Search results for: information security awareness
12720 Evaluation of Published Materials in Meeting the Information Needs of Students in Three Selected College Libraries in Oyo State, Nigeria
Authors: Rafiat Olasumbo Akande
Abstract:
Most college libraries in Oyo State show signs of unhealthy collection practices like the preponderance of non-recent collections and indiscriminate acquisition of sub-standard books from hawkers. The objective of this study, therefore, is to determine the extent at which available published materials in those college libraries are able to meet both knowledge and information needs of students in those institutions. A descriptive survey was conducted among 18 librarians and 21 library officers in three colleges purposively selected for the exercise using simple sampling technique. In all, 279 questionnaires were administered and out of those 279 administered, 265 were returned and analyzed using Statistical Package for Social Science (SPSS). Three College Librarian were also interviewed. Findings from the study showed that due to the paucity of funds, obsolete materials, and sub-standard materials being procured from roadside book hawkers hinders the college libraries in meeting the information needs of the students in these college libraries. It then concluded that only when there is standard procedure for collection management and acquisition of library materials that the knowledge and information needs of the students could be met. The study recommends that students and curriculum review committee members from various departments should always be involved in determining materials needed by the library to meet students information needs and that institution authority must fund, monitor and ensure compliance with the acquisition policy in place in the college libraries.Keywords: libraries, published materials, information needs, college, evaluation, students
Procedia PDF Downloads 16712719 A Comparative Study of Approaches in User-Centred Health Information Retrieval
Authors: Harsh Thakkar, Ganesh Iyer
Abstract:
In this paper, we survey various user-centered or context-based biomedical health information retrieval systems. We present and discuss the performance of systems submitted in CLEF eHealth 2014 Task 3 for this purpose. We classify and focus on comparing the two most prevalent retrieval models in biomedical information retrieval namely: Language Model (LM) and Vector Space Model (VSM). We also report on the effectiveness of using external medical resources and ontologies like MeSH, Metamap, UMLS, etc. We observed that the LM based retrieval systems outperform VSM based systems on various fronts. From the results we conclude that the state-of-art system scores for MAP was 0.4146, P@10 was 0.7560 and NDCG@10 was 0.7445, respectively. All of these score were reported by systems built on language modeling approaches.Keywords: clinical document retrieval, concept-based information retrieval, query expansion, language models, vector space models
Procedia PDF Downloads 32012718 The Impact of Information and Communication Technology on the Re-Engineering Process of Small and Medium Enterprises
Authors: Hiba Mezaache
Abstract:
The current study aimed to know the impact of using information and communication technology on the process of re-engineering small and medium enterprises, as the world witnessed the speed development of the latter in its field of work and the diversity of its objectives and programs, that also made its process important for the growth and development of the institution and also gaining the flexibility to face the changes that may occur in the environment of work, so in order to know the impact of information and communication technology on the success of this process, we prepared an electronic questionnaire that included (70) items, and we also used the SPSS statistical calendar to analyze the data obtained. In the end of our study, our conclusion was that there was a positive correlation between the four dimensions of information and communication technology, i.e., hardware and equipment, software, communication networks, databases, and the re-engineering process, in addition to the fact that the studied institutions attach great importance to formal communication, for its positive advantages that it achieves in reducing time and effort and costs in performing the business. We could also say that communication technology contributes to the process of formulating objectives related to the re-engineering strategy. Finally, we recommend the necessity of empowering workers to use information technology and communication more in enterprises, and to integrate them more into the activity of the enterprise by involving them in the decision-making process, and also to keep pace with the development in the field of software, hardware, and technological equipment.Keywords: information and communication technology, re-engineering, small and medium enterprises, the impact
Procedia PDF Downloads 17712717 Study of Evaluation Model Based on Information System Success Model and Flow Theory Using Web-scale Discovery System
Authors: June-Jei Kuo, Yi-Chuan Hsieh
Abstract:
Because of the rapid growth of information technology, more and more libraries introduce the new information retrieval systems to enhance the users’ experience, improve the retrieval efficiency, and increase the applicability of the library resources. Nevertheless, few of them are discussed the usability from the users’ aspect. The aims of this study are to understand that the scenario of the information retrieval system utilization, and to know why users are willing to continuously use the web-scale discovery system to improve the web-scale discovery system and promote their use of university libraries. Besides of questionnaires, observations and interviews, this study employs both Information System Success Model introduced by DeLone and McLean in 2003 and the flow theory to evaluate the system quality, information quality, service quality, use, user satisfaction, flow, and continuing to use web-scale discovery system of students from National Chung Hsing University. Then, the results are analyzed through descriptive statistics and structural equation modeling using AMOS. The results reveal that in web-scale discovery system, the user’s evaluation of system quality, information quality, and service quality is positively related to the use and satisfaction; however, the service quality only affects user satisfaction. User satisfaction and the flow show a significant impact on continuing to use. Moreover, user satisfaction has a significant impact on user flow. According to the results of this study, to maintain the stability of the information retrieval system, to improve the information content quality, and to enhance the relationship between subject librarians and students are recommended for the academic libraries. Meanwhile, to improve the system user interface, to minimize layer from system-level, to strengthen the data accuracy and relevance, to modify the sorting criteria of the data, and to support the auto-correct function are required for system provider. Finally, to establish better communication with librariana commended for all users.Keywords: web-scale discovery system, discovery system, information system success model, flow theory, academic library
Procedia PDF Downloads 10312716 High Phosphate-Containing Foods and Beverages: Perceptions of the Future Healthcare Providers on Their Harmful Effect in Excessive Consumption
Authors: ATM Emdadul Haque
Abstract:
Phosphorus is an essential nutrient which is regularly consumed with food and exists in the body as phosphate. Phosphate is an important component of cellular structures and needed for bone mineralization. Excessive accumulation of phosphate is an important driving factor of mortality in chronic renal failure patients; of relevance, these patients are usually provided health care by doctors, nurses, and pharmacists. Hence, this study was planned to determine the level of awareness of the future healthcare providers about the phosphate-containing foods and beverages and to access their knowledge on the harmful effects of excess phosphate consumption. A questionnaire was developed and distributed among the year-1 medical, nursing and pharmacy students. 432 medical, nursing and pharmacy students responded with age ranging from 18-24 years. About 70% of the respondents were female with a majority (90.7%) from Malay ethnicity. Among the respondents, 29.9% were medical, 35.4% were the pharmacy and 34.7% were nursing students. 79.2% students knew that phosphate was an important component of the body, but only 61.8% knew that consuming too much phosphate could be harmful to the body. Despite 97% of the students knew that carbonated soda contained high sugar, surprisingly 77% of them did not know the presence of high phosphate in the same soda drinks; in the similar line of observation, 67% did not know the presence of it in the fast food. However, it was encouraging that 94% of the students wanted to know more about the effects of phosphate consumption, 74.3% were willing to give up drinking soda and eating fast food, and 52% considered taking green coconut water instead of soda drinks. It is, therefore, central to take an educational initiative to increase the awareness of the future healthcare providers about phosphate-containing food and its harmful effects in excessive consumptions.Keywords: high phosphate containing foods and beverages, excessive consumption, future health care providers, phosphorus
Procedia PDF Downloads 37012715 Social Strategeries for HIV and STDs Prevention
Authors: Binu Sahayam
Abstract:
HIV/AIDS epidemic is in its third decade and has become a virulent disease that threatens the world population. Many countless efforts had been made yet this has become a social and developmental concern. According to UNAIDS 2013 Report, In India around 2.4 million people are currently living with HIV and third in the infection rate. As every country is facing this health issue, this has become a social and developmental concern for India. In country like India, open discussion on sex and sexuality is not possible due to its conventional culture. Educational institution like schools and colleges can create awareness on sex education, life skill education, information on HIV and STD which is lacking. It is very clear that preventive knowledge remains low and this leads to increase in the HIV/AIDS infection rate. HIV/AIDS is a disease which is not curable but preventable, keeping this in mind religious leaders of various have come forward in addressing the issue of HIV/AIDS using various social strategies. The study has been focused on three main India religious teachings Hinduism, Christianity and Islam in addressing the issue of HIV/AIDS and its possible intervention in dealing with HIV/AIDS prevention. The study is important because it highlights the health issues, stigma discrimination, psychological disturbances and insecurity faced by the infected and affected persons. Therefore, this study privileges the role of religious leadership in the efforts and processes of preventing HIV/AIDS, caring and providing support to People living with HIV/AIDS and argues that intervention of religious leadership is an effective measure to confront many of the barriers associated with HIV/AIDS.Keywords: HIV and AIDS, STDs, religion and religious organisation
Procedia PDF Downloads 39212714 Enhanced Iceberg Information Dissemination for Public and Autonomous Maritime Use
Authors: Ronald Mraz, Gary C. Kessler, Ethan Gold, John G. Cline
Abstract:
The International Ice Patrol (IIP) continually monitors iceberg activity in the North Atlantic by direct observation using ships, aircraft, and satellite imagery. Daily reports detailing navigational boundaries of icebergs have significantly reduced the risk of iceberg contact. What is currently lacking is formatting this data for automatic transmission and display of iceberg navigational boundaries in commercial navigation equipment. This paper describes the methodology and implementation of a system to format iceberg limit information for dissemination through existing radio network communications. This information will then automatically display on commercial navigation equipment. Additionally, this information is reformatted for Google Earth rendering of iceberg track line limits. Having iceberg limit information automatically available in standard navigation equipment will help support full autonomous operation of sailing vessels.Keywords: iceberg, iceberg risk, iceberg track lines, AIS messaging, international ice patrol, North American ice service, google earth, autonomous surface vessels
Procedia PDF Downloads 13712713 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network
Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour
Abstract:
Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network
Procedia PDF Downloads 16912712 Assessment of Knowledge, Awareness about Hemorrhoids Causes and Stages among the General Public of Saudi Arabia
Authors: Asaiel Mubark Al Hadi
Abstract:
Background: A frequent anorectal condition known as hemorrhoids, sometimes known as piles, is characterized by a weakening of the anal cushion and the supporting tissue as well as spasms of the internal sphincter. Hemorrhoids are most frequently identified by painless bright red bleeding, prolapse, annoying grape-like tissue prolapse, itching, or a combination of symptoms. digital rectal examination (DRE) and anoscope are used to diagnose it. Constipation, a low-fiber diet, a high body- mass index (BMI), pregnancy, and a reduced physical activity are among the factors that are typically thought to increase the risk of hemorrhoids. Golighers is the most commonly used hemorrhoid classification scheme It is 4 degrees, which determines the degree of the event. The purpose of this study is to assess knowledge and awareness level of the causes and stages of Hemorrhoids in the public of Saudi Arabia. Method: This cross-sectional study was conducted in the Saudi Arabia between Oct 2022- Dec 2022. The study group included at least 384 aged above 18 years. The outcomes of this study were analyzed using the SPSS program using a pre-tested questionnaire. Results: The study included 1410 participants, 69.9% of them were females and 30.1% were males. 53.7% of participants aged 20- 30 years old. 17% of participants had hemorrhoids and 42% had a relative who had hemorrhoids. 42.8% of participants could identify stage 1 of hemorrhoids correctly, 44.7% identified stage 2 correctly, 46.7% identified stage 3 correctly and 58.1% identified stage 4 correctly. Only 28.9% of participants had high level of knowledge about hemorrhoids, 62.7% had moderate knowledge and 8.4% had low knowledge. Conclusion: In conclusion, Saudi general population has poor knowledge of hemorrhoids, their causes and their management approach. There was a significant association between knowledge scores of hemorrhoids with age, gender, residence area and employment.Keywords: hemorrhoids, external hemorrhoid, internal hemorrhoid, anal fissure, hemorrhoid stages, prolapse, rectal bleeding
Procedia PDF Downloads 9812711 Context, Challenges, Constraints and Strategies of Non-Profit Organisations in Responding to the Needs of Asylum Seekers and Refugees in Cape Town, South Africa
Authors: C. O’Brien, Chloe Reiss
Abstract:
While South Africa has been the chosen host country for over 1,2 million asylum seekers/refugees it has at the same time, been struggling to address the needs of its own people who are still trapped in poverty with little prospects of employment. This limited exploratory, qualitative study was undertaken in Cape Town with a purposive sample of 21 key personnel from various NPOs providing a service to asylum seekers/refugees. Individual in-depth face to face interviews were carried out and the main findings were: Some of the officials at the Department of Home Affairs, health personnel, landlords, school principals, employers, bank officials and police officers were prejudicial in their practices towards asylum seekers/ refugees. The major constraints experienced by NPOs in this study were linked to a lack of funding and minimal government support, strained relationship with the Department of Home Affairs and difficulties in accessing refugees. And finally, the strategies adopted by these NPOs included networking with other service providers, engaging in advocacy, raising community awareness and liaising with government. Thus, more focused intervention strategies are needed to build social cohesion, address prejudices which fuels xenophobic attacks and raise awareness/educate various sectors about refugee rights. Given this burgeoning global problem, social work education and training should include curriculum content on migrant issues. Furthermore, larger studies using mixed methodology approaches would yield more nuanced data and provide for more strategic interventions.Keywords: refugees and asylum seekers, constraints of service delivery, non-profit organisations, refugee challenges
Procedia PDF Downloads 20512710 Decision Making Approach through Generalized Fuzzy Entropy Measure
Authors: H. D. Arora, Anjali Dhiman
Abstract:
Uncertainty is found everywhere and its understanding is central to decision making. Uncertainty emerges as one has less information than the total information required describing a system and its environment. Uncertainty and information are so closely associated that the information provided by an experiment for example, is equal to the amount of uncertainty removed. It may be pertinent to point out that uncertainty manifests itself in several forms and various kinds of uncertainties may arise from random fluctuations, incomplete information, imprecise perception, vagueness etc. For instance, one encounters uncertainty due to vagueness in communication through natural language. Uncertainty in this sense is represented by fuzziness resulting from imprecision of meaning of a concept expressed by linguistic terms. Fuzzy set concept provides an appropriate mathematical framework for dealing with the vagueness. Both information theory, proposed by Shannon (1948) and fuzzy set theory given by Zadeh (1965) plays an important role in human intelligence and various practical problems such as image segmentation, medical diagnosis etc. Numerous approaches and theories dealing with inaccuracy and uncertainty have been proposed by different researcher. In the present communication, we generalize fuzzy entropy proposed by De Luca and Termini (1972) corresponding to Shannon entropy(1948). Further, some of the basic properties of the proposed measure were examined. We also applied the proposed measure to the real life decision making problem.Keywords: entropy, fuzzy sets, fuzzy entropy, generalized fuzzy entropy, decision making
Procedia PDF Downloads 45012709 Introducing a Video-Based E-Learning Module to Improve Disaster Preparedness at a Tertiary Hospital in Oman
Authors: Ahmed Al Khamisi
Abstract:
The Disaster Preparedness Standard (DPS) is one of the elements that is evaluated by the Accreditation Canada International (ACI). ACI emphasizes to train and educate all staff, including service providers and senior leaders, on emergency and disaster preparedness upon the orientation and annually thereafter. Lack of awareness and deficit of knowledge among the healthcare providers about DPS have been noticed in a tertiary hospital where ACI standards were implemented. Therefore, this paper aims to introduce a video-based e-learning (VB-EL) module that explains the hospital’s disaster plan in a simple language which will be easily accessible to all healthcare providers through the hospital’s website. The healthcare disaster preparedness coordinator in the targeted hospital will be responsible to ensure that VB-EL is ready by 25 April 2019. This module will be developed based on the Kirkpatrick evaluation method. In fact, VB-EL combines different data forms such as images, motion, sounds, text in a complementary fashion which will suit diverse learning styles and individual learning pace of healthcare providers. Moreover, the module can be adjusted easily than other tools to control the information that healthcare providers receive. It will enable healthcare providers to stop, rewind, fast-forward, and replay content as many times as needed. Some anticipated limitations in the development of this module include challenges of preparing VB-EL content and resistance from healthcare providers.Keywords: Accreditation Canada International, Disaster Preparedness Standard, Kirkpatrick evaluation method, video-based e-learning
Procedia PDF Downloads 14712708 Extended Literature Review on Sustainable Energy by Using Multi-Criteria Decision Making Techniques
Authors: Koray Altintas, Ozalp Vayvay
Abstract:
Increased global issues such as depletion of sources, environmental problems and social inequality triggered public awareness towards finding sustainable solutions in order to ensure the well-being of the current as well as future generations. Since energy plays a significant role in improved social and economic well-being and is imperative on both industrial and commercial wealth creation, it is a must to develop a standardized set of metrics which makes it possible to indicate the present condition relative to conditions in the past and to develop any perspective which is required to frame actions for the future. This is not an easy task by considering the complexity of the issue which requires integrating economic, environmental and social aspects of sustainable energy. Multi-criteria decision making (MCDM) can be considered as a form of integrated sustainability evaluation and a decision support approach that can be used to solve complex problems featuring; conflicting objectives, different forms of data and information, multi-interests and perspectives. On that matter, MCDM methods are useful for providing solutions to complex energy management problems. The aim of this study is to review MCDM approaches that can be used for examining sustainable energy management. This study presents an insight into MCDM techniques and methods that can be useful for engineers, researchers and policy makers working in the energy sector.Keywords: sustainable energy, sustainability criteria, multi-criteria decision making, sustainability dimensions
Procedia PDF Downloads 33012707 Health Education and Information: A Panacea to Tuberculosis Prevention and Eradication in Nigeria
Authors: Afolabi Joseph Fasoranti
Abstract:
Tuberculosis (TB) is an infectious disease caused by mycobacterium tuberculosis. Tuberculosis is a major public health problem in Nigeria, being one of the ten leading causes of hospital admissions and a leading cause of death in adults, especially among the economically productive age group. This paper critically examined the importance of health education towards the eradication and prevention of tuberculosis in Nigeria. It was reviewed and discussed under the following subheadings; Global burden of tuberculosis in Nigeria, concept, definition and etiology of tuberculosis, Signs and symptoms of tuberculosis, diagnosis of tuberculosis, causative agent, modes of infection and incubation period, risk factors of pulmonary tuberculosis Dots and stop TB programmes in Nigeria Treatment and prevention of tuberculosis TB treatment strategies, Dealing with treatment problems in Nigeria Stigmatization against Tuberculosis Patients Health education as a tool for achieving free tuberculosis country. Emphasis for Tb control has been placed on the development of improved vaccines, diagnostic and treatment courses but less on health education and awareness. Although the need for these tools is indisputable, the obstacle facing the spread of TB go beyond technological. The findings of this study may stimulate health system policy makers, Government and non- governmental organizations, donor agencies and other stakeholders in planning and designing health education intervention programs on the control and eradication of tuberculosis. It therefore recommended that Government should implement health education as part of the DOTs, this will thus empower the tuberculosis patients on ways to live healthy, lifestyle, in doing this, they will recover fast and prevent them from spreading the disease.Keywords: tuberculosis, health education, panacea, Nigeria, prevention
Procedia PDF Downloads 33112706 Availability Strategy of Medical Information for Telemedicine Services
Authors: Rozo D. Juan Felipe, Ramírez L. Leonardo Juan, Puerta A. Gabriel Alberto
Abstract:
The telemedicine services require correct computing resource management to guarantee productivity and efficiency for medical and non-medical staff. The aim of this study was to examine web management strategies to ensure the availability of resources and services in telemedicine so as to provide medical information management with an accessible strategy. In addition, to evaluate the quality-of-service parameters, the followings were measured: delays, throughput, jitter, latency, available bandwidth, percent of access and denial of services based of web management performance map with profiles permissions and database management. Through 24 different test scenarios, the results show 100% in availability of medical information, in relation to access of medical staff to web services, and quality of service (QoS) of 99% because of network delay and performance of computer network. The findings of this study suggest that the proposed strategy of web management is an ideal solution to guarantee the availability, reliability, and accessibility of medical information. Finally, this strategy offers seven user profile used at telemedicine center of Bogota-Colombia keeping QoS parameters suitable to telemedicine services.Keywords: availability, medical information, QoS, strategy, telemedicine
Procedia PDF Downloads 20512705 Cybercrimes in Nigeria: Its Causes, Effects and Solutions
Authors: Uzoma Igboji
Abstract:
Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria
Procedia PDF Downloads 53812704 Data Integrity between Ministry of Education and Private Schools in the United Arab Emirates
Authors: Rima Shishakly, Mervyn Misajon
Abstract:
Education is similar to other businesses and industries. Achieving data integrity is essential in order to attain a significant supporting for all the stakeholders in the educational sector. Efficient data collect, flow, processing, storing and retrieving are vital in order to deliver successful solutions to the different stakeholders. Ministry of Education (MOE) in United Arab Emirates (UAE) has adopted ‘Education 2020’ a series of five-year plans designed to introduce advanced education management information systems. As part of this program, in 2010 MOE implemented Student Information Systems (SIS) to manage and monitor the students’ data and information flow between MOE and international private schools in UAE. This paper is going to discuss data integrity concerns between MOE, and private schools. The paper will clarify the data integrity issues and will indicate the challenges that face private schools in UAE.Keywords: education management information systems (EMIS), student information system (SIS), United Arab Emirates (UAE), ministry of education (MOE), (KHDA) the knowledge and human development authority, Abu Dhabi educational counsel (ADEC)
Procedia PDF Downloads 22212703 Child Abuse: Emotional, Physical, Neglect, Sexual and the Psychological Effects: A Case Scenario in Lagos State
Authors: Aminu Ololade Matilda
Abstract:
Child abuse is a significant issue worldwide, affecting the socio-development and mental and physical health of young individuals. It is the maltreatment of a child by an adult or a child. This paper focuses on child abuse in Communities in Lagos State. The aim of this study is to investigate the extent of child abuse and its impact on the mood, social activities, self-worth, concentration, and academic performance of children in Communities in Lagos State. The primary research instrument used in this study was the interview (Forensic), which consisted of two sections. The first section gathered data on the details of the child and the forms and impacts of abuse experienced, while the second section focused on parental style. The study found that children who experienced various forms of abuse, such as emotional, neglect, physical, or sexual abuse, were hesitant to report it out of fear of threats or even death from the abuser. These abused children displayed withdrawn behaviour, depression, and low self-worth and underperformed academically compared to their peers who did not experience abuse. The findings align with socio-learning and intergenerational transmission of violence theories, which suggest that parents and caregivers who engage in child abuse often do so because they themselves experienced or witnessed abuse as children, thereby normalizing violence. The study highlights the prevalent issue of child abuse in Lagos State and emphasizes the need for advocacy programs and capacity building to raise awareness about child abuse and prevention. The distribution of the Child’s Rights Act in various sectors is also recommended to underscore the importance of protecting the rights of children. Additionally, the inclusion of courses on child abuse in the school curriculum is proposed to ensure children are educated on recognizing and reporting abuse.Keywords: abuse, child, awareness, effects, emotional, neglect, physical, psychological, sexual, recognize, reporting, right
Procedia PDF Downloads 8012702 Comparison of Authentication Methods in Internet of Things Technology
Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud
Abstract:
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter. Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol
Procedia PDF Downloads 26412701 Quantum Fisher Information of Bound Entangled W-Like States
Authors: Fatih Ozaydin
Abstract:
Quantum Fisher information (QFI) is a multipartite entanglement witness and recently it has been studied extensively with separability and entanglement in the focus. On the other hand, bound entanglement is a special phenomena observed in mixed entangled states. In this work, we study the QFI of W states under a four-dimensional entanglement binding channel. Starting with initally pure W states of several qubits, we find how the QFI decreases as two qubits of the W state is subject to entanglement binding. We also show that as the size of the W state increases, the effect of entanglement binding is decreased.Keywords: Quantum Fisher information, W states, bound entanglement, entanglement binding
Procedia PDF Downloads 48212700 The Cloud Systems Used in Education: Properties and Overview
Authors: Agah Tuğrul Korucu, Handan Atun
Abstract:
Diversity and usefulness of information that used in education are have increased due to development of technology. Web technologies have made enormous contributions to the distance learning system especially. Mobile systems, one of the most widely used technology in distance education, made much easier to access web technologies. Not bounding by space and time, individuals have had the opportunity to access the information on web. In addition to this, the storage of educational information and resources and accessing these information and resources is crucial for both students and teachers. Because of this importance, development and dissemination of web technologies supply ease of access to information and resources are provided by web technologies. Dynamic web technologies introduced as new technologies that enable sharing and reuse of information, resource or applications via the Internet and bring websites into expandable platforms are commonly known as Web 2.0 technologies. Cloud systems are one of the dynamic web technologies that defined as a model provides approaching the demanded information independent from time and space in appropriate circumstances and developed by NIST. One of the most important advantages of cloud systems is meeting the requirements of users directly on the web regardless of hardware, software, and dealing with install. Hence, this study aims at using cloud services in education and investigating the services provided by the cloud computing. Survey method has been used as research method. In the findings of this research the fact that cloud systems are used such studies as resource sharing, collaborative work, assignment submission and feedback, developing project in the field of education, and also, it is revealed that cloud systems have plenty of significant advantages in terms of facilitating teaching activities and the interaction between teacher, student and environment.Keywords: cloud systems, cloud systems in education, online learning environment, integration of information technologies, e-learning, distance learning
Procedia PDF Downloads 34912699 Rescaling Global Health and International Relations: Globalization of Health in a Low Security Environment
Authors: F. Argurio, F. G. Vaccaro
Abstract:
In a global environment defined by ever-increasing health issues, in spite of the progress made by modern medicine, this paper seeks to readdress the question of global health in an international relations perspective. The research hypothesis is: the lower the security environment, the higher the spread of communicable diseases. This question will be channeled by re-scaling the connotation of 'global' and 'international' dimension through the theoretical lens of glocalization, a theory by Bauman that starts its analysis from simple systems to get to the most complex ones. Glocalization theory will be operationalized by analyzing health in an armed-conflict context. In this respect, the independent variable 'low security environment' translates into the cases of Syria and Yemen, which provide a clear example of the all-encompassing nature of conflict on national health and the effects on regional development. In fact, Syria and Yemen have been affected by poliomyelitis and cholera outbreaks respectively. The dependent variable will be constructed on said communicable diseases which belong to the families of sanitation-related and vaccine-preventable diseases. The research will be both qualitative and quantitative, based on primary (interviews) and secondary (WHO and other NGO’s reports) sources. The methodology is based on the assessment of the vaccine coverage and case-analysis in time and space using epidemiological data. Moreover, local health facilities’ functioning and efficiency will be studied. The article posits that the intervention and cooperation of international organizations with the local authorities becomes crucial to provide the local populations with their primary health needs. In Yemen, the majority of fatal cholera cases were in the regions controlled by the Houthi rebels, not officially accredited by the International Community. Similarly, the polio outbreak in Syria primarily affected the areas not controlled by the Syrian Arab Republic forces, recognized as the leading interlocutor by the WHO. The jeopardized possibilities to access these countries have been pivotal to the determining the problem in controlling sanitation-related and vaccine preventable diseases. This represents a potential threat to global health.Keywords: health in conflict-affected areas, cholera, polio, Yemen, Syria, glocalization
Procedia PDF Downloads 13412698 The Effectiveness of Banks’ Web Sites: A Study of Turkish Banking Sector
Authors: Raif Parlakkaya, Huseyin Cetin, Duygu Irdiren
Abstract:
By the development of World Wide Web, the usage rate of Internet has rapidly grown globally; and provided a basis for the emergence of electronic business. As well as other sectors, the banking sector has adopted the use of internet with the developments in information and communication technologies. Due to the public disclosure and transparency principle of Corporate Governance, the importance of information disclosure of banks on their web sites has increased significantly. For the purpose of this study, a Bank Disclosure Attribute Index (BDAI) in Turkey has been constructed through classifying the information disclosure on banks’ web sites into general, financial, investors and corporate governance attributes. All 47 banks in Turkish Banking System have been evaluated according to the index with the aim of providing a comparison between banks. By Chi Square Test, Pearson Correlation, T-Test, and ANOVA statistical tools, it has been concluded that the majority of banks in Turkey have shared information on their web sites adequately with respect to their total index score. Although there is a positive correlation between various types of information on banks’ web sites, there is no uniformity among them. Also, no significant difference between various types of information disclosure and bank types has been observed. Compared with the total index score averages of the five largest banks in Turkey, there are some banks that need to improve the content of their web sites.Keywords: internet banking, websites evaluation, customer adoption, Turkey
Procedia PDF Downloads 39812697 Study of Land Use Land Cover Change of Bhimbetka with Temporal Satellite Data and Information Systems
Authors: Pranita Shivankar, Devashree Hardas, Prabodhachandra Deshmukh, Arun Suryavanshi
Abstract:
Bhimbetka Rock Shelters is the UNESCO World Heritage Site located about 45 kilometers south of Bhopal in the state of Madhya Pradesh, India. Rapid changes in land use land cover (LULC) adversely affect the environment. In recent past, significant changes are found in the cultural landscape over a period of time. The objective of the paper was to study the changes in land use land cover (LULC) of Bhimbetka and its peripheral region. For this purpose, the supervised classification was carried out by using satellite images of Landsat and IRS LISS III for the year 2000 and 2013. Use of remote sensing in combination with geographic information system is one of the effective information technology tools to generate land use land cover (LULC) change information.Keywords: IRS LISS III, Landsat, LULC, UNESCO, World Heritage Site
Procedia PDF Downloads 35012696 Perceptions of Higher Education Online Learning Faculty in Lebanon
Authors: Noha Hamie Haidar
Abstract:
The purpose of this case study was to explore faculty attitudes toward online learning in a Lebanese Higher Education Institution (HEI). The research problem addressed the disinterest among faculty at the Arts, Sciences, and Technology University of Lebanon (AUL) in enhancing learning using online technology. The research questions for the study examined the attitudes of the faculty toward applying online learning and the extent of the faculty readiness to adopt this technological change. A qualitative case study design was used that employed multiple sources of information including semi-structured interviews and existing literature. The target population was AUL faculty including full-time instructors and administration (n=25). Data analysis was guided by the lens of Kanter’s theoretical approach, which focused on faculty’s awareness, desire, knowledge, ability, and reinforcement model (ADKAR) for adopting change. Key findings indicated negative impressions concerning online learning such as authority (ministry of education, culture, and rules); and change (increased enrollment and different teaching styles). Yet, within AUL’s academic environment, the opportunity for the adoption of online learning was identified; faculty showed positive elements, such as the competitive advantage to first enter the Lebanese Market, and higher student enrollment. These results may encourage AUL’s faculty to adopt online learning and to achieve a positive social change by expanding the ability of students in HEIs to compete globally.Keywords: faculty, higher education, technology, online learning
Procedia PDF Downloads 40612695 Strategic Redesign of Public Spaces with a Sustainable Approach: Case Study of Parque Huancavilca, Guayaquil
Authors: Juan Carlos Briones Macias
Abstract:
Currently, the Huancavilca City Park in Guayaquil is an abandoned public space that is discovering a growing problem of insecurity, where various problems have been perceived, such as the lack of green areas, deteriorating furniture, insufficient lighting, the use of inadequate cladding materials and very sunny areas due to the lack of planning in the design of green areas. The objective of this scientific article is to redesign Huancavilca Park through public space design strategies for more attractive and comfortable areas, becoming a point of interaction in a safe and accessible way. A mixed methodology (qualitative and quantitative) was applied, obtaining information based on surveys, interviews, field observations, and systematizing the data in the traditional weighting of the structuring aspects of the park. The results were obtained from the methodological design scheme of iterative analysis of public spaces by Jan Güell. It is concluded that the use of urban strategies in the structuring elements of the park, such as vegetation, furniture, generating new activities, and security interventions, will specifically solve all the problems of the Huancavilca Park tested in a Pareto 80/20 Diagram.Keywords: public space, green areas, vegetation, street furniture, urban analysis
Procedia PDF Downloads 14612694 Estimation of Carbon Losses in Rice: Wheat Cropping System of Punjab, Pakistan
Authors: Saeed Qaisrani
Abstract:
The study was conducted to observe carbon and nutrient loss by burning of rice residues on rice-wheat cropping system The rice crop was harvested to conduct the experiment in a randomized complete block design (RCBD) with factors and 4 replications with a net plot size of 10 m x 20 m. Rice stubbles were managed by two methods i.e. Incorporation & burning of rice residues. Soil samples were taken to a depth of 30 cm before sowing & after harvesting of wheat. Wheat was sown after harvesting of rice by three practices i.e. Conventional tillage, Minimum tillage and Zero tillage to observe best tillage practices. Laboratory and field experiments were conducted on wheat to assess best tillage practice and residues management method with estimation of carbon losses. Data on the following parameters; establishment count, plant height, spike length, number of grains per spike, biological yield, fat content, carbohydrate content, protein content, and harvest index were recorded to check wheat quality & ensuring food security in the region. Soil physico-chemical analysis i.e. pH, electrical conductivity, organic matter, nitrogen, phosphorus, potassium, and carbon were done in soil fertility laboratory. Substantial results were found on growth, yield and related parameters of wheat crop. The collected data were examined statistically with economic analysis to estimate the cost-benefit ratio of using different tillage techniques and residue management practices. Obtained results depicted that Zero tillage method have positive impacts on growth, yield and quality of wheat, Moreover, it is cost effective methodology. Similarly, Incorporation is suitable and beneficial method for soil due to more nutrients provision and reduce the need of fertilizers. Burning of rice stubbles has negative impact including air pollution, nutrient loss, microbes died and carbon loss. Recommended the zero tillage technology to reduce carbon losses along with food security in Pakistan.Keywords: agricultural agronomy, food security, carbon sequestration, rice-wheat cropping system
Procedia PDF Downloads 27712693 Convergence of Strategic Tasks of Business Tourism and Hotel Industry Development: The Case of Georgia
Authors: Nana Katsitadze, Tamar Atanelishvili, Mariam Kutateladze, Alexandre Tushishvili
Abstract:
In the modern world, tourism has emerged as one of the most powerful economic sectors, and due to its high economic performance, it is attractive to the countries with various levels of economic development. The purpose of the present paper, dedicated to discussing the current problems of tourism development, is to find ways which will contribute to bringing more benefits to the country from the sector. Georgia has been successfully developing leisure tourism for the last ten years, and at the next stage of development business, tourism gains particular importance for Georgia as a means of mitigating the negative socio-economic effects caused by the seasonality of tourism and as a high-cost tourism market. Therefore, the object of the paper is to study the factors that contribute to the development of business tourism. The paper uses the research methods such as system analysis, synthesis, analogy, as well as historical, comparative, economic, and statistical methods of analysis. The information base for the research is made up of the statistics on the functioning of the tourism market of Georgia and foreign countries as well as official data provided by international organizations in the field of tourism. Based on the experience of business tourism around the world and identifying the successful start of business tourism development in Georgia and its causing factors, a business tourism development model for Georgia has been developed. The model might be useful as a methodological material for developing a business tourism development concept for the countries with limited financial resources but rich in tourism resources like Georgia. On the initial stage of development (in absence of conventional centers), the suggested concept of business tourism development involves organizing small and medium-sized meetings both in large cities and in regions by using high-class hotel infrastructure and event management services. Relocation of small meetings to the regions encourages inclusive development of the sector based on increasing the awareness of these regions as tourist sites as well as the increase in employment and sales of other tourism or consumer products. Business tourism increases the number of hotel visitors in the non-seasonal period and improves hotel performance indicators, which enhances the attractiveness of investing in the hotel business. According to the present concept of business tourism development, at the initial stage, development of business tourism is based on the existing markets, including internal market, neighboring markets and the markets of geographically relatively near countries and at the next stage, the concept involves generating tourists from other relatively distant target markets. As a result, by gaining experience in business tourism, enhancing professionalism, increasing awareness and stimulating infrastructure development, the country will prepare the basis to move to a higher stage of tourism development. In addition, the experience showed that for attracting large customers, peculiarities of the field require activation of state policy and active use of marketing mechanisms and tools of the state.Keywords: hotel industry development, MICE model, MICE strategy, MICE tourism in Georgia
Procedia PDF Downloads 15712692 Walls against Legal Identity: A Qualitative Study on Children of Refugees without Birth Registration in Malaysia
Authors: Rodziana M. Razali, Tamara J. Duraisingham
Abstract:
Malaysia is not a signatory to the 1951 Refugee Convention and its 1967 Protocol despite receiving the largest share of refugee inflows in Southeast Asia aside from Thailand. In Peninsular Malaysia, the majority of refugees and asylum seekers are from Myanmar, with Rohingya refugees recording the highest number compared to all other ethnicities. In the eastern state of Sabah, the presence of refugees who have long established themselves in the state is connected to those who escaped military persecution in southern Philippines in the 1970’s and 1980’s. A combination of legal and non-legal factors has created and sustained an adverse atmosphere of deprivation of legal identity for children of migrants including refugees born in Malaysia. This paper aims to qualitatively analyse the barriers to birth registration as the cornerstone of every person’s legal identity for children of refugees born in this country, together with the associated human rights implications. Data obtained through semi-structured interviews with refugees in Kota Kinabalu, Sabah and Rohingya refugees in Peninsular Malaysia shall be studied alongside secondary sources. Results show that births out of medical facilities, suspension of birth records, illiteracy, lack of awareness on the importance and procedures of birth registration, inability to meet documentary requirements, as well as fear of immigration enforcement, are the key factors hindering birth registration. These challenges exist against the backdrop of restrictive integration policy to avoid destabilising demographic and racial balance, political sentiment stirring xenophobic prejudices, as well as other economic and national security considerations. With no proof of their legal identity, the affected children grow up in a legal limbo, facing multiple human rights violations across generations. This research concludes that the country’s framework and practice concerning birth registration is in need of serious reform and improvement to reflect equality and universality of access to its birth registration system. Such would contribute significantly towards meeting its commitments to the post-2015 sustainable development agenda that pledges to 'Leave no one behind', as well as its recently announced National Human Rights Action Plan.Keywords: birth registration, children, Malaysia, refugees
Procedia PDF Downloads 17212691 Turkey-Syria Relations between 2002-2011 from the Perspective of Social Construction
Authors: Didem Aslantaş
Abstract:
In this study, the reforms carried out by the Justice and Development Party, which came to power in 2002, and how the foreign policy understanding it transformed reflected on the relations with Syria will be analyzed from the social constructivist theory. Contrary to the increasing security concerns of the states after the September 11 attacks, the main problem of the research is how the relations between Syria and Turkey developed and how they progressed in non-security dimensions. In order to find an answer to this question, the basic assumptions of the constructivist theory will be used. Since there is a limited number of studies in the literature, a comparative analysis of the Adana Consensus and the Cooperation Agreement between the Republic of Turkey and the Syrian Arab Republic, and the Joint Cooperation Agreement Against Terrorism and Terrorist Organizations will be included. In order to answer the main problem of the research and to support the arguments, document and archive scanning methods from qualitative research methods will be used. In the first part of the study, what the social constructivist theory is and its basic assumptions are explained, while in the second part, Turkey-Syria relations between 2002-2011 are included. In the third and last part, the relations between the two countries will be tried to be read through social constructivism by referring to the foreign policy features of the Ak Party period.Keywords: Social Constructivist Theory, foreign policy analysis, Justice and Development Party, Syria
Procedia PDF Downloads 83