools from face-to-face learning to blended learning. It is recommended to establish a conducive environment in schools by providing all required resources and skills. Special trainings should be organized for low literacy level parents. Multiple ways should be adopted to benefit all students.Keywords: blended learning, challenges in online classes, education in covid-19, public schools in pakistan
Procedia PDF Downloads 1666808 Investment and Economic Growth: An Empirical Analysis for Tanzania
Authors: Manamba Epaphra
Abstract:
This paper analyzes the causal effect between domestic private investment, public investment, foreign direct investment and economic growth in Tanzania during the 1970-2014 period. The modified neo-classical growth model that includes control variables such as trade liberalization, life expectancy and macroeconomic stability proxied by inflation is used to estimate the impact of investment on economic growth. Also, the economic growth models based on Phetsavong and Ichihashi (2012), and Le and Suruga (2005) are used to estimate the crowding out effect of public investment on private domestic investment on one hand and foreign direct investment on the other hand. A correlation test is applied to check the correlation among independent variables, and the results show that there is very low correlation suggesting that multicollinearity is not a serious problem. Moreover, the diagnostic tests including RESET regression errors specification test, Breusch-Godfrey serial correlation LM test, Jacque-Bera-normality test and white heteroskedasticity test reveal that the model has no signs of misspecification and that, the residuals are serially uncorrelated, normally distributed and homoskedastic. Generally, the empirical results show that the domestic private investment plays an important role in economic growth in Tanzania. FDI also tends to affect growth positively, while control variables such as high population growth and inflation appear to harm economic growth. Results also reveal that control variables such as trade openness and life expectancy improvement tend to increase real GDP growth. Moreover, a revealed negative, albeit weak, association between public and private investment suggests that the positive effect of domestic private investment on economic growth reduces when public investment-to-GDP ratio exceeds 8-10 percent. Thus, there is a great need for promoting domestic saving so as to encourage domestic investment for economic growth.Keywords: FDI, public investment, domestic private investment, crowding out effect, economic growth
Procedia PDF Downloads 2906807 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks
Authors: Habib Gorine, Rabia Saleh
Abstract:
Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation
Procedia PDF Downloads 3206806 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems
Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana
Abstract:
The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.Keywords: mitigations, risk, transport, security, vulnerabilities
Procedia PDF Downloads 1656805 Typology of Fake News Dissemination Strategies in Social Networks in Social Events
Authors: Mohadese Oghbaee, Borna Firouzi
Abstract:
The emergence of the Internet and more specifically the formation of social media has provided the ground for paying attention to new types of content dissemination. In recent years, Social media users share information, communicate with others, and exchange opinions on social events in this space. Many of the information published in this space are suspicious and produced with the intention of deceiving others. These contents are often called "fake news". Fake news, by disrupting the circulation of the concept and similar concepts such as fake news with correct information and misleading public opinion, has the ability to endanger the security of countries and deprive the audience of the basic right of free access to real information; Competing governments, opposition elements, profit-seeking individuals and even competing organizations, knowing about this capacity, act to distort and overturn the facts in the virtual space of the target countries and communities on a large scale and influence public opinion towards their goals. This process of extensive de-truthing of the information space of the societies has created a wave of harm and worries all over the world. The formation of these concerns has led to the opening of a new path of research for the timely containment and reduction of the destructive effects of fake news on public opinion. In addition, the expansion of this phenomenon has the potential to create serious and important problems for societies, and its impact on events such as the 2016 American elections, Brexit, 2017 French elections, 2019 Indian elections, etc., has caused concerns and led to the adoption of approaches It has been dealt with. In recent years, a simple look at the growth trend of research in "Scopus" shows an increasing increase in research with the keyword "false information", which reached its peak in 2020, namely 524 cases, reached, while in 2015, only 30 scientific-research contents were published in this field. Considering that one of the capabilities of social media is to create a context for the dissemination of news and information, both true and false, in this article, the classification of strategies for spreading fake news in social networks was investigated in social events. To achieve this goal, thematic analysis research method was chosen. In this way, an extensive library study was first conducted in global sources. Then, an in-depth interview was conducted with 18 well-known specialists and experts in the field of news and media in Iran. These experts were selected by purposeful sampling. Then by analyzing the data using the theme analysis method, strategies were obtained; The strategies achieved so far (research is in progress) include unrealistically strengthening/weakening the speed and content of the event, stimulating psycho-media movements, targeting emotional audiences such as women, teenagers and young people, strengthening public hatred, calling the reaction legitimate/illegitimate. events, incitement to physical conflict, simplification of violent protests and targeted publication of images and interviews were introduced.Keywords: fake news, social network, social events, thematic analysis
Procedia PDF Downloads 636804 A Comparative Study of Insurance Policies Worldwide in Public Private Partnerships
Authors: Guanqun Shi, Xueqing Zhang
Abstract:
The frequent occurrence of failures in PPP projects which caused great loss has raised attention from the government as well as the concessionaire. PPPs are complex arrangements for its long operation period and multiple players. Many types of risks in PPP projects may cause the project fail. The insurance is an important tool to transfer the risks. Through a comparison and analysis of international government PPP guidelines and contracts as well as the case studies worldwide, we have identified eight main insurance principles, discussed thirteen insurance types in different stages. An overall procedure would be established to improve the practices in PPP projects.Keywords: public private partnerships, insurance, contract, risk
Procedia PDF Downloads 2846803 Landmines and the Postcolonial Security Discourse in Zimbabwe
Authors: Fradreck Jockonia Mujuru
Abstract:
The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.Keywords: landmines, postcolonial, repression, security, violence
Procedia PDF Downloads 766802 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks
Authors: Faisal Al Yahmadi, Muhammad R. Ahmed
Abstract:
Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.Keywords: smart grid network, security, threats, vulnerabilities
Procedia PDF Downloads 1396801 Citizens’ Readiness to Adopt and Use Electronic Voting System in Ghana
Authors: Isaac Kofi Mensah
Abstract:
The adoption and application of Information and Communication Technologies (ICTs) in government administration through e-government is expected to permeate all sectors of state/ public institutions as well as democratic institutions. One of such public institutions is the Electoral Commission of Ghana mandated by the 1992 Constitution to hold all public elections including presidential and parliamentary elections. As Ghana holds its 7th General Elections since 1992, on 7th November 2016, there are demands from key stakeholders for the Election Management Body, which is the Electoral Commission (EC) of Ghana to adopt and implement an electronic voting system. This case study, therefore, attempts to contribute significantly to the debate by examining influencing factors that would impact on citizen’s readiness to adopt and use an electronic voting system in Ghana. The Technology Acceptance Model (TAM) was used as a theoretical framework for this study, out of which a research model and hypotheses were developed. Importantly, the outcome of this research finding would form a basis for appropriate policy recommendation for consideration of Government and EC of Ghana.Keywords: citizens readiness, e-government, electronic voting, technology acceptance model (TAM)
Procedia PDF Downloads 2666800 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States
Authors: Mai Kaneda, Sarah Feeney
Abstract:
This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.Keywords: attachment, career decision-making, college students, self-efficacy
Procedia PDF Downloads 2216799 Introducing a Practical Model for Instructional System Design Based on Determining of the knowledge Level of the Organization: Case Study of Isfahan Public Transportation Co.
Authors: Mojtaba Aghajari, Alireza Aghasi
Abstract:
The first challenge which the current research faced has been the identification or determination of the level of knowledge in Isfahan public transportation corporation, and the second challenge has been the recognition and choice of a proper approach for the instructional system design. Responding these two challenges will present an appropriate model of instructional system design. In order to respond the first challenge or question, Nonaka and Takeuchi KM model has been utilized due to its universality among the 26 models proposed so far. The statistical population of this research included 2200 people, among which 200 persons were chosen as the sample of the research by the use of Morgan’s method. The data gathering has been carried out by the means of a questionnaire based on Nonaka and Takeuchi KM model, analysis of which has been done by SPSS program. The output of this questionnaire, yielding the point of 1.96 (out of 5 points), revealed that the general condition of Isfahan public transportation corporation is weak concerning its being knowledge-centered. After placing this output on Jonassen’s continuum, it was revealed that the appropriate approach for instructional system design is the system (or behavioral) approach. Accordingly, different steps of the general model of ADDIE, which covers all of the ISO10015 standards, were adopted in the act of designing. Such process in Isfahan public transportation corporation was designed and divided into three main steps, including: instructional designing and planning, instructional course planning, determination of the evaluation and the effectiveness of the instructional courses.Keywords: instructional system design, system approach, knowledge management, employees
Procedia PDF Downloads 3266798 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism
Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe
Abstract:
National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.Keywords: counter-terrorism, discourse, Nigeria, security, terrorism
Procedia PDF Downloads 4866797 Effective Citizen Participation in Local Government Decision-Making and Democracy
Authors: Ali Zaimi
Abstract:
Citizen participation in local government is an opportunity given to citizens and government to increase communication between them, create public support for local government plans and most important grow public trust in government. Also, the citizens’ involvement in the political process is an important part of democracy. This study aims to define the strategies for increasing citizen participation in local governance and concentrated in two important mechanisms such as participatory budget and public policy councils. Three strategies that promote more effective citizen involvement in local governance are understanding and using formal institutions of power, collaboration of citizens’ groups and governments officials to jointly formulate programs plans, electing and appointing local officials. A unique aspect of citizen participation to operate effectively is the transparency of government and the inclusion of actors into decision-making. The citizen engagement in local governance enhances accountability and problem solving, promote more inclusive and cohesive communities and enlarge the quality and quantity of initiatives made by communities.Keywords: accountability, citizen participation, democracy, government
Procedia PDF Downloads 2656796 Vibrancy in The City: The Problem of Sidi-Gaber Station Zone in Alexandria, Egypt
Authors: Gihan Mosaad, Bakr Gomaa, Rana Elbadri
Abstract:
Modern parts of Alexandria city lack in vibrancy, causing a number of problems such as urban areas with poor security measures as well as weak economic state. Vibrancy provides a livable, attractive and secure environments; it also boosts the city’s economy and social life. Vibrant city is a city full of energy and life. To achieve this, a number of resources are needed; namely specific urban density, the availability of alternative modes of transportation and finally diversity of land-uses. Literature review shows no comprehensive study that assesses vibrancy in the streets of modern Alexandria. This study aims to measure the vibrancy potential in Sidi-Gaber station area thought the assessment of existing resources performance. Methods include literature reviews, surveying of existing case, questionnaire as well as GIS techniques. Expected results include GIS maps defining the vibrancy potentials in land use, density and statistical study regarding public transportation use in the area.Keywords: Alexandria, density, mixed use, transportation, vibrancy
Procedia PDF Downloads 2946795 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia
Authors: Clara Voyvodic
Abstract:
Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences
Procedia PDF Downloads 1326794 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education
Authors: Hongmei Chi
Abstract:
The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning
Procedia PDF Downloads 996793 Impact of Sovereign Debt Risk and Corrective Austerity Measures on Private Sector Borrowing Cost in Euro Zone
Authors: Syed Noaman Shah
Abstract:
The current paper evaluates the effect of external public debt risk on the borrowing cost of private non-financial firms in euro zone. Further, the study also treats the impact of austerity measures on syndicated-loan spreads of private firm followed by euro area member states to revive the economic growth in the region. To test these hypotheses, we follow multivariate ordinary least square estimation method to assess the effect of external public debt on the borrowing cost of private firms. By using foreign syndicated-loan issuance data of non-financial private firms from 2005 to 2011, we attempt to gauge how the private financing cost varies with high levels of sovereign external debt prevalent in the euro zone. Our results suggest significant effect of external public debt on the borrowing cost of private firm. In particular, an increase in external public debt by one standard deviation from its sample mean raises syndicated-loan spread by 89 bps. Furthermore, weak creditor rights protection prevalent in member states deepens this effect. However, we do not find any significant effect of domestic public debt on the private sector borrowing cost. In addition, the results show significant effect of austerity measures on private financing cost, both in normal and in crisis period in the euro zone. In particular, one standard deviation change in fiscal consolidation conditional mean reduces the syndicated-loan spread by 22 bps. In turn, it indicates strong presence of credibility channel due to austerity measures in euro area region.Keywords: corporate debt, fiscal consolidation, sovereign debt, syndicated-loan spread
Procedia PDF Downloads 4126792 Reviewing the Public Participation Criteria in Traditional Cities: To Achieve Social Sustainability
Authors: Najmeh Malekpour Bahabadi
Abstract:
Small fast-developing Iranian cities with a historical background have no defined criteria for their social sustainability. However, their traditional architecture is well-known as a socially and environmentally sustainable role model. In today's cities, citizens' participation has been considered an effective strategy to achieve social sustainability. By scrutinizing the extent and manner of public participation in traditional Iranian cities, taking Yazd's historical context as a case study, this study examines how these criteria can be applied to developing parts of the city. The paper first reviews the concepts, levels, and approaches of public participation to analyze different modes of citizen participation. Then, exploring social behavior and activities in Yazd, using the qualitative-analytical methodology, the paper compares diverse elements influencing participation with contemporary approaches. The findings of this study would lead to suggestions for the developing parts of the city to enhance their socially sustainable development.Keywords: citizen participation, social behaviors, traditional city, built environment, social sustainability
Procedia PDF Downloads 1276791 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos
Abstract:
Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system
Procedia PDF Downloads 1836790 Study of Reporting System for Adverse Events Related to Common Medical Devices at a Tertiary Care Public Sector Hospital in India
Authors: S. Kurian, S. Satpathy, S. K. Gupta, S. Arya, D. K. Sharma
Abstract:
Advances in the use of health care technology have resulted in increased adverse events (AEs) related to the use of medical devices. The study focused on the existing reporting systems. This study was conducted in a tertiary care public sector hospital. Devices included Syringe infusion pumps, Cardiac monitors, Pulse oximeters, Ventilators and Defibrillators. A total of 211 respondents were recruited. Interviews were held with 30 key informants. Medical records were scrutinized. Relevant statistical tests were used. Resident doctors reported maximum frequency of AEs, followed by nurses; and least by consultants. A significant association was found between the cadre of health care personnel and awareness that the patients and bystanders have a risk of sustaining AE. Awareness regarding reporting of AEs was low, and it was generally done verbally. Other critical findings are discussed in the light of the barriers to reporting, reasons for non-compliance, recording system, and so on.Keywords: adverse events, health care technology, medical devices, public sector hospital, reporting systems
Procedia PDF Downloads 3396789 Information Literacy Among Faculty Members in the Medical Colleges of Khyber Pakhtunkhwa-Pakistan
Authors: Saeed Ullah Jan, Waheed Ullah Kha
Abstract:
Purpose of the study: This study aims to assess faculty members' information literacy skills in public sector medical colleges in Khyber Pakhtunkhwa. Design/Methodology/approach: The descriptive research design was used to conduct and accomplish the study's objectives. The research population consisted of faculty members at public sector medical colleges in Khyber Pakhtunkhwa southern region. Professors, Associate Professors, Assistant Professors, Lecturers, and demonstrators comprise the faculty. The adapted questionnaires were modified and used as data collection instruments. Key findings: The majority of the public sector medical college faculty recognizes the various sources of information, and they use both printed and online materials to identify needed information. The majority of faculty at these medical colleges consults monographs/textbooks regularly, preceded by online journals/medical databases. A good number of medical faculty members opted to use the HEC digital library to locate and access their contents. Delimitations of the study: This study is delimited to three public sector medical colleges operate in southern districts: Khyber Medical University Institute of Medical Sciences (KIMS) in Kohat, the Gomal Medical College (GMC) in Dera Ismail Khan, and the Bannu Medical College (BMC) in Bannu. Practical implication(s): The findings of the study will motivate the policymakers and authorities of these three medical colleges in the southern region of Khyber Pakhtunkhwa to enhance the information literacy skills of medical faculty. This practice will result in an effective medical education in the province. Contribution to the knowledge: No significant work has been done on the Faculty's Information literacy skills at public sector medical colleges in Khyber Pakhtunkhwa. This study will add valuable literature to the literary world.Keywords: information literacy skills-Khyber Pakhtunkhwa, information literacy skills-medical faculty-Khyber Pakhtunkhwa, medical sciences, information literacy, information-literacy-Pakistan
Procedia PDF Downloads 1056788 Anti-crisis Public Relations and Aspects of Effective Management in Georgian Companies
Authors: Marine Kobalava
Abstract:
Introduction. The paper substantiates the crucial role of anti-crisis PR in managing the image and reputation of companies. The critical situation caused by the Covid-19 virus in various countries of the world and the actions taken have had a significant negative impact on the image of companies and public groups. The mentioned circumstance has caused some problems for companies’ products in terms of customer demand. Accordingly, the main goal of PR has become to achieve the optimal relationship between companies and society with effective management. It should also be taken into account that the range of action of PR in crisis situations is much wider than that of advertising. In the paper, Public Relations is evaluated as a determining factor of the companies' prestige, its reliability, which has a decisive effect on the goodwill, trust, and general reputation of the public towards the company. The purpose of the study is to reveal the challenges of anti-crisis PR in Georgian companies and to develop recommendations on effective management mechanisms. Methodologies. Analysis, induction, synthesis, and other methods are used in the paper; Matrix and SWOT analysis are constructed. Ways of establishing and implementing an anti-crisis PR system in companies are proposed. The main aspects of anti-crisis management are identified by using the matrix of the choice of diversification strategy of the companies' activities, the possibilities of making adequate decisions using PR are studied according to the characteristics of the companies' activities and priority directions. Conclusion. The paper draws conclusions on modern problems of anti-crisis PR, offers recommendations on ways to solve it through PR strategies.Keywords: anti-crisis PR, effective management, company, PR strategy
Procedia PDF Downloads 796787 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security
Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama
Abstract:
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach
Procedia PDF Downloads 2926786 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing
Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi
Abstract:
This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning
Procedia PDF Downloads 31