Search results for: security service
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6006

Search results for: security service

4446 Impact of Vehicle Travel Characteristics on Level of Service: A Comparative Analysis of Rural and Urban Freeways

Authors: Anwaar Ahmed, Muhammad Bilal Khurshid, Samuel Labi

Abstract:

The effect of trucks on the level of service is determined by considering passenger car equivalents (PCE) of trucks. The current version of Highway Capacity Manual (HCM) uses a single PCE value for all tucks combined. However, the composition of truck traffic varies from location to location; therefore a single PCE-value for all trucks may not correctly represent the impact of truck traffic at specific locations. Consequently, present study developed separate PCE values for single-unit and combination trucks to replace the single value provided in the HCM on different freeways. Site specific PCE values, were developed using concept of spatial lagging headways (the distance from the rear bumper of a leading vehicle to the rear bumper of the following vehicle) measured from field traffic data. The study used data from four locations on a single urban freeway and three different rural freeways in Indiana. Three-stage-least-squares (3SLS) regression techniques were used to generate models that predicted lagging headways for passenger cars, single unit trucks (SUT), and combination trucks (CT). The estimated PCE values for single-unit and combination truck for basic urban freeways (level terrain) were: 1.35 and 1.60, respectively. For rural freeways the estimated PCE values for single-unit and combination truck were: 1.30 and 1.45, respectively. As expected, traffic variables such as vehicle flow rates and speed have significant impacts on vehicle headways. Study results revealed that the use of separate PCE values for different truck classes can have significant influence on the LOS estimation.

Keywords: level of service, capacity analysis, lagging headway, trucks

Procedia PDF Downloads 335
4445 Column Studies on Chromium(VI) Adsorption onto Kala Jamun (Syzygium cumini L.) Seed Powder

Authors: Sumi Deka, Krishna Gopal Bhattacharyya

Abstract:

This paper evaluate the industrial use of Kala Jamun (Syzygiumcumini L.) Seed powder (KSP) for the continuous adsorption of Cr(VI) in a column adsorption process. Adsorption of Cr(VI) onto Kala jamun (Syzygiumcumini L.) Seed Powder have been examined with the variation of (a) bed depth of the adsorbents, (b) flow rate of the adsorbents and (c) Cr(VI) concentration. The results showed that both the adsorption and the regeneration of the Cr(VI) onto Kala Jamun (Syzygiumcumini L.) seed Powder (KSP) can effectively occur in the column mode of adsorption. On increasing the bed depth, the adsorption of Cr(VI) onto KSP increases whereas on increasing the flow rate and the Cr(VI) concentration of KSP adsorption decreases. The results of the column studies were also fitted to Bed Depth Service Time (BDST) model. The BDST model was appropriate for designing the column for industrial purpose.

Keywords: bed-depth-service-time, continuous adsorption, Cr(VI), KSP

Procedia PDF Downloads 235
4444 A Multilevel Authentication Protocol: MAP in VANET for Human Safety

Authors: N. Meddeb, A. M. Makhlouf, M. A. Ben Ayed

Abstract:

Due to the real-time requirement of message in Vehicular Ad hoc NETworks (VANET), it is necessary to authenticate vehicles to achieve security, efficiency, and conditional privacy-preserving. Privacy is of utmost relevance in VANETs. For this reason, we have proposed a new protocol called ‘Multilevel Authentication Protocol’ (MAP) that considers different vehicle categories. The proposed protocol is based on our Multilevel Authentication protocol for Vehicular networks (MAVnet). But the MAP leads to human safety, where the priority is given to the ambulance vehicles. For evaluation, we used the Java language to develop a demo application and deployed it on the Network Security Simulation (Nessi2). Compared with existing authentication protocols, MAP markedly enhance the communication overhead and decreases the delay of exchanging messages while preserving conditional privacy.

Keywords: Vehicular Ad hoc NETworks (VANET), vehicle categories, safety, databases, privacy, authentication, throughput, delay

Procedia PDF Downloads 275
4443 Self-Efficacy Perceptions of Pre-Service Art and Music Teachers towards the Use of Information and Communication Technologies

Authors: Agah Tugrul Korucu

Abstract:

Information and communication technologies have become an important part of our daily lives with significant investments in technology in the 21st century. Individuals are more willing to design and implement computer-related activities, and they are the main component of computer self-efficacy and self-efficacy related to the fact that the increase in information technology, with operations in parallel with these activities more successful. The Self-efficacy level is a significant factor which determines how individuals act in events, situations and difficult processes. It is observed that individuals with higher self-efficacy perception of computers who encounter problems related to computer use overcome them more easily. Therefore, this study aimed to examine self-efficacy perceptions of pre-service art and music teachers towards the use of information and communication technologies in terms of different variables. Research group consists of 60 pre-service teachers who are studying at Necmettin Erbakan University Ahmet Keleşoğlu Faculty of Education Art and Music department. As data collection tool of the study; “personal information form” developed by the researcher and used to collect demographic data and "the perception scale related to self-efficacy of informational technology" are used. The scale is 5-point Likert-type scale. It consists of 27 items. The Kaiser-Meyer-Olkin (KMO) sample compliance value is found 0.959. The Cronbach alpha reliability coefficient of the scale is found to be 0.97. computer-based statistical software package (SPSS 21.0) is used in order to analyze the data collected by data collection tools; descriptive statistics, t-test, analysis of variance are used as statistical techniques.

Keywords: self-efficacy perceptions, teacher candidate, information and communication technologies, art teacher

Procedia PDF Downloads 300
4442 The Effect of Artificial Intelligence on Human Rights Obligations and Theories

Authors: Sameh Sarwat Melek Mikheal

Abstract:

The relationship between development and human rights has long been the subject of academic debate. To understand the dynamics between these two concepts, various principles are adopted, from the right to development to development-based human rights. Despite the initiatives taken, the relationship between development and human rights remains unclear. However, the overlap between these two views and the idea that efforts should be made in the field of human rights have increased in recent years. It is then evaluated whether the right to sustainable development is acceptable or not. This article concludes that the principles of sustainable development are directly or indirectly recognized in various human rights instruments, and this is a good answer to the question posed above. This book therefore cites regional and international human rights agreements such as , as well as the jurisprudence and interpretative guidelines of human rights institutions, to prove this hypothesis.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation sustainable development, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 25
4441 A Critical Discourse Analysis: Embedded Inequalities in the UK Disability Social Security System

Authors: Cara Williams

Abstract:

In 2006, the UK Labour government published a Green Paper introducing Employment and Support Allowance (ESA) as a replacement for Incapacity Benefit (IB), as well as a new Work Capability Assessment (WCA); signalling a controversial political and economic shift in disability welfare policy. In 2016, the Conservative government published Improving Lives: The Work, Health, and Disability Green Paper, as part of their social reform agenda, evidently to address the ‘injustice’ of the ‘disability employment gap’. This paper contextualises ESA in the wider ideology and rhetoric of ‘welfare to work’, ‘dependency’ and ‘responsibility’. Using the British ‘social model of disability’ as a theoretical framework, the study engages in a critical discourse analysis of these two Green Papers. By uncovering the medicalised conceptions embedded in the texts, the analysis has revealed ESA is linked with late capitalisms concern with the ‘disability category’.

Keywords: disability, employment, social security, welfare

Procedia PDF Downloads 147
4440 Singular Stochastic Control Model with Carrying Capacity of Population Management Policy for Squirrels in Durian Orchards

Authors: Sasiwimol Auepong, Raywat Tanadkithirun

Abstract:

In this work, the problem that squirrels ruin durian, which is an economical fruit in Thailand, is considered. We seek the strategy for the durian farmers to eliminate the squirrels under the consideration that squirrels also provide ecosystem service. The population dynamics of squirrels are constructed to have carrying capacity since we consider the population in a confined area. A performance index indicating the total benefit of a given elimination strategy is provided. It comprises the cost of countermeasures, the loss of resources, and the ecosystem service provided by squirrels. The optimal performance index is numerically solved through the variational inequality using the finite difference method. The optimal strategy to control the squirrel population is also given numerically.

Keywords: controlled stochastic differential equation, durian, finite difference method, performance index, singular stochastic control model, squirrel

Procedia PDF Downloads 71
4439 Perceptions of Teachers in South Africa Regarding Retirement in Gauteng Schools in Tshwane North District

Authors: Emily Magoma-Nthite, Nonhlanhla Maseko, Mabatho Sedibe

Abstract:

In this study, the focus is on the exploration and description of the teachers’ perceptions regarding retirement in Gauteng school in Tshwane North districts. From the individual and group interviews, the findings are leading to suggestions that a more comprehensive program for preparing teachers for retirement is highly necessary. All the participants were aware of their retirement age of 60 years as stipulated in the department of education internal memorandum No: 05 of 2021, which states that the compulsory retirement age in the public service is 60 years. It further states that the age restriction is in accordance with Chapter 4 of the Public Service Act, 1994 and Chapter 4 of the Employment of Educators Act, 1998, as amended. It was found out that there are some anxieties and fears as the majority seemed not ready and maybe not prepared enough for the retirement. Recommendations for a pre-retirement programme aimed at timeous preparation, which may include psychological, financial, and ability to keep functioning post retirement, will be proposed to the department of education in Gauteng and for the Tshwane North district as the pilot site on approval.

Keywords: teachers, pre-retirement, preparedness, gauteng schools

Procedia PDF Downloads 103
4438 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 429
4437 Advocating for Those with Limited Mobility

Authors: Dorothy I. Riddle

Abstract:

Limited mobility (or an inability to walk more than 15 meters without sitting down to rest) restricts full community participation for 13 percent of Canadian adults or 4.2 million persons), yet Canadian accessibility standards are silent on distance to be walked as an accessibility barrier to be addressed. Instead, they focus on ensuring access for the wheeled mobility devices used regularly by le The Accessible Canada Act mandates that Canada be barrier free by 2040, which will necessitate eliminating distance to be walked as a barrier in federal programs and services. This paper details the results of a multi-year research project funded by Accessibility Standards Canada to document the lived experience of those struggling with limited mobility and make recommendations regarding how to ensure accessibility for those with limited mobility. Over 2,600 Canadians from across Canada participated in an online survey and follow-up focus groups. The results underscored the importance of providing not only mobility supports in public facilities but also the information necessary for planning access to federal programs and services. As numerous participants indicated, if they weren’t sure how far they would have to walk, they simply stayed home and depended on friends and relatives for help with errands or appointments. This included failing to participate in civic activities, such as voting, for fear of having to walk too far and stand unsupported for too long. Types of information that were deemed critical included whether or not mobility aids were available, where seating to rest was located throughout the facility, what alternatives to standing while waiting for service and having to walk to the service provider (rather than the provider coming to the customer) were available, and diagrams of accessible parking and its relationship to elevators and services.

Keywords: accessibility standards, distance to be walked, limited mobility, mobility aids, service to customer

Procedia PDF Downloads 58
4436 Internal Displacement in Iraq due to ISIS Occupation and Its Effects on Human Security and Coexistence

Authors: Feisal Khudher Mahmood, Abdul Samad Rahman Sultan

Abstract:

Iraq had been a diverse society with races, cultures and religions that peacefully coexistence. The phenomenon of internal displacement occurred after April 2003, because of political instability as will as the deterioration of the political and security situation as a result of United States of America occupation. Biggest internal displacement have occurred (and keep happening) since 10th of June 2014 due to rise of Islamic State of Iraq and Syria (ISIS) and it’s occupation of one third of country territories. This crisis effected directly 3,275,000 people and reflected negatively on the social fabric of Iraq community and led to waves of sectorial violence that swept the country. Internal displaced communities are vulnerable, especially under non functional and weak government, that led to lose of essential human rights and dignity. Using Geographic Information System (GIS) and Geospatial Techniques, two types of internal displacement have been found; voluntary and forced. Both types of displacement are highly influenced by location, race and religion. The main challenge for Iraqi government and NGOs will be after defeating ISIS. Helping the displaced to resettle within their community and to re-establish the coexistence. By spatial-statical analysis hot spots of future conflicts among displaced community have been highlighted. This will help the government to tackle future conflicts before they occur. Also, it will be the base for social conflict early warning system.

Keywords: internal displacement, Iraq, ISIS, human security, human rights, GIS, spatial-statical analysis

Procedia PDF Downloads 502
4435 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 403
4434 Using Human-Centred Service Design and Partnerships as a Model to Promote Cross-Sector Social Responsibility in Disaster Resilience: An Australian Case Study

Authors: Keith Diamond, Tracy Collier, Ciara Sterling, Ben Kraal

Abstract:

The increased frequency and intensity of disaster events in the Asia-Pacific region is likely to require organisations to better understand how their initiatives, and the support they provide to their customers, intersect with other organisations aiming to support communities in achieving disaster resilience. While there is a growing awareness that disaster response and recovery rebuild programmes need to adapt to more integrated, community-led approaches, there is often a discrepancy between how programmes intend to work and how they are collectively experienced in the community, creating undesired effects on community resilience. Following Australia’s North Queensland Monsoon Disaster of 2019, this research set out to understand and evaluate how the service and support ecosystem impacted on the local community’s experience and influenced their ability to respond and recover. The purpose of this initiative was to identify actionable, cross-sector, people-centered improvements that support communities to recover and thrive when faced with disaster. The challenge arose as a group of organisations, including utility providers, banks, insurers, and community organisations, acknowledged that improving their own services would have limited impact on community wellbeing unless the other services people need are also improved and aligned. The research applied human-centred service design methods, typically applied to single products or services, to design a new way to understand a whole-of-community journey. Phase 1 of the research conducted deep contextual interviews with residents and small business owners impacted by the North Queensland Monsoon and qualitative data was analysed to produce community journey maps that detailed how individuals navigated essential services, such as accommodation, finance, health, and community. Phase 2 conducted interviews and focus groups with frontline workers who represented industries that provided essential services to assist the community. Data from Phase 1 and Phase 2 of the research was analysed and combined to generate a systems map that visualised the positive and negative impacts that occurred across the disaster response and recovery service ecosystem. Insights gained from the research has catalysed collective action to address future Australian disaster events. The case study outlines a transformative way for sectors and industries to rethink their corporate social responsibility activities towards a cross-sector partnership model that shares responsibility and approaches disaster response and recovery as a single service that can be designed to meet the needs of communities.

Keywords: corporate social responsibility, cross sector partnerships, disaster resilience, human-centred design, service design, systems change

Procedia PDF Downloads 136
4433 Control of an Outbreak of Vancomycin-Resistant Enterococci in a Tunisian Teaching Hospital

Authors: Hela Ghali, Sihem Ben Fredj, Mohamed Ben Rejeb, Sawssen Layouni, Salwa Khefacha, Lamine Dhidah, Houyem Said Laatiri

Abstract:

Background: Antimicrobial resistance is a growing threat to public health and motivates to improve prevention and control programs both at international (WHO) and national levels. Despite their low pathogenicity, vancomycin-resistant enterococci (VRE) are common nosocomial pathogens in several countries. The high potential for transmission of VRE between patients and the threat to send its resistance genes to other bacteria such as staphylococcus aureus already resistant to meticilin, justify strict control measures. Indeed, in Europe, the proportion of Enterococcus faecium responsible for invasive infections, varies from 1% to 35% in 2011 and less than 5% were resistant to vancomycin. In addition, it represents the second cause of urinary tract and wound infections and the third cause of nosocomial bacteremia in the United States. The nosocomial outbreaks of VRE have been mainly described in intensive care services, hematology-oncology and haemodialysis. An epidemic of VRE has affected our hospital and the objective of this work is to describe the measures put in place. Materials/Methods: Following the alert given by the service of plastic surgery concerning a patient carrier of VRE, a team of the prevention and healthcare security service (doctor + technician) made an investigation. A review of files was conducted to draw the synoptic table and the table of cases. Results: By contacting the microbiology laboratory, we have identified four other cases of VRE and who were hospitalized in Medical resuscitation department (2 cases, one of them was transferred to the Physical rehabilitation department), and Nephrology department (2 cases). The visit has allowed to detect several malfunctions in professional practice. A crisis cell has allowed to validate, coordinate and implement control measures following the recommendations of the Technical Center of nosocomial infections. In fact, the process was to technically isolate cases in their sector of hospitalization, to restrict the use of antibiotics, to strength measures of basic hygiene, and to make a screening by rectal swab for both cases and contacts (other patients and health staff). These measures have helped to control the situation and no other case has been reported for a month. 2 new cases have been detected in the intensive care unit after a month. However, these are short-term strategies, and other measures in the medium and long term should be taken into account in order to face similar outbreaks. Conclusion: The efforts to control the outbreak were not efficient since 2 new cases have been reported after a month. Therefore, a continuous monitoring in order to detect new cases earlier is crucial to minimize the dissemination of VRE.

Keywords: hospitals, nosocomial infection, outbreak, vancomycin-resistant enterococci

Procedia PDF Downloads 282
4432 The Comparison of Community Home-Based Care for the Aged in Kishiwada, Japan and Hangzhou, China

Authors: Zijiao Chai, Wangming Li

Abstract:

Hangzhou is one of the cities with the most serious aging in China. Community home-based care for the aged is an important solution to old-age care in aging society. In this aspect, Europe, the United States and Japan are on the top in the world. As an East Asian country, Japan has similar cultural traditions in pension with China. So, there is much enlightenment China can get from Japan in the mode of community home-based care for the aged. This paper introduces the mode of community home-based care for the aged in Kishiwada, Japan and Hangzhou, China. Then compare the two modes in the aspects of insurance system for the aged, community service and facilities, support system and so on. Thereby the success experience of Kishiwada and weaknesses of Hangzhou are summarized. At last, the improvement strategy of facility plan and service mode of community home-based care for the aged in China are also proposed.

Keywords: community, comparison, elderly-oriented, home-based care for the aged, support system

Procedia PDF Downloads 491
4431 Switched Uses of a Bidirectional Microphone as a Microphone and Sensors with High Gain and Wide Frequency Range

Authors: Toru Shionoya, Yosuke Kurihara, Takashi Kaburagi, Kajiro Watanabe

Abstract:

Mass-produced bidirectional microphones have attractive characteristics. They work as a microphone as well as a sensor with high gain over a wide frequency range; they are also highly reliable and economical. We present novel multiple functional uses of the microphones. A mathematical model for explaining the high-pass-filtering characteristics of bidirectional microphones was presented. Based on the model, the characteristics of the microphone were investigated, and a novel use for the microphone as a sensor with a wide frequency range was presented. In this study, applications for using the microphone as a security sensor and a human biosensor were introduced. The mathematical model was validated through experiments, and the feasibility of the abovementioned applications for security monitoring and the biosignal monitoring were examined through experiments.

Keywords: bidirectional microphone, low-frequency, mathematical model, frequency response

Procedia PDF Downloads 518
4430 Politics of Violence and Terrorism in the Nigeria Democracy and Its Implications on National Peace and Security

Authors: Felix O. Akinboyewa

Abstract:

To say that Nigeria is faced with the problem of domestic terrorism is to say the obvious. The spate of political assassination during the fourth republic (1999-2010) is representative of what has become a growing trend. In this research, an attempt was made to examine the problems of political assassination within the context of significant categories of domestic-related terrorism in Nigeria Democracy. The central questions are: What exactly are the nature of political violence and terrorist act in the Nigeria nascent democracy? Was there any factor responsible for the politics of violence and terrorist act in the Nigeria democracy? What implications can the political violence and terrorist act have on democratic consolidation, national peace, and security? What solutions can be proffered to eradicate terrorist act and political violence in the Nigeria democracy? The study adopted a descriptive survey design which falls within the empirical research methodology. The sample size of the study consisted of 220 subjects randomly selected. The main instruments used were questionnaire and interview schedule. Data generated from the study were analyzed using descriptive statistics such as percentage and tables. The research findings showed that unemployed youths and the members of Nigeria Union of Road Transport Workers (NURTW) were the major actors in political violence in Nigeria. They have access to weapons and ammunitions which they use to terrorize the populace. The research showed that factors responsible for the political violence and terrorism in Nigeria are: poor electoral administration; election rigging; poor security system; religious and ethnic sentiment; problems of poverty and unemployment; over-exuberance and low level of education. The study also showed that electoral violence affects smooth running democracy in Nigeria. On the measures to be taken to eradicate political violence and terrorism in Nigeria, the research showed that provision of employment opportunities would go a long way to solving the problem. Civil society as an important institution can help to reduce incidence of political violence in Nigeria. Also, government has greater role to play. The study concludes that adherence to the proffered suggestions would reduce the level of political violence and terrorist act in Nigeria.

Keywords: consolidation, democracy, peace, security, terrorism, violence

Procedia PDF Downloads 106
4429 Teenagers in Conflict with Law: Exploratory Study about Psychic Suffering

Authors: Carolina Alcântara, Ileno Costa

Abstract:

This study had the objective to systemize the main psycho-social and socioeducational aspects that related with the psychic suffering of adolescents in conflict of law and freedom privation. This research wanted to verify the signals and symptoms identified trough themselves perceptions related to their condition of health/insanity. In a similar way, it was objectified to know the opinions of the ambient conditions of the institution the use of the currently available resources for Health Service and Educational Service. The methodological proposal is based on the quant-qualitative analysis of interviews half-structuralized carried through with 36 teenagers was using psychiatric medication continuously. The data had pointed the experiences of sleeplessness and nightmares, associates or not with experiences of loss of reality (hallucinations) had constituted the illness most frequent. The self-punishment behavior appeared at second place. With regard to the ambient factors, it was verified that institution had, in general way, guaranteed the physical integrity and the maintenance of the health. Amongst the current available resources of Health Service, the administration of anticonvulsivants, in association with other psychotropic drugs has been widely used. The school was viewed as important device of available in the institution. By means of the adolescent’s understanding who do not like to go to the school, they don’t disqualify the knowledge, in contrast, they wanted for knowledge, however, they were frustrated for not having their educational supplies adequately, affirming that the school is weak or they do not learn. Finally, among the possible conclusions guided for the Winnicott’s thought, it was observed that institution in analysis is a representative of the paternal function. However, to begin the self-cure process is necessary that formation of therapeutical bonds. The group of teachers is identified as the main tool of change.

Keywords: serious psychic suffering, adolescent in conflict with the law, delinquency, privation of freedom

Procedia PDF Downloads 224
4428 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 128
4427 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 270
4426 Enabling Enterprise Information System Interoperability: A Future Perspective

Authors: Mahdi Alkaeed, Adeel Ehsan

Abstract:

Enterprise information systems (EIS) act as the backbone of organizations that belong to different domains. These systems not only play a major role in the efficient usage of resources and time but also throw light on the future roadmap for the enterprise. In today's rapidly expanding world of business and technology, enterprise systems from various heterogenous environments have to exchange information at some point, be it within the same organization or between different organizations. This reality strengthens the importance of interoperability between these systems, which is one of the key enablers of systems collaboration. Both information technology infrastructure and business processes have to be aligned with each other to achieve this effect. This will be difficult to attain if traditional tightly coupled architecture is used. Instead, a more loosely coupled service-oriented architecture has to be used. That would enable an effective interoperability level between different EIS. This paper discusses and presents the current work that has been done in the field of EIS interoperability. Along the way, it also discusses the challenges, solutions to tackle those challenges presented in the studied literature, and limitations, if any.

Keywords: enterprise systems interoperability, collaboration and integration, service-based architecture, open system architecture

Procedia PDF Downloads 92
4425 The Impact of Sports Employees' of Perceptions of Organizational Climate and Organizational Trust on Work Motivation

Authors: Bilal Okudan, Omur F. Karakullukcu, Yusuf Can

Abstract:

Work motivation is one of the fundamental elements that determine the attitudes and performance of employees towards work. In this sense, work motivation depends not only on individual and occupational factors but also on employees' perception of organizational climate and organizational trust. Organizations that are aware of this have begun to do more research on work motivation in recent years to ensure that employees have the highest possible performance. In this framework of the purpose of this study is to examine the effect of sports employees' perceptions of organizational climate and organizational trust on work motivation. In the study, it has also been analyzed if there is any significant difference in the department of sports services’ employees’ organizational climate and organizational trust perception, and work motivation levels in terms of gender, age, duty status, year of service and level of education. 278 sports managers, who work in the department of sports service’s central and field organization at least as a chief in the manager position, have been chosen with random sampling method and they have voluntarily participated in the study. In the study, the organizational climate scale which was developed by Bilir (2005), organizational trusts scale developed by koksal (2012) and work motivation scale developed by Mottaz J. Clifford (1985) have been used as a data collection tool. The questionnaire form used as a data collection tool in the study includes a personal information form consisting of 5 questions; questioning gender, age, duty status, years of service and level of education. In the study, Pearson Correlation Analysis has been used for defining the correlation among organizational climate, organizational trust perceptions and work motivation levels in sports managers and regression analysis has been used to identify the effect of organizational climate and organizational trust on work motivation. T-test for binary grouping and ANOVA analysis have been used for more than binary groups in order to determine if there is any significant difference in the level of organizational climate, organizational trust perceptions and work motivations in terms of the participants’ duty status, year of service and level of education. According to the research results, it has been found that there is a positive correlation between the department of sports services’ employees’ organizational climate, organizational trust perceptions and work motivation levels. According to the results of the regression analysis; it is understood that the sports employees’ perception of organizational climate and organizational trust are two main factors which affects the perception of work motivation. Also, the results show that there is a significant difference in the level of organizational climate and organizational trust perceptions and work motivations of the department of sports services’ employees in terms of duty status, year of service, and level of education; however, the results reveal that there is no significant difference in terms of age groups and gender.

Keywords: sports manager, organizational climate, organizational trust, work motivation

Procedia PDF Downloads 221
4424 Methods Used to Perform Requirements Elicitation for Healthcare Software Development

Authors: Tang Jiacheng, Fang Tianyu, Liu Yicen, Xiang Xingzhou

Abstract:

The proportion of healthcare services is increasing throughout the globe. The convergence of mobile technology is driving new business opportunities, innovations in healthcare service delivery and the promise of a better life tomorrow for different populations with various healthcare needs. One of the most important phases for the combination of health care and mobile applications is to elicit requirements correctly. In this paper, four articles from different research directions with four topics on healthcare were detailed analyzed and summarized. We identified the underlying problems in guidance to develop mobile applications to provide healthcare service for Older adults, Women in menopause, Patients undergoing covid. These case studies cover several elicitation methods: survey, prototyping, focus group interview and questionnaire. And the effectiveness of these methods was analyzed along with the advantages and limitations of these methods, which is beneficial to adapt the elicitation methods for future software development process.

Keywords: healthcare, software requirement elicitation, mobile applications, prototyping, focus group interview

Procedia PDF Downloads 121
4423 Applying Multivariate and Univariate Analysis of Variance on Socioeconomic, Health, and Security Variables in Jordan

Authors: Faisal G. Khamis, Ghaleb A. El-Refae

Abstract:

Many researchers have studied socioeconomic, health, and security variables in the developed countries; however, very few studies used multivariate analysis in developing countries. The current study contributes to the scarce literature about the determinants of the variance in socioeconomic, health, and security factors. Questions raised were whether the independent variables (IVs) of governorate and year impact the socioeconomic, health, and security dependent variables (DVs) in Jordan, whether the marginal mean of each DV in each governorate and in each year is significant, which governorates are similar in difference means of each DV, and whether these DVs vary. The main objectives were to determine the source of variances in DVs, collectively and separately, testing which governorates are similar and which diverge for each DV. The research design was time series and cross-sectional analysis. The main hypotheses are that IVs affect DVs collectively and separately. Multivariate and univariate analyses of variance were carried out to test these hypotheses. The population of 12 governorates in Jordan and the available data of 15 years (2000–2015) accrued from several Jordanian statistical yearbooks. We investigated the effect of two factors of governorate and year on the four DVs of divorce rate, mortality rate, unemployment percentage, and crime rate. All DVs were transformed to multivariate normal distribution. We calculated descriptive statistics for each DV. Based on the multivariate analysis of variance, we found a significant effect in IVs on DVs with p < .001. Based on the univariate analysis, we found a significant effect of IVs on each DV with p < .001, except the effect of the year factor on unemployment was not significant with p = .642. The grand and marginal means of each DV in each governorate and each year were significant based on a 95% confidence interval. Most governorates are not similar in DVs with p < .001. We concluded that the two factors produce significant effects on DVs, collectively and separately. Based on these findings, the government can distribute its financial and physical resources to governorates more efficiently. By identifying the sources of variance that contribute to the variation in DVs, insights can help inform focused variation prevention efforts.

Keywords: ANOVA, crime, divorce, governorate, hypothesis test, Jordan, MANOVA, means, mortality, unemployment, year

Procedia PDF Downloads 259
4422 An Assessment of the Usage of Learner Centred Methods among Student Teachers of Federal College of Education Kontagora

Authors: Sadiq Habiba Alhaji

Abstract:

This is a descriptive survey design intended to determine the level of usage of the learner centred methods by student teachers of Federal College of Education Kontagora, Niger State, Nigeria. The study was guided by two null hypotheses formulated by the researcher. The population of the study are students of Federal College of Education, Kontagora. The Target Population consisted of one hundred Teaching practice students drawn from sciences, Arts, and humanities who were posted to various schools practicing different teaching methods. The student teachers were supervised using the checklist designed by the researcher to determine their level of usage of learner centred methods. Data collected was analysed using t test of independent variables. It was recommended that pre service and in service teachers should be equipped with the skills of using learner centred methods.

Keywords: assessment, usage, learner centred, methods, student teachers

Procedia PDF Downloads 69
4421 Structural Stress of Hegemon’s Power Loss: A Pestle Analysis for Pacification and Security Policy Plan

Authors: Sehrish Qayyum

Abstract:

Active military power contention is shifting to economic and cyberwar to retain hegemony. Attuned Pestle analysis confirms that structural stress of hegemon’s power loss drives a containment approach towards caging actions. Ongoing diplomatic, asymmetric, proxy and direct wars are increasing stress hegemon’s power retention due to tangled military and economic alliances. It creates the condition of catalepsy with defective reflexive control which affects the core warfare operations. When one’s own power is doubted it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of Hegemon’s power game since the early WWI to WWII, WWII-to Cold War and then to the current era in three chronological periods exposits that Thucydides’s trap became the reason for war broke out. Thirst for power is the demise of imagination and cooperation for better sense to prevail instead it drives ashes to dust. Pestle analysis is a wide array of evaluation from political and economic to legal dimensions of the state matters. It helps to develop the Pacification and Security Policy Plan (PSPP) to avoid hegemon’s structural stress of power loss in fact, in turn, creates an alliance with maximum amicable outputs. PSPP may serve to regulate and pause the hurricane of power clashes. PSPP along with a strategic work plan is based on Pestle analysis to deal with any conceivable war condition and approach for saving international peace. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a generic application of probability tests to find the best possible options and conditions to develop PSPP for any adversity possible so far. Innovation in expertise begets innovation in planning and action-plan to serve as a rheostat approach to deal with any plausible power clash.

Keywords: alliance, hegemon, pestle analysis, pacification and security policy plan, security

Procedia PDF Downloads 91
4420 Self-Serving or Self-Effacing: An Analysis of the Zimbabwe-United Kingdom Diaspora`S Role in Human Rights Advocacy

Authors: J.T. Chivanga

Abstract:

This paper conceptualizes the significance of human rights activism by the Zimbabwean diaspora in the United Kingdom by analyzing how the diaspora advocates for the promotion of the rights of the people in Zimbabwe. It critiques the strategic essentialism theory that is used by the government of Zimbabwe as a basis to discredit the work of transnational advocacy groups. The research advances this position by articulating that the diaspora does not falsify nor simplify them to garner external support on the human rights situation in Zimbabwe. It establishes and shows the significance of transnational advocacy by articulating how the Zimbabwean diaspora addresses and brings to the attention of the international community human rights violations in Zimbabwe that would otherwise not have seen the light of day due to the absence of a conducive environment in that country that stifles the organization of protests under repressive laws such as the public order and security act of 2009.

Keywords: strategic essentialism, transnational advocacy, public order and security act, Zimbabwe diaspora

Procedia PDF Downloads 219
4419 Internal Corrosion Rupture of a 6-in Gas Line Pipe

Authors: Fadwa Jewilli

Abstract:

A sudden leak of a 6-inch gas line pipe after being in service for one year was observed. The pipe had been designed to transport dry gas. The failure had taken place in 6 o’clock position at the stage discharge of the flow process. Laboratory investigations were conducted to find out the cause of the pipe rupture. Visual and metallographic observations confirmed that the pipe split was due to a crack initiated in circumferential and then turned into longitudinal direction. Sever wall thickness reduction was noticed on the internal pipe surface. Scanning electron microscopy observations at the fracture surface revealed features of ductile fracture mode. Corrosion product analysis showed the traces of iron carbonate and iron sulphate. The laboratory analysis resulted in the conclusion that the pipe failed due to the effect of wet fluid (condensate) caused severe wall thickness dissolution resulted in pipe could not stand the continuation at in-service working condition.

Keywords: gas line pipe, corrosion prediction ductile fracture, ductile fracture, failure analysis

Procedia PDF Downloads 68
4418 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 50
4417 Teaching Vietnamese as the Official Language for Indigenous Preschool Children in Lai Chau, Vietnam: Exploring Teachers' Beliefs about Second Language Acquisition

Authors: Thao Thi Vu, Libby Lee-Hammond, Andrew McConney

Abstract:

In Vietnam, the Vietnamese language is normally used as the language of instruction. The dominance of this language places children who have a different first language such as Indigenous children at a disadvantage when commencing school. This study explores preschool teachers’ beliefs about second language acquisition in Lai Chau provinces where is typical of highland provinces of Vietnam and the proportion of Indigenous minority groups in high. Data were collected from surveys with both closed-end questions and opened-end questions. The participants in this study were more than 200 public preschool teachers who come from eight different districts in Lai Chau. An analysis of quantitative data survey is presented to indicate several practical implications, such as the connection between teachers’ knowledge background that gained from their pre-service and in-service teacher education programs regarding second language teaching for Indigenous children and their practice. It also explains some factors that influence teachers’ beliefs and perspective about Indigenous children and pedagogies in their classes.

Keywords: indigenous children, learning Vietnamese, preschool, teachers’ beliefs

Procedia PDF Downloads 400