Search results for: cyber security education
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9772

Search results for: cyber security education

8152 Gaia (Earth) Education Philosophy – A Journey Back to the Future

Authors: Darius Singh

Abstract:

This study adopts a research, develop, and deploy methodology to create a state-of-the-art forest preschool environment using technology and the Gaia (Earth) Education Philosophy as design support. The new philosophy adopts an ancient Greek terminology, “Gaia,” meaning “Mother Earth”, and it take its principle to model everything with the oldest living and breathing entity that it know – Earth. This includes using nature and biomimicry-based principles in building design, environments, curricula, teaching, learning, values and outcomes for children. The study highlights the potential effectiveness of the Gaia (Earth) Education Philosophy as a means of designing Earth-inspired environments for children’s learning. The discuss the strengths of biomimicry-based design principles and propose a curriculum that emphasizes natural outcomes for early childhood learning. Theoretical implications of the study are that the Gaia (Earth) Education Philosophy could serve as a strong foundation for educating young learners.it present a unique approach that promotes connections with Earth-principles and lessons that can contribute to the development of social and environmental consciousness among children and help educate generations to come into a stable and balanced future.

Keywords: earth science, nature education, sustainability, gaia, forest school, nature, inspirational teaching and learning

Procedia PDF Downloads 52
8151 Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: authentication, key-session, security, wireless sensors

Procedia PDF Downloads 309
8150 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 346
8149 The Design Method of Artificial Intelligence Learning Picture: A Case Study of DCAI's New Teaching

Authors: Weichen Chang

Abstract:

To create a guided teaching method for AI generative drawing design, this paper develops a set of teaching models for AI generative drawing (DCAI), which combines learning modes such as problem-solving, thematic inquiry, phenomenon-based, task-oriented, and DFC . Through the information security AI picture book learning guided programs and content, the application of participatory action research (PAR) and interview methods to explore the dual knowledge of Context and ChatGPT (DCAI) for AI to guide the development of students' AI learning skills. In the interviews, the students highlighted five main learning outcomes (self-study, critical thinking, knowledge generation, cognitive development, and presentation of work) as well as the challenges of implementing the model. Through the use of DCAI, students will enhance their consensus awareness of generative mapping analysis and group cooperation, and they will have knowledge that can enhance AI capabilities in DCAI inquiry and future life. From this paper, it is found that the conclusions are (1) The good use of DCAI can assist students in exploring the value of their knowledge through the power of stories and finding the meaning of knowledge communication; (2) Analyze the transformation power of the integrity and coherence of the story through the context so as to achieve the tension of ‘starting and ending’; (3) Use ChatGPT to extract inspiration, arrange story compositions, and make prompts that can communicate with people and convey emotions. Therefore, new knowledge construction methods will be one of the effective methods for AI learning in the face of artificial intelligence, providing new thinking and new expressions for interdisciplinary design and design education practice.

Keywords: artificial intelligence, task-oriented, contextualization, design education

Procedia PDF Downloads 14
8148 Teachers' Perceptions of Physical Education and Sports Calendar and Conducted in the Light of the Objective of the Lesson Approach Competencies

Authors: Chelali Mohammed

Abstract:

In the context of the application of the competency-based approach in the system educational Algeria, the price of physical education and sport must privilege the acquisition of learning approaches and especially the approach science, which from problem situations, research and develops him information processing and application of knowledge and know-how in new situations in the words of ‘JOHN DEWEY’ ‘learning by practice’. And to achieve these goals and make teaching more EPS motivating, consistent and concrete, it is appropriate to perform a pedagogical approach freed from the constraints and open to creativity and student-centered in the light of the competency approach adopted in the formal curriculum. This approach is not unusual, but we think it is a highly professional nature requires the competence of the teacher.

Keywords: approach competencies, physical, education, teachers

Procedia PDF Downloads 594
8147 Tracking Subjectivity in Political Socialization: University Students' Perceptions of Citizenship Learning Experiences in Chinese Higher Education

Authors: Chong Zhang

Abstract:

There is widespread debate about the nationalistic top-down approach to citizenship education. Employing the notion of cultural citizenship as a useful theoretical lens, citizenship education research tends to focus on the process of subjectivity construction among students’ citizenship learning process. As the Communist Party of China (CPC) plays a dominant role in cultivating citizens through ideological and political education (IaPE) in Chinese universities, the research problem herein focuses on the dynamics and complexity of how Chinese university students construct their subjectivities regarding citizenship learning through IaPE, mediated by the interaction between the state and university teachers. Drawing on questionnaire data from 212 students and interview data from 25 students in one university in China, this paper examines the ways in which students understand and respond to dominant discourses. Its findings reveal there is a deficit of citizenship learning in IaPE, and that students feel ideologically pressurized. From its analysis of social contexts’ influence, the article suggests Chinese higher education students act as either mild changemakers or active self-motivators to enact complex subjectivities, in that they must involve themselves in IaPE for personal academic and career development, yet adopt covert strategies to realise their self-conscious citizenship learning expectations. These strategies take the form of passive and active freedoms, ranging from obediently completing basic curriculum requirements and distancing themselves by studying abroad, to actively searching for learning opportunities from other courses and social media. This paper contributes to the research on citizenship education by recognizing the complexities of how subjectivities are formed in formal university settings.

Keywords: university students, citizenship learning, cultural citizenship, subjectivity, Chinese higher education

Procedia PDF Downloads 110
8146 Higher Education and Empowerment of Women: A Case Study

Authors: Anupam Deka

Abstract:

Gender discrimination has been considered as a major obstacle in granting equal opportunity for woman in Higher education as education plays a pivotal role in a country’s socio-economic development. To examine the empowerment of women in the higher education field of Assam, a case study has been carried out. In the first stage, an overview of enrolment of students in different courses has been made by considering the whole state. In the second stage a study has been conducted regarding the enrolment of students in various degree and P-G courses for the period 2000-2007 under Gauhati University (which is one of the four universities of Assam) and the relevant data has been collected. It has been found that though the enrolment of students in the degree levels has been constantly increasing, but the enrolment of girls are not proportionately increasing, specially in commerce and law. On the other hand, in the post-graduate level, these proportions are higher in almost all the subjects (except some subjects like M. COM., L.L.M, M. C. A., Mathematics, etc.), indicating that more number of girls than boys are taking admission in the P-G courses.

Keywords: field study, enrolment of girls in degree and P G levels, regression lines, Chi Square test, diagrams and statistical tables

Procedia PDF Downloads 258
8145 Exploring Enabling Effects of Organizational Climate on Academicians’ Emotional Intelligence and Learning Outcomes: A Case from Chinese Higher Education

Authors: Zahid Shafait, Jiayu Huang

Abstract:

Purpose: This study is based on a trait-based theory of emotional intelligence. This study intends to explore the enabling effect of organizational climate, i.e., affiliation, innovation, and fairness, on the emotional intelligence of teachers in Chinese higher education institutes. This study, additionally, intends to investigate the direct impact of teachers’ emotional intelligence on their learning outcomes, i.e., cognitive, social, self-growth outcomes and satisfaction with the university experience. Design/methodology/approach: This study utilized quantitative research techniques to scrutinize the data. Moreover, partial least squares structural equation modeling, i.e., PLS-SEM, was used to assess the hypothetical relationships to conclude their statistical significance. Findings: Results confirmed the supposed associations, i.e., the organizational climate has an enabling effect on emotional intelligence. Likewise, emotional intelligence was concluded to have a direct and positive association with learning outcomes in higher education. Practical implications: This study has investigated abandoned research that is enabling the effects of organizational climate on teachers’ emotional intelligence in Chinese higher education. Organizational climate enables emotionally intelligent teachers to learn efficiently and, at the same time, augments their satisfaction and productivity within an institution. Originality/value: This study investigated the enabling effects of organizational climate on teachers’ emotional intelligence in Chinese higher education that is original in investigated country and sector.

Keywords: organizational climate, emotional intelligence, learning outcomes, higher education

Procedia PDF Downloads 66
8144 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 432
8143 Evaluation Model in the Branch of Virtual Education of “Universidad Manuela Beltrán” Bogotá-Colombia

Authors: Javier López

Abstract:

This Paper presents the evaluation model designed for the virtual education branch of The “Universidad Manuela Beltrán, Bogotá-Colombia”. This was the result of a research, developed as a case study, which had three stages: Document review, observation, and a perception survey for teachers. In the present model, the evaluation is a cross-cutting issue to the educational process. Therefore, it consists in a group of actions and guidelines which lead to analyze the student’s learning process from the admission, during the academic training, and to the graduation. This model contributes to the evaluation components which might interest other educational institutions or might offer methodological guidance to consolidate an own model

Keywords: model, evaluation, virtual education, learning process

Procedia PDF Downloads 435
8142 4P-Model of Information Terrorism

Authors: Nataliya Venelinova

Abstract:

The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.

Keywords: information terrorism, mass communication cycle, public perception, security

Procedia PDF Downloads 159
8141 A Collaborative Action Research by Using the Children’s School Success Plus Curriculum Framework to Support Early Childhood Education/Early Childhood Special Education Teachers to Build a Professional Learning Community

Authors: Chiou-Shiue Ko, Pei-Fang Wu, Shu-hsien Tseng

Abstract:

The researchers adopted two-year action research to investigate the professional collaborative process and development in learning communities for both early childhood and early childhood special education teachers on implementing the children’s school success curriculum framework. The participating teachers were recruited from three preschool sites for this current study. Research data were collected from multiple methods in order to ensure the data quality and validity. The results showed that participating educators had achieved professional growth, and they became more aware of teaching intentions and the preparation for the curriculum. Teachers in this research become more child-focused in teaching and create opportunities for children to participate in classroom activities and routines. The researcher also finds teachers’ participation levels were driven by each individual personality; during professional growth, some teachers are more proactive and reflective, and some are not. According to the research findings, suggestions for future studies and practices are provided.

Keywords: children’s school success curriculum framework, early childhood special education, preschool education, professional learning community

Procedia PDF Downloads 119
8140 Mobile Schooling for the Most Vulnerable Children on the Street: An Innovation

Authors: Md. Shakhawat Ullah Chowdhury

Abstract:

Mobile school is an innovative methodology in non-formal education to increase access to education for children during conflict through theatre for education for appropriate basic education to children during conflict. The continuous exposure to harsh environments and the nature of the lifestyles of children in conflict make them vulnerable. However, the mobile school initiative takes into consideration the mobile lifestyle of children in conflict. Schools are provided considering the pocket area of the street children with portable chalkboards, tin of books and materials as communities move. Teaching is multi-grade to ensure all children in the community benefit. The established mobile schools, while focused on basic literacy and numeracy skills according to traditions of the communities. The school teachers are selected by the community and trained by a theatre activist. These teachers continue to live and move with the community and provide continuous education for children in conflict. The model proposed a holistic team work to deliver education focused services to the street children’s pocket area where the team is mobile. The team consists of three members –an educator (theatre worker), a psychological counsellor and paramedics. The mobile team is responsible to educate street children and also play dramas which specially produce on the basis of national curriculum and awareness issues for street children. Children enjoy play and learn about life skills and basic literacy and numeracy skills which may be a pillar of humanitarian aid during conflict.

Keywords: vulnerable, children in conflict, mobile schooling, child-friendly

Procedia PDF Downloads 417
8139 Together - A Decentralized Application Connects Ideas and Investors

Authors: Chandragiri Nagadeep, M. V. V. S. Durga, Sadu Mahikshith

Abstract:

Future generation is depended on new ideas and innovations that develops the country economical growth and technology standards so, Startups plays an important role in satisfying above goals. Startups includes support which is given by investing into it by investors but, single digit investors can’t keep supporting one startup and lot of security problems occurs while transferring large funds to startup’s bank account. Targeting security and most supportive funding, TogEther solves these issues by providing a platform where “Crowd Funding” is available in a decentralized way such that funding is done with digital currency called cryptocurrency where transactions are done in a secured way using “Block Chain Technology”. Not only Funding but also Ideas along with their documents can be presented and hosted with help of IPFS (Inter Planetary File System).

Keywords: blockchain, ethereum, web3, reactjs, interplanetary file system, funding

Procedia PDF Downloads 202
8138 Agricultural Extension Education for Female: A Tool for Sustainable Rural Development in Pakistan

Authors: Jahanzaib

Abstract:

The rural economy can be uplifted through agricultural extension education for female as the majority is uneducated. The present study was carried out in five districts (Bahawalpur, Lodhran, Raheem Yar Khan, Bahawalnagr, and Vehari) of southern Punjab, Pakistan. The ten females were selected from each district, poor economic background for agricultural training. The training was provided free of cost, through Punjab skills development program. After six month training, the trainees were awarded with certificates and a tool kit. After completion of training data was recorded and analyzed, the results indicate that, female trainees were in a better economic position than the females of nearby districts without training. From this study, we can conclude that agricultural education for female can not only improve the economy of the individual family but also improve the agriculture of Pakistan on the sustainable basis as the majority of workers are female in rural areas of Pakistan.

Keywords: agricultural extension education, sustainable rural development, agriculture, rural development in Pakistan

Procedia PDF Downloads 226
8137 The Role of Muslim Scholars in Promoting Islamic Education in Katsina State, Nigeria

Authors: Abdulbasit Musa Ahmad Karkarku

Abstract:

Knowledge is the best asset you can leave for your child, especially the knowledge of Islam because it facilitates success in this life and the next. This made it necessary for every Muslim male and female to acquire Islamic education. The objective of this research is to highlight the role played by Muslim scholars in promoting Islamic education in Katsina State, Nigeria. There are so many problems facing Muslim scholars in the area of study; some of these problems include a lack of government support for Muslim scholars, a lack of community support, and a lack of financial support from wealthy individuals and philanthropists. In this research, two methods were used concurrently, i.e., library and interview methods. In the library method, the researcher consulted books and other academic works. In the course of this research, parents and religious leaders were interviewed in order to collect needed data information from them. The major findings of this research have shown that the Muslim scholars in area of study have contributed tremendously toward the development of Islamic education. Also, Muslim scholars played a vital role in the promotion of Islamic education in the area of study and beyond. In view of the above, some suggestions were highlighted with the view toward solving the associated problems; the government at every level should come to the aid of these Muslim scholars in order to provide them with basic amenities. The Philanthropists and wealthy individuals should help the Muslim scholars by giving them financial assistance. Also, communities have a vital role to play in order to improve the condition of Muslim scholars by giving them more donations.

Keywords: education, Islamic, Muslim, scholars

Procedia PDF Downloads 119
8136 “By Failing To Prepare, We Prepare to Fail”: Inadequate Preparedness in Disaster Relief Nursing

Authors: Mary Holstein

Abstract:

Objective: The aim of this study was to evaluate nurse leader confidence in emergency management and disaster preparedness in the state of Texas. My project was a replication study of a survey conducted in 2022 by Reedy et al, for members of the Northwest Organization for Nurse Leaders (NONL). Background: In 2022, the American Association of Colleges of Nursing (AACN) approved new essentials for academic nursing education programs to demonstrate competencies in disaster management, yet no integration of such information into nursing curriculum had been reported in the literature. Research replicated by members of the Texas Organization for Nursing Leadership suggested significant gaps in nurse leader confidence across roles and in structured education that prepares nurse leaders across the spectrum of experience to lead in a crisis. Methods: An exploratory, cross-sectional survey used a sample of 86 RNs who were members of TONL. Results: Results replicated comparable results with significant variance in nurse leader confidence across roles, experience, and previous disaster-related education. Positive associations regarding nurse leaders' confidence in managing disasters were obvious with more advanced positions, further education, and mandatory training. Conclusions: Nursing leaders in Texas lack mandatory and structured education to prepare for emergency and disaster management. The call for mandatory emergency management training and disaster preparedness for nurse leaders remains unmet.

Keywords: confidence, disaster, education, emergency

Procedia PDF Downloads 52
8135 Teaching Contemporary Power Distribution and Industrial Networks in Higher Education Vocational Studies

Authors: Rade M. Ciric

Abstract:

The paper shows the development and implementation of the syllabus of the subject 'Distribution and Industrial Networks', attended by the vocational specialist Year 4 students of the Electric Power Engineering study programme at the Higher Education Technical School of Vocational Studies in Novi Sad. The aim of the subject is to equip students with the knowledge necessary for planning, exploitation and management of distributive and industrial electric power networks in an open electricity market environment. The results of the evaluation of educational outcomes on the subject are presented and discussed.

Keywords: engineering education, power distribution network, syllabus implementation, outcome evaluation

Procedia PDF Downloads 388
8134 Restructuring the College Classroom: Scaffolding Student Learning and Engagement in Higher Education

Authors: Claire Griffin

Abstract:

Recent years have witnessed a surge in the use of innovative teaching approaches to support student engagement and higher-order learning within higher education. This paper seeks to explore the use of collaborative, interactive teaching and learning strategies to support student engagement in a final year undergraduate Developmental Psychology module. In particular, the use of the jigsaw method, in-class presentations and online discussion fora were adopted in a ‘lectorial’ style teaching approach, aimed at scaffolding learning, fostering social interdependence and supporting various levels of student engagement in higher education. Using the ‘Student Course Engagement Questionnaire’, the impact of such teaching strategies on students’ college classroom experience was measured, with additional qualitative student feedback gathered. Results illustrate the positive impact of the teaching methodologies on students’ levels of engagement, with positive implications emerging across the four engagement factors: skills engagement, emotional engagement, participation/interaction engagement and performance engagement. Thematic analysis on students’ qualitative comments also provided greater insight into the positive impact of the ‘lectorial’ teaching approach on students’ classroom experience within higher level education. Implications of the findings are presented in terms of informing effective teaching practices within higher education. Additional avenues for future research and strategy usage will also be discussed, in light of evolving practice and cutting edge literature within the field.

Keywords: learning, higher education, scaffolding, student engagement

Procedia PDF Downloads 360
8133 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis

Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo

Abstract:

The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.

Keywords: IoT, ethical concerns, privacy, safety, security, smart devices

Procedia PDF Downloads 69
8132 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 81
8131 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 530
8130 Structuring After-School Physical Education Programs That are Engaging, Diverse, and Inclusive

Authors: Micah J. Dobson

Abstract:

After-school programs of physical education provide children with opportunities to engage in physical activities while developing healthy habits. To ensure that these programs are inclusive, diverse, and engaging, however, schools must consider various factors when designing and implementing them. This study sought to bring out efficient strategies for structuring after-school programs of physical education. The literature review was conducted using various databases and search engines. Some databases that index the journals include ERIC, Google Scholar, Scopus, Web of Science, and EBSCOhost. The search terms were combinations of keywords such as “after-school,” “physical education,” “inclusion,” “diversity,” “engagement,” “program design,” “program implementation,” “program effectiveness,” and “best practices.” The findings of this study suggest that schools that desire inclusivity must consider four key factors when designing and implementing after-school physical education programs. First, the programs must be designed with variety and fun by incorporating activities such as dance, sports, and games that appeal to all students. Second, instructors must be trained to create supportive and positive environments that foster student engagement while promoting physical literacy. Third, schools must collaborate with community stakeholders and organizations to ensure that programs are culturally inclusive and responsive. Fourth, schools can incorporate technology into their programs to enhance engagement and provide additional growth and learning opportunities.In conclusion, this study provides valuable insights into efficient strategies for structuring after-school programs of physical education that are inclusive, diverse, and engaging for all students. By considering these factors when designing and implementing their programs, schools can promote physical activity while supporting students’ overall well-being and health.

Keywords: after-school programs of physical education, community partnership, inclusivity, instructor training, technology

Procedia PDF Downloads 68
8129 Determinants of Mobile Banking Apps Adoption among Bank Customers in Ghana

Authors: Masud Ibrahim

Abstract:

in Ghana. The sample of the study comprised 450 bank customers from universal banks operating in Ghana. A conceptual framework was framed from a revised TAM model. A total of nine hypotheses were developed and tested using Structural Equation Modeling Technique. Findings from this study revealed that perceived ease of use and perceived usefulness are influenced positively by design and perceived security. Also, perceived ease of use, social influence and perceived security risk were found to have a strong influence on mobile banking app adoption intention. This study provides significant insights and implications for banking organizations on how to ensure the adoption and usage of their mobile banking apps.

Keywords: mobile banking app, perceived ease of use, perceived usefulness, technology acceptance model

Procedia PDF Downloads 145
8128 The Place of Open Distance Education in Achieving Sustainable Development Goals (SDGs)

Authors: Morakinyo Akintolu, Moeketsi Letseka

Abstract:

In the year 2015, the United Nation member states, through the representative of all heads of states present, adopted the 17 Global goals known as the Sustainable Development Goals in their capacity to bring about social, economic, and cultural development to the world. Therefore, the need to accommodate equitable development one of the major goals is to achieve equitable and quality education for all to bring about international development. In this light, the study investigates the role of open distance learning in achieving sustainable development goals. Open distance learning comes as a second chance to individuals in disseminating educational content to students who missed the opportunity of attending the traditional school setting. Therefore, this study investigates if the SDGs reflect this type of learning (ODL) in creating Education for all according to the 2030 agenda by the United Nations. It further ascertains the role of ODL in achieving SDGs, the challenges encountered as well as the way forward.

Keywords: open distance learning, sustainable development goals, distance education, achieving, 2030 agenda

Procedia PDF Downloads 121
8127 A Deviation Analysis of Career Anchors and Domain Specialization in Management Education

Authors: Santosh Kumar Sharma, Imran Ahmed Khan

Abstract:

Context: In the field of management education, it has been observed that students often have discrepancies between their career anchors and their chosen domain of specialization. This misalignment creates challenges for students during their summer internships and job placements in the corporate sector. The outcome is that some students opt to change their career track or even leave the management profession altogether. This situation poses a significant concern in terms of the overall human capital in the industry. However, there is a notable lack of substantial literature addressing this specific context. Therefore, this current study aims to contribute to the global discourse on management education and its impact on human resource management. Research Aim: The objective of this study is to analyze the deviation between career anchors and domain specialization in the context of management education in India. Methodology: This study adopts an exploratory approach. Data is collected from a substantial sample of post-graduate students who are currently pursuing management education from a renowned business school in India. The data collection process is followed by a descriptive analysis. Findings: The findings of this research contribute to the professional development of management students by highlighting the significance of aligning career anchors with their chosen domain of specialization. This alignment is crucial for enhancing human capital, which in turn impacts various factors within the Indian economy. Theoretical Importance: This study addresses the gap in the existing literature by exploring the relationship between career anchors and domain specialization in management education. By shedding light on this issue, it contributes to theoretical knowledge in the field and provides insights into the importance of career alignment within the management profession.

Keywords: management education, specialization, human resource management, India

Procedia PDF Downloads 49
8126 Expansion of Subjective Learning at Japanese Universities: Experiential Learning Based on Social Participation

Authors: Kumiko Inagaki

Abstract:

Qualitative changes to the undergraduate education have recently become the focus of attention in Japan. This is occurring against the backdrop of declining birthrate and increasing university enrollment, as well as drastic societal changes of advance toward globalization and a knowledge-based society. This paper describes the cases of Japanese universities that promoted various forms of experiential learning around the theme of social participation. The opportunity of learning through practical experience, where students turn their attention to social problems and take pains to consider means of resolving them, creates opportunities to demonstrate “human power” applicable to all sorts of activities the following graduation, thereby guaranteeing students’ continuous growth throughout their careers.

Keywords: career education, experiential learning, subjective learning, university education

Procedia PDF Downloads 299
8125 Structural Inequality and Precarious Workforce: The Role of Labor Laws in Destabilizing the Labor Force in Iran

Authors: Iman Shabanzadeh

Abstract:

Over the last three decades, the main demands of the Iranian workforce have been focused on three areas: "The right to a decent wage", "The right to organize" and "The right to job security". In order to investigate and analyze this situation, the present study focuses on the component of job security. The purpose of the study is to figure out what mechanisms in Iran's Labor Law have led to the destabilization and undermining of workers' job security. The research method is descriptive-analytical. To collect information, library and document sources in the field of laws related to labor rights in Iran and, semi-structured interviews with experts have been used. In the data analysis stage, the qualitative content analysis method was also used. The trend analysis of the statistics related to the labor force situation in Iran in the last three decades shows that the employment structure has been facing an increase in the active population, but in the last decade, a large part of this population has been mainly active in the service sector, and contract-free enterprises, so a smaller share of this employment has insurance coverage and a larger share has underemployment. In this regard, the results of this study show that four contexts have been proposed as the main legal and executive mechanisms of labor instability in Iran, which are: 1) temporaryization of the labor force by providing different interpretations of labor law, 2) adjustment labor in the public sector and the emergence of manpower contracting companies, 3) the cessation of labor law protection of workers in small workshops and 4) the existence of numerous restrictions on the effective organization of workers. The theoretical conclusion of this article is that the main root of the challenges of the labor society and the destabilized workforce in Iran is the existence of structural inequalities in the field of labor security, whose traces can be seen in the legal provisions and executive regulations of this field.

Keywords: inequality, precariat, temporaryization, labor force, labor law

Procedia PDF Downloads 44
8124 The Importance of Teachers´ Self-Efficacy in the Field of Education of Socially Disadvantaged Students

Authors: Anna Petr Safrankova, Karla Hrbackova

Abstract:

The education of socially disadvantaged students is in the long term spotlight of many pedagogical researches in both Czech and foreign environment. These researches among others investigate this topic from the point of view of individual compensatory measure which tries to overcome or remove the social disadvantage. The focus of the study is to highlight the important role of teachers in the education of this specific group of students, among others in terms of their (teachers´) pre-graduate training. The aim of the study is to point out the importance of teachers´ self-efficacy. The study is based on the assumption that the teacher's self-efficacy may significantly affect the teacher's perception of a particular group of students and thereby affect the education of the students. The survey involved 245 teachers from the two regions in the Czech Republic. In the research were used TES questionnaire (with the dimensions personal teaching efficacy – PTE and general teaching efficacy – GTE) by Gibson and Dembo and the semantic differential (containing 12 scales with bipolar adjectives) which investigated the components of teachers' attitudes toward socially disadvantaged students. It was found that teachers’ self-efficacy significantly affects the teachers’ perception of the group of socially disadvantaged students. Based on this finding we believe that it is necessary to work with this concept (prepare teachers to educate this specific group of students) already during higher education and especially during the pre-graduate teachers training.

Keywords: teachers, socially disadvantaged students, semantic differential, teachers self-efficacy

Procedia PDF Downloads 414
8123 The History of the Birth of Tunisian Higher Accounting Education

Authors: Rim Khemiri, Mariam Dammak

Abstract:

The aim of this study is to trace the historical evolution of Tunisian higher accounting education and to understand and highlight the circumstances of its birth and its development. A documentary study (archival documents, official documents, public speeches, etc.), as well as semi-directive interviews with key actors, were carried out as part of this research work. These interviews aim to fill a lack of information on this subject and to confirm events addressed by other sources, but for which it lacks the elements necessary for a good understanding. After having put forward the specificities of the Tunisian context, we will, first of all, proceed to a review of the literature related to our theme in various contexts of the world. Then, we will present the evolution of the accounting curriculum by highlighting the circumstances of its birth and those of the successive reforms led by the Tunisian government. The study of higher accounting education in Tunisia and its evolution has several interests. The first lies in understanding the circumstances of its birth and its evolution in relation to the historical, socio-economic, and political context of the country. The second is to propose a reading grid that allows an understanding of the reforms that led to the university accountancy accounting course as we know it today. And, the third, aims to complete the literature on the processes of evolution of higher education accounting, by treating a different context, in order to provide additional knowledge necessary to compare experiences in this area around the world.

Keywords: accounting history, higher accounting education, socio-economic and political context, Tunisian context

Procedia PDF Downloads 116