Search results for: Arabic Fodio Nigeria security
3708 An Investigation into Nigerian Consumers' Preference for Certain Categories of Foreign Products
Authors: Nnedum Obiajuru Anthony Ugochukwu, Emmanuel Ezechukwu
Abstract:
This study was designed to investigate into Nigerian consumers’ preference for foreign products. Studies have discovered that Nigerian consumers like their counterparts in most developing countries have an insatiable preference for foreign products especially those from more technologically advanced countries (Okechukwu & Onyema, 1999; Agbonifoh & Elimimian, 1999). This attitude of the Nigerian consumers has resulted in many problems which challenge the industrial sector in Nigeria – lack of patronage resulting to, non-performing firms, endemic unemployment, underdeveloped industries and general lack of industrial growth. The major objective of this study is to investigate the reasons behind such attitude, and the factors that drive consumer preference for foreign products among Nigerian consumers. The study investigated specifically the psychological dimensions (personal values, self-concept, lifestyle and prestige), and demographic factors (age, gender, level of education, income and occupation) that impact consumers’ preference for imported products in Nigeria. The study was cross-sectional and used survey method to collect data from one hundred and eighty-six respondents among postgraduate and part-time students of Nnamdi Azikiwe University, Awka and consumers from Awka metropolis. The results of the study indicated that all the psychological variables used to measure consumer preference for foreign products were largely positive and significant determinants of consumer preference for foreign products. Demographic variables of age, gender, and income were not significant determinants of preference for foreign products. The results of the study, however, showed that level of education and occupation has the significant effect on consumer preference for foreign products.Keywords: country of origin, xenocentrism, Nigeria, ethnocentrism, foreign products, consumer preference
Procedia PDF Downloads 3273707 Assessment of Trace Metal Concentration of Soils Contaminated with Carbide in Abraka, Delta State, Nigeria
Authors: O.M. Agbogidi, I.M. Onochie
Abstract:
An investigation was carried out on trace metal concentration of soils contaminated with carbide in Abraka, Delta State, Nigeria in 2014 with a view to providing baseline formation on their status relative to the control plants and to the tolerable limits recommended by World standard bodies including WHO and FAO. The metals were analyzed using the Atomic Absorption Spectrophotometer which showed an elevated level when compared with the control plots. High level of metals including Fe, Pb, Zn, Cu, Cd, Ni, Cr and arsenic were recorded and these values were significantly different (P<0.05) from values obtained from the control plots. These results are indicative of the fact that carbide polluted soil had higher level of trace metals and because these metals are non-biodegradable elements in the ecosystem, a rise to their lethal levels in food chains is envisaged due to the interdependency of plants and animals stemming from soil-water organisms interrelationship.Keywords: bio-concentration, carbide contaminated soils, heavy metals, trace metals
Procedia PDF Downloads 2753706 Measuring Student Teachers' Attitude and Intention toward Cell-Phone Use for Learning in Nigeria
Authors: Shittu Ahmed Tajudeen
Abstract:
This study examines student-teachers’ attitude and intention towards cell-phone use for learning. The study involves one hundred and ninety (190) trainee teachers in one of the Institutes of Education in Nigeria. The data of the study was collected through a questionnaire on a rating of seven point likert-type Scale. The data collected was used to test the hypothesized model of the study using Structural Equation Modeling approach. The finding of the study revealed that Perceived Usefulness (PU), Perceived Ease of Use (PEU), Subjective Norm (SN) and Attitude significantly influence students’ intention towards adoption of cell-phone for learning. The study showed that perceived ease of use stands to be the strongest predictor of cell-phone use. The model of the study exhibits a good-fit with the data and provides an explanation on student- teachers’ attitude and intention towards cell-phone for learning.Keywords: cell-phone, adoption, structural equation modeling, technology acceptance model
Procedia PDF Downloads 4543705 An Analysis of the Strategic Pathway to Building a Successful Mobile Advertising Business in Nigeria: From Strategic Intent to Competitive Advantage
Authors: Pius A. Onobhayedo, Eugene A. Ohu
Abstract:
Nigeria has one of the fastest growing mobile telecommunications industry in the world. In the absence of fixed connection access to the Internet, access to the Internet is primarily via mobile devices. It, therefore, provides a test case for how to penetrate the mobile market in an emerging economy. We also hope to contribute to a sparse literature on strategies employed in building successful data-driven mobile businesses in emerging economies. We, therefore, sought to identify and analyse the strategic approach taken in a successful locally born mobile data-driven business in Nigeria. The analysis was carried out through the framework of strategic intent and competitive advantages developed from the conception of the company to date. This study is based on an exploratory investigation of an innovative digital company based in Nigeria specializing in the mobile advertising business. The projected growth and high adoption of mobile in this African country, coinciding with the smartphone revolution triggered by the launch of iPhone in 2007 opened a new entrepreneurial horizon for the founder of the company, who reached the conclusion that ‘the future is mobile’. This dream led to the establishment of three digital businesses, designed for convergence and complementarity of medium and content. The mobile Ad subsidiary soon grew to become a truly African network with operations and campaigns across West, East and South Africa, successfully delivering campaigns in several African countries including Nigeria, Kenya, South Africa, Ghana, Uganda, Zimbabwe, and Zambia amongst others. The company recently declared a 40% year-end profit which was nine times that of the previous financial year. This study drew from an in-depth interview with the company’s founder, analysis of primary and secondary data from and about the business, as well as case studies of digital marketing campaigns. We hinge our analysis on the strategic intent concept which has been proposed to be an engine that drives the quest for sustainable strategic advantage in the global marketplace. Our goal was specifically to identify the strategic intents of the founder and how these were transformed creatively into processes that may have led to some distinct competitive advantages. Along with the strategic intents, we sought to identify the respective absorptive capacities that constituted favourable antecedents to the creation of such competitive advantages. Our recommendations and findings will be pivotal information for anybody wishing to invest in the world’s fastest technology business space - Africa.Keywords: Africa, competitive advantage, competitive strategy, digital, mobile business, marketing, strategic intent
Procedia PDF Downloads 4363704 Predicting the Effects of Counseling Psychology on the Sexual Risk Behavior of In-School Adolescents: Implication for National Development
Authors: Olusola Joseph Adesina, Adebayo Adeyinka Salako
Abstract:
The study adopted a descriptive research design. Two hundred (200) in-school adolescents were purposely selected in Afijio Local Government Area of Oyo State. Two hypotheses were also raised to pilot the study. The researchers developed an instrument which was validated by psychological experts, the instrument tagged counseling psychology and sexual risk behavior questionnaire (CPSRBQ)(r = 0.78). The results were analysed using t-test at 0.05 level of significance. The result showed that there is a significant relationship between counseling psychology and sexual risk behavior of in-school adolescents. It was also noticed that there is a significant difference in the sexual risk behavior of male and female adolescents. Based on the findings, it was recommended that more counselors are still needed in Nigeria schools. There is need for restructuring Nigeria Curriculum most especially on sex education and related diseases. Lastly, adolescents should be more exposed to seminars on HIV/AIDS, sex education enlightenment programmes and marital counseling.Keywords: counseling psychology, sexual behavior, risk and adolescent, cognitive sciences
Procedia PDF Downloads 5093703 Evaluation of Apolipoprotein Profile in HIV/Aids Subjects in Pre and Post 12 Months Antiretroviral Therapy Using 1.5 NG/ML Troponin Diagnostic Cut-off for Myocardial Infarction in Nauth Nnewi, South Eastern Nigeria
Authors: I. P. Ezeugwunne, C. C. Onyenekwe, J. E. Ahaneku, G. I. Ahaneku
Abstract:
Introduction: It has been reported that acute myocardial infarction (AMI) might occur at 1.5 ng/ml troponin level. HIV infection has been documented to influence antiviral drugs, stimulate the production of proteins that enhance fatty acids synthesis. Information on cardiac status in HIV-infected subjects in Nigeria is scanty. Aim: To evaluate the Apolipoprotein profile of HIV subjects in pre-and-post 12 months of antiretroviral therapy (ART) using 1.5 ng/ml troponin diagnostic cut-off for myocardial infarction (MI) in Nnewi, South Eastern, Nigeria. Methodology: A total of 30 symptomatic HIV subjects without malaria co-infection with a mean age of 40.70 ±10.56 years were randomly recruited for this prospective case-controlled study. Serum apolipoproteins (Apo A1, A2, B, C2,C3 and Apo E), troponin and CD4 counts were measured using standard laboratory methods. Parameters were re-classified based on 1.5 ng/ml troponin diagnostic cut-off for MI. Analysis of variance and student paired t-tests were used for data analyses. Results: paired-wise comparison showed that there were significantly higher levels of CD4 counts, Apo A2, Apo C2, Apo E but lower levels of ApoA1, ApoB and ApoC3 in symptomatic HIV subjects before antiretroviral therapy (ART) when compared with after therapy at p<0.05 respectively. The troponin value was significantly higher amongst the group studied at p<0.05, respectively. Conclusion: The increased values of troponin observed among the groups were higher than the diagnostic cut-off for AMI. This may imply that AMI may occur at any group of studies. But the significant reduction in the serum levels of Apo A2, Apo B, Apo C3, Apo E and a significant increase in serum levels of Apo A1, Apo C2 and blood CD4 counts as the length of therapy lengthened may indicate possible cardio-protective effects of the ART on the heart, which may connote recovery.Keywords: ART, apolipoprotein, HIV, myocardial infarction
Procedia PDF Downloads 1643702 Evaluation of Phthalates Contents and Their Health Effects in Consumed Sachet Water Brands in Delta State, Nigeria
Authors: Edjere Oghenekohwiroro, Asibor Irabor Godwin, Uwem Bassey
Abstract:
This paper determines the presence and levels of phthalates in sachet and borehole water source in some parts of Delta State, Nigeria. Sachet and borehole water samples were collected from seven different water packaging facilities and level of phthalates determined using GC-MS instrumentation. Phthalates concentration in borehole samples varied from 0.00-0.01 (DMP), 0.06-0.20 (DEP), 0.10-0.98 (DBP), 0.21-0.36 (BEHP), 0.01-0.03 (DnOP) µg/L and (BBP) was not detectable; while sachet water varied from 0.03-0.95 (DMP), 0.16-12.45 (DEP), 0.57-3.38 (DBP), 0.00-0.03 (BBP), 0.08-0.31 (BEHP) and 0-0.03 (DnOP) µg/L. Phthalates concentration in the sachet water was higher than that of the corresponding boreholes sources and also showed significant difference (p < 0.05) between the two. Sources of these phthalate esters were the interaction between water molecules and plastic storage facilities. Although concentration of all phthalate esters analyzed were lower than the threshold limit value(TLV), over time storage of water samples in this medium can lead to substantial increase with negative effects on individuals consuming them.Keywords: phthalate esters, borehole, sachet water, sample extraction, gas chromatography, GC-MS
Procedia PDF Downloads 2443701 China and the Criminalization of Aggression. The Juxtaposition of Justice and the Maintenance of International Peace and Security
Authors: Elisabetta Baldassini
Abstract:
Responses to atrocities are always unique and context-dependent. They cannot be foretold nor easily prompted. However, the events of the twentieth century had set the scene for the international community to explore new and more robust systems in response to war atrocities, with the ultimate goal being the restoration and maintenance of peace and security. The outlawry of war and the attribution of individual liability for international crimes were two major landmarks that set the roots for the development of international criminal law. From the London Conference (1945) for the establishment of the first international military tribunal in Nuremberg to Rome at the inauguration of the first permanent international criminal court, the development of international criminal law has shaped in itself a fluctuating degree of tensions between justice and maintenance of international peace and security, the cardinal dichotomy of this article. The adoption of judicial measures to achieve peace indeed set justice as an essential feature at the heart of the new international system. Blackhole of this dichotomy is the crime of aggression. Aggression was at first the key component of a wide body of peace projects prosecuted under the charges of crimes against peace. However, the wide array of controversies around aggression mostly related to its definition, determination and the involvement of the Security Council silenced, partly, a degree of efforts and agreements. Notwithstanding the establishment of the International Criminal Court (ICC), jurisdiction over the crime of aggression was suspended until an agreement over the definition and the conditions for the Court’s exercise of jurisdiction was reached. Compromised over the crime was achieved in Kampala in 2010 and the Court’s jurisdiction over the crime of aggression was eventually activated on 17 July 2018. China has steadily supported the advancement of international criminal justice together with the establishment of a permanent international judicial body to prosecute grave crimes and has proactively participated at the various stages of the codification and development of the crime of aggression. However, China has also expressed systematic reservations and setbacks. With the use of primary and secondary sources, including semi-structured interviews, this research aims at analyzing the role that China has played throughout the substantive historical development of the crime of aggression, demonstrating a sharp inclination in the maintenance of international peace and security. Such state behavior seems to reflect national and international political mechanisms that gravitate around a distinct rationale that involves a share of culture and tradition.Keywords: maintenance of peace and security, cultural expression of justice, crime of aggression, China
Procedia PDF Downloads 2283700 Determination of Cr Content in Canned Fish Marketed in Iran
Authors: Soheil Sobhanardakani, Seyed Vali Hosseini, Lima Tayebi
Abstract:
The presence of heavy metals in the environment could constitute a hazard to food security and public health. These can be accumulated in aquatic animals such as fish. Samples of four popular brands of canned fish in the Iranian market (yellowfin tuna, common Kilka, Kawakawa, and longtail tuna) were analyzed for level of Cr after wet digestion with acids using graphite furnace atomic absorption spectrophotometry. The mean concentrations for Cr in the different brands were: 2.57, 3.24, 3.16, and 1.65 μg/g for brands A, B, C, and D respectively. Significant differences were observed in the Cr levels between all of the different brands of canned fish evaluated in this study. The Cr concentrations for the varieties of canned fishes were generally within the FAO/WHO, U.S. FDA, and U.S. EPA recommended limits for fish.Keywords: heavy metals, essential metals, canned fish, food security
Procedia PDF Downloads 2933699 French Language Teaching in Nigeria and Future with Technology
Authors: Chidiebere Samuel Ijeoma
Abstract:
The impact and importance of technology in all domains of existence cannot be overemphasized. It is like a double-edged sword which can be both constructive and destructive. The paper, therefore, tends to evaluate the impact of technology so far in the teaching and learning of French language in Nigeria. According to the study, the traditional methods of teaching French as a Foreign Language and recognized as our cultural methods of knowledge transfer are being fast replaced by digitalization in teaching. This, the research tends to portray and suggest the best way forward. In the Nigerian Primary Education System, the use of some local and cultural Instructional materials (teaching aids) is now almost history which the paper frowns at. Consequently, the study has these questions to ask?; Where are the chalks and blackboards? Where are the ‘Handworks’ (local brooms) submitted by school children as part of their Continuous Assessment? Finally, the research is in no way against the application of technology in the Nigerian French Language Teaching System but tries to draw a curtain between Technological methods of teaching French as a Foreign Language and the Original Nigerian System of teaching the language before the arrival of technology.Keywords: French language teaching, future, impact, importance of technology
Procedia PDF Downloads 3563698 View Synthesis of Kinetic Depth Imagery for 3D Security X-Ray Imaging
Authors: O. Abusaeeda, J. P. O. Evans, D. Downes
Abstract:
We demonstrate the synthesis of intermediary views within a sequence of X-ray images that exhibit depth from motion or kinetic depth effect in a visual display. Each synthetic image replaces the requirement for a linear X-ray detector array during the image acquisition process. Scale invariant feature transform, SIFT, in combination with epipolar morphing is employed to produce synthetic imagery. Comparison between synthetic and ground truth images is reported to quantify the performance of the approach. Our work is a key aspect in the development of a 3D imaging modality for the screening of luggage at airport checkpoints. This programme of research is in collaboration with the UK Home Office and the US Dept. of Homeland Security.Keywords: X-ray, kinetic depth, KDE, view synthesis
Procedia PDF Downloads 2653697 Enhancing Students’ Performance in Basic Science and Technology in Nigeria Using Moodle LMS
Authors: Olugbade Damola, Adekomi Adebimbo, Sofowora Olaniyi Alaba
Abstract:
One of the major problems facing education in Nigeria is the provision of quality Science and Technology education. Inadequate teaching facilities, non-usage of innovative teaching strategies, ineffective classroom management, lack of students’ motivation and poor integration of ICT has resulted in the increase in percentage of students who failed Basic Science and Technology in Junior Secondary Certification Examination for National Examination Council in Nigeria. To address these challenges, the Federal Government came up with a road map on education. This was with a view of enhancing quality education through integration of modern technology into teaching and learning, enhancing quality assurance through proper monitoring and introduction of innovative methods of teaching. This led the researcher to investigate how MOODLE LMS could be used to enhance students’ learning outcomes in BST. A sample of 120 students was purposively selected from four secondary schools in Ogbomoso. The experimental group was taught using MOODLE LMS, while the control group was taught using the conventional method. Data obtained were analyzed using mean, standard deviation and t-test. The result showed that MOODLE LMS was an effective learning platform in teaching BST in junior secondary schools (t=4.953, P<0.05). Students’ attitudes towards BST was also enhanced through MOODLE LMS (t=15.632, P<0.05). The use of MOODLE LMS significantly enhanced students’ retention (t=6.640, P<0.05). In conclusion, the Federal Government efforts at enhancing quality assurance through integration of modern technology and e-learning in Secondary schools proved to have yielded good result has students found MOODLE LMS to be motivating and interactive. Attendance was improved.Keywords: basic science and technology, MOODLE LMS, performance, quality assurance
Procedia PDF Downloads 3033696 Power, Pluralism, and History: Norms in International Societies
Authors: Nicole Cervenka
Abstract:
On the question of norms in international politics, scholars are divided over whether norms are a tool for power politics or a genuine reflection of an emergent international society. The line is drawn between rationalism and idealism, but this dialectical relationship needs to be broken down if we hope to come to a comprehensive understanding of how norms play out in international society. The concept of an elusive international society is a simplification of a more pluralistic, cosmopolitan, and diverse collection of international societies. The English School effectively overcomes realist-idealist dichotomies and provides a pluralistic, comprehensive explanation and description of international societies through its application to two distinct areas: human rights as well as security and war. We argue that international norms have always been present in human rights, war, and international security, forming international societies that can be complimentary or oppositional, beneficial or problematic. Power politics are present, but they can only be regarded as partially explanatory of the role of norms in international politics, which must also include history, international law, the media, NGOs, and others to fully represent the normative influences in international societies. A side-by-side comparison of international norms of war/security and human rights show how much international societies converge. World War II was a turning point in terms of international law, these forces of international society have deeper historical roots. Norms of human rights and war/security are often norms of restraint, guiding appropriate treatment of individuals. This can at times give primacy to the individual over the sovereign state. However, state power politics and hegemony are still intact. It cannot be said that there is an emergent international society—international societies are part of broader historical backdrops. Furthermore, states and, more generally, power politics, are important components in international societies, but international norms are far from mere tools of power politics. They define a more diverse, complicated, and ever-present conception of international societies.Keywords: English school, international societies, norms, pluralism
Procedia PDF Downloads 3843695 Research on Malware Application Patterns of Using Permission Monitoring System
Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim
Abstract:
This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.Keywords: malware patterns, application permission, application analysis, security
Procedia PDF Downloads 5253694 Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey
Authors: Priti Kumari, Tricha Anjali
Abstract:
Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.Keywords: attacks, body area network, key distribution, key refreshment, pre-shared keys
Procedia PDF Downloads 3643693 The Link between Money Market and Economic Growth in Nigeria: Vector Error Correction Model Approach
Authors: Uyi Kizito Ehigiamusoe
Abstract:
The paper examines the impact of money market on economic growth in Nigeria using data for the period 1980-2012. Econometrics techniques such as Ordinary Least Squares Method, Johanson’s Co-integration Test and Vector Error Correction Model were used to examine both the long-run and short-run relationship. Evidence from the study suggest that though a long-run relationship exists between money market and economic growth, but the present state of the Nigerian money market is significantly and negatively related to economic growth. The link between the money market and the real sector of the economy remains very weak. This implies that the market is not yet developed enough to produce the needed growth that will propel the Nigerian economy because of several challenges. It was therefore recommended that government should create the appropriate macroeconomic policies, legal framework and sustain the present reforms with a view to developing the market so as to promote productive activities, investments, and ultimately economic growth.Keywords: economic growth, investments, money market, money market challenges, money market instruments
Procedia PDF Downloads 3443692 Exploring Selected Nigerian Fictional Work and Films as Sources of Peace Building and Conflict Resolution in the Natural Resource Extraction Regions of Nigeria: A Social Conflict Theoretical Perspective and Analysis
Authors: Joyce Onoromhenre Agofure
Abstract:
Research has shown how fictional work and films reflect the destruction of the environment due to the exploitation of oil, gas, gold, and forest products by multinational companies for profits but overlook discussions on conflict resolution and peacebuilding. However, this paper examines the manner art forms project peace and conflict resolution, thereby contributing to mediation and stability geared towards changing appalling situations in the resource extraction regions of Nigeria. This paper draws from selected Nigerian films- Blood and Oil (2019), directed by Curtis Graham, Black November (2012), directed by Jeta Amata, and a novel- Death of Eternity (2007), by Adamu Kyuka Usman. The study seeks to show that the disruptions caused in the natural resource regions of Nigeria have not only left adverse effects on the social well-being of the people but require resolutions through means of peacebuilding. By adopting the theoretical insights of Social Conflict, this paper focuses on artistic processes that enhance peacebuilding and conflict resolution in non-violent ways by using scenes, visual effects, themes, and images that can educate by shaping opinions, influencing attitudes, and changing ideas and behavioral patterns of individuals and communities. Put together; the research will open up critical perceptions brought about by the artists of study to shed light on the dire need to sustain peace and actively participate in conflict resolution in natural resource extraction spaces.Keywords: natural resource, extraction, conflict resolution, peace building
Procedia PDF Downloads 803691 Cost Implications of Natural Resources Conflicts on Livelihoods of Farmers and Pastoralists in the North East Arid Zone of Nigeria
Authors: Ibrahim Ahmed Jajere
Abstract:
Resource use conflicts capable of undermining of pastoralists’ livelihoods are on the increase in the North East Arid Zone of Nigeria. In order to expose socio - economic effects of conflicts and benefits of peace, this study assessed cost implications of farmers/pastoralists conflicts over natural resources. Interviews were conducted with 94 farmers, 90 agro-pastoralists and 91 pastoralists’ household heads. The farmers and agro-pastoralists were systematically sampled while pastoralists were located using snowballing. Both farmers and pastoralists suffered losses in the form of injuries to, and even death of household members, and loss of shelter. Farmers sustained losses of facilities and farm produce while pastoralists suffered loss and seizure of livestock, arrest of household members and forced migrations. The material losses in monetary terms amounted to 14,242,200.00 nairas for farmers, a figure higher than the 10,915,500.00 nairas incurred by pastoralists.Keywords: cost, conflicts, farmers, pastoralists
Procedia PDF Downloads 2663690 Influence of Well-Being and Quality of Work-Life on Quality of Care among Health Professionals in Southwest Nigeria
Authors: Adesola C. Odole, Michael O. Ogunlana, Nse A. Odunaiya, Olufemi O. Oyewole, Chidozie E. Mbada, Ogochukwu K. Onyeso, Ayomikun F. Ayodeji, Opeyemi M. Adegoke, Iyanuoluwa Odole, Comfort T. Sanuade, Moyosooreoluwa E. Odole, Oluwagbohunmi A. Awosoga
Abstract:
Purpose: The Nigerian healthcare industry is bedeviled with infrastructural decay, inadequate funding and staffing, and a dysfunctional healthcare system. This study investigated the influence of health professionals’ well-being and quality of work-life (QoWL) on the quality of care (QoC) of patients in Nigeria. Methods: The study was a multicentre cross-sectional survey conducted at four tertiary health institutions in southwest Nigeria. Participants’ demographic information, well-being, quality of work-life, and quality of care were obtained using four standardized questionnaires. Data were summarized using descriptive statistics of frequency (percentage) and mean (standard deviation). Inferential statistics included Chi-square, Pearson’s correlation, and independent samples t-test analyses. Results: Medical practitioners (n=609) and nurses (n=570) constituted 74.6% of all the health professionals, with physiotherapists, pharmacists, and medical laboratory scientists constituting 25.4%. The mean (SD) participants’ well-being = 71.65% (14.65), quality of life = 61.8% (21.31), quality of work-life = 65.73% (10.52) and quality of care = 70.14% (12.77). Participants’ quality of life had a significant negative correlation with the quality of care, while well-being and quality of work-life had a significant positive correlation with the quality of care. Conclusion: We concluded that health professionals’ well-being and quality of work-life are important factors that influence their productivity and, ultimately, the quality of care rendered to patients. The hospital management and policymakers should ensure improved work-related factors to improve the well-being of health professionals. This will enhance the quality of care given to patients and ultimately reduce brain drain and medical tourism.Keywords: health professionals, quality of care, quality of life, quality of work-life, well-being
Procedia PDF Downloads 833689 Society-Centric Warfare: Lessons from Afghanistan
Authors: Amin Tarzi
Abstract:
The government of the Islamic Republic of Afghanistan was expected to keep the Taliban insurgents at bay after the departure of North Atlantic Treaty Organization (NATO)-led forces in 2021, especially given the two decades of effort to establish security forces to safeguard Western-backed governing institutions. This articles reviews the reasons for the failure of the much larger and better-equipped Afghan National Security Forces (ANSF) to stop the Taliban from taking over the Afghan capital of Kabul in a few days and analyzes the often-forgotten dimension of strategic calculations in this dialogue—namely the societal dimension. In this article, the author argues that this is one of the primary reasons that the ANSF and the Afghan government collapsed.Keywords: societal warfare, Afghanistan, NATO, Taliban, military strategy
Procedia PDF Downloads 1003688 An Evaluation of the Trends in Land Values around Institutions of Higher Learning in North Central Nigeria
Authors: Ben Nwokenkwo, Michael M. Eze, Felix Ike
Abstract:
The need to study trends in land values around institutions of higher learning cannot be overemphasized. Numerous studies in Nigeria have investigated the economic, and social influence of the sitting of institutions of higher learning at the micro, meso and macro levels. However, very few studies have evaluated the temporal extent at which such institution influences local land values. Since institutions greatly influence both the physical and environmental aspects of their immediate vicinity, attention must be taken to understand the influence of such changes on land values. This study examines the trend in land values using the Mann-Kendall analysis in order to determine if, between its beginning and end, a monotonic increase, decrease or stability exist in the land values across six institutions of higher learning for the period between 2004 and 2014. Specifically, The analysis was applied to the time series of the price(or value) of the land .The results of this study revealed that land values has either been increasing or remained stabled across all the institution sampled. The study finally recommends measures that can be put in place as counter magnets for land values estimation across institutions of higher learning.Keywords: influence, land, trend, value
Procedia PDF Downloads 3643687 Drones, Rebels and Bombs: Explaining the Role of Private Security and Expertise in a Post-piratical Indian Ocean
Authors: Jessica Kate Simonds
Abstract:
The last successful hijacking perpetrated by Somali pirates in 2012 represented a critical turning point for the identity and brand of Indian Ocean (IO) insecurity, coined in this paper as the era of the post-piratical. This paper explores the broadening of the PMSC business model to account and contribute to the design of a new IO security environment that prioritises foreign and insurgency drone activity and Houthi rebel operations as the main threat to merchant shipping in the post-2012 era. This study is situated within a longer history of analysing maritime insecurity and also contributes a bespoke conceptual framework that understands the sea as a space that is produced and reproduced relative to existing and emerging threats to merchant shipping based on bespoke models of information sharing and intelligence acquisition. This paper also makes a prominent empirical contribution by drawing on a post-positivist methodology, data drawn from original semi-structured interviews with senior maritime insurers and active merchant seafarers that is triangulated with industry-produced guidance such as the BMP series as primary data sources. Each set is analysed through qualitative discourse and content analysis and supported by the quantitative data sets provided by the IMB Piracy Reporting center and intelligence networks. This analysis reveals that mechanisms such as the IGP&I Maritime Security Committee and intelligence divisions of PMSC’s have driven the exchanges of knowledge between land and sea and thus the reproduction of the maritime security environment through new regulations and guidance to account dones, rebels and bombs as the key challenges in the IO, beyond piracy. A contribution of this paper is the argument that experts who may not be in the highest-profile jobs are the architects of maritime insecurity based on their detailed knowledge and connections to vessels in transit. This paper shares the original insights of those who have served in critical decision making spaces to demonstrate that the development and refinement of industry produced deterrence guidance that has been accredited to the mitigation of piracy, have shaped new editions such as BMP 5 that now serve to frame a new security environment that prioritises the mitigation of risks from drones and WBEID’s from both state and insurgency risk groups. By highlighting the experiences and perspectives of key players on both land and at sea, the key finding of this paper is outlining that as pirates experienced a financial boom by profiteering from their bespoke business model during the peak of successful hijackings, the private security market encountered a similar level of financial success and guaranteed risk environment in which to prospect business. Thus, the reproduction of the Indian Ocean as a maritime security environment reflects a new found purpose for PMSC’s as part of the broader conglomerate of maritime insurers, regulators, shipowners and managers who continue to redirect the security consciousness and IO brand of insecurity.Keywords: maritime security, private security, risk intelligence, political geography, international relations, political economy, maritime law, security studies
Procedia PDF Downloads 1853686 Securing Online Voting With Blockchain and Smart Contracts
Authors: Anant Mehrotra, Krish Phagwani
Abstract:
Democratic voting is vital for any country, but current methods like ballot papers or EVMs have drawbacks, including transparency issues, low voter turnout, and security concerns. Blockchain technology offers a potential solution by providing a secure, decentralized, and transparent platform for e-voting. With features like immutability, security, and anonymity, blockchain combined with smart contracts can enhance trust and prevent vote tampering. This paper explores an Ethereum-based e-voting application using Solidity, showcasing a web app that prevents duplicate voting through a token-based system, while also discussing the advantages and limitations of blockchain in digital voting. Voting is a crucial component of democratic decision-making, yet current methods, like paper ballots, remain outdated and inefficient. This paper reviews blockchain-based voting systems, highlighting strategies and guidelines to create a comprehensive electronic voting system that leverages cryptographic techniques, such as zero-knowledge proofs, to enhance privacy. It addresses limitations of existing e-voting solutions, including cost, identity management, and scalability, and provides key insights for organizations looking to design their own blockchain-based voting systems.Keywords: electronic voting, smart contracts, blockchain nased voting, security
Procedia PDF Downloads 103685 A Case Study of Assessing the Impact of Electronic Payment System on the Service Delivery of Banks in Nigeria
Authors: Idris Lawal
Abstract:
Electronic payment system is simply a payment or monetary transaction made over the internet or a network of computers. This study was carried out in order to assess how electronic payment system has impacted on banks service delivery, to examine the efficiency of electronic payment system in Nigeria and to determine the level of customer's satisfaction as a direct result of the deployment of electronic payment systems. It is an empirical study conducted using structured questionnaire distributed to officials and customers of Access Bank plc. Chi-square(x2) was adopted for the purpose of data analysis. The result of the study showed that the development of electronic payment system offer great benefit to bank customers including improved services, reduced turn-around time, ease of banking transaction, significant cost saving etc. The study recommends that customer protection laws should be properly put in place to safeguard the interest of end users of e-payment instruments.Keywords: bank, electronic payment systems, service delivery, customer's satisfaction
Procedia PDF Downloads 3993684 Targeting Mineral Resources of the Upper Benue trough, Northeastern Nigeria Using Linear Spectral Unmixing
Authors: Bello Yusuf Idi
Abstract:
The Gongola arm of the Upper Banue Trough, Northeastern Nigeria is predominantly covered by the outcrops of Limestone-bearing rocks in form of Sandstone with intercalation of carbonate clay, shale, basaltic, felsphatic and migmatide rocks at subpixel dimension. In this work, subpixel classification algorithm was used to classify the data acquired from landsat 7 Enhance Thematic Mapper (ETM+) satellite system with the aim of producing fractional distribution image for three most economically important solid minerals of the area: Limestone, Basalt and Migmatide. Linear Spectral Unmixing (LSU) algorithm was used to produce fractional distribution image of abundance of the three mineral resources within a 100Km2 portion of the area. The results show that the minerals occur at different proportion all over the area. The fractional map could therefore serve as a guide to the ongoing reconnaissance for the economic potentiality of the formation.Keywords: linear spectral un-mixing, upper benue trough, gongola arm, geological engineering
Procedia PDF Downloads 3753683 Exploring Moroccan Teachers Beliefs About Multilingualism
Authors: Belkhadir Radouane
Abstract:
In this study, author tried to explore the beliefs of some Moroccan teachers working in the delegations of Safi and Youcefia about the usefulness of first and second languages in learning the third language. More specifically, author attempted to see the extent to which these teachers believe that a first and second language can serve students in learning a third one. The first language in this context is Arabic, the second is French, and the third is English. The teachers’ beliefs were gathered through a questionnaire that was addressed via Google Forms. Then, the results were analyzed using the same application. It was found that teachers are positive about the usefulness of the first and second language in learning the third one, but most of them rarely use in a conscious way activities that serve this purpose.Keywords: Bilinguilism, teachers beliefs, English as ESL, Morocco
Procedia PDF Downloads 563682 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 2273681 A Model of Human Security: A Comparison of Vulnerabilities and Timespace
Authors: Anders Troedsson
Abstract:
For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.Keywords: human security, timespace, vulnerabilities, risk perception
Procedia PDF Downloads 3363680 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia
Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro
Abstract:
Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.Keywords: border security, defense, energy, national interest, threat
Procedia PDF Downloads 4833679 Newspaper Headlines as Tool for Political Propaganda in Nigeria: Trend Analysis of Implications on Four Presidential Elections
Authors: Muhammed Jamiu Mustapha, Jamiu Folarin, Stephen Obiri Agyei, Rasheed Ademola Adebiyi, Mutiu Iyanda Lasisi
Abstract:
The role of the media in political discourse cannot be overemphasized as they form an important part of societal development. The media institution is considered the fourth estate of the realm because it serves as a check and balance to the arms of government (Executive, Legislature and Judiciary) especially in a democratic setup, and makes public office holders accountable to the people. They scrutinize the political candidates and conduct a holistic analysis of the achievement of the government in order to make the people’s representative accountable to the electorates. The media in Nigeria play a seminal role in shaping how people vote during elections. Newspaper headlines are catchy phrases that easily capture the attention of the audience and call them (audience) to action. Research conducted on newspaper headlines looks at the linguistic aspect and how the tenses used has a resultant effect on peoples’ attitude and behaviour. Communication scholars have also conducted studies that interrogate whether newspaper headlines influence peoples' voting patterns and decisions. Propaganda and negative stories about political opponents are stapling features in electioneering campaigns. Nigerian newspaper readers have the characteristic of scanning newspaper headlines. And the question is whether politicians effectively have played into this tendency to brand opponents negatively, based on half-truths and inadequate information. This study illustrates major trends in the Nigerian political landscape looking at the past four presidential elections and frames the progress of the research in the extant body of political propaganda research in Africa. The study will use the quantitative content analysis of newspaper headlines from 2007 to 2019 to be able to ascertain whether newspaper headlines had any effect on the election results of the presidential elections during these years. This will be supplemented by Key Informant Interviews of political scientists or experts to draw further inferences from the quantitative data. Drawing on newspaper headlines of selected newspapers in Nigeria that have a political propaganda angle for the presidential elections, the analysis will correspond to and complements extant descriptions of how the field of political propaganda has been developed in Nigeria, providing evidence of four presidential elections that have shaped Nigerian politics. Understanding the development of the behavioural change of the electorates provide useful context for trend analysis in political propaganda communication. The findings will contribute to how newspaper headlines are used partly or wholly to decide the outcome of presidential elections in Nigeria.Keywords: newspaper headlines, political propaganda, presidential elections, trend analysis
Procedia PDF Downloads 235