Search results for: Arabic Fodio Nigeria security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5094

Search results for: Arabic Fodio Nigeria security

4854 Illicit Arms and the Emergence of Armed Groups in Nigeria

Authors: Halilu Babaji, Adamu Buba

Abstract:

Illicit arms and the emergence of armed groups have witnessed unprecedented situations of political uncertainties in Nigeria, and the twenty-first century globalisation has established the process that has benefited a good number of militia groups and thereby boosting both illicit arms movement and the thriving of terrorist groups, which are largely responsible for the longstanding threat to the national security and stability of the country. This has unleashed unforeseen consequences on the entire Sub-region, following an inflow of weapons and armed fighter which are motivated by weak governance, insecurity and poverty. The social, economic and political environments make it a fertile breeding ground for the penetration and development of terrorist groups in Sub-Saharan Africa.

Keywords: arms, emergence, insecurity, groups

Procedia PDF Downloads 229
4853 Gum Arabic-Coated Magnetic Nanoparticles for Methylene Blue Removal

Authors: Eman Alzahrani

Abstract:

Magnetic nanoparticles (MNPs) were fabricated using the chemical co-precipitation method followed by coating the surface of magnetic Fe3O4 nanoparticles with gum arabic (GA). The fabricated magnetic nanoparticles were characterised using transmission electron microscopy (TEM) which showed that the Fe3O4 nanoparticles and GA-MNPs nanoparticles had a mean diameter of 33 nm, and 38 nm, respectively. Scanning electron microscopy (SEM) images showed that the MNPs modified with GA had homogeneous structure and agglomerated. The energy dispersive X-ray spectroscopy (EDAX) spectrum showed strong peaks of Fe and O. X-ray diffraction patterns (XRD) indicated that the naked magnetic nanoparticles were pure Fe3O4 with a spinel structure and the covering of GA did not result in a phase change. The covering of GA on the magnetic nanoparticles was also studied by BET analysis, and Fourier transform infrared spectroscopy. Moreover, the present study reports a fast and simple method for removal and recovery of methylene blue dye (MB) from aqueous solutions by using the synthesised magnetic nanoparticles modified with gum arabic as adsorbent. The experimental results show that the adsorption process attains equilibrium within five minutes. The data fit the Langmuir isotherm equation and the maximum adsorption capacities were 8.77 mg mg-1 and 14.3 mg mg-1 for MNPs and GA-MNPs, respectively. The results indicated that the homemade magnetic nanoparticles were quite efficient for removing MB and will be a promising adsorbent for the removal of harmful dyes from waste-water.

Keywords: Fe3O4 magnetic nanoparticles, gum arabic, co-precipitation, adsorption dye, methylene blue, adsorption isotherm

Procedia PDF Downloads 401
4852 Anti-Language in Jordanian Spoken Arabic: A Sociolinguistic Perspective

Authors: Ahmad Mohammad Al-Harahsheh

Abstract:

Anti-language reflects anti-society; it is a restricted spoken code used among a group of interlocutors because of anti-society. This study aims to shed light on the sociolinguistic characteristics of anti-language used by prisoners in Jordan. The participants included were 15 male-Jordanian prisoners who have recently been released. The data were written, transliterated, and analyzed on the basis of sociolinguistics and discourse analysis. This study draws on sociolinguistic theory of language codes as the theoretical framework. The study concludes that anti-language is a male language and is used for secrecy, as the prisoners' tendency to protect themselves from the police; it is a verbal competition, contest and display. In addition, it is employed to express obnoxious ideas and acts by using more pleasant or blurred words and expressions. Also, the anti-language used by prisoners has six linguistic characteristics in JSA (Jordanian Spoken Arabic), such as relexicalization, neologism, rhyme formation, semantic change, derivation, and metaphorical expressions.

Keywords: anti-language, Jordanian Spoken Arabic, sociolinguistics, prisoners

Procedia PDF Downloads 339
4851 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations

Authors: Pratyush Vatsala, Sanjay Ahuja

Abstract:

The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.

Keywords: Kashmir, Mizoram, security, value, human right

Procedia PDF Downloads 245
4850 The Research of Weights Identify of Harbin Ecological Security Evaluation Index Based on AHP

Authors: Rong Guo, Mengshi Huang, Yujing Bai

Abstract:

With the rapid development of urbanization, the urban population increases and urban sprawl appeared. And these issues led to a sharp deterioration of the ecological environment. So, the urban ecological security evaluation was imminent. The weights identify of index was a key step of the research of ecological security evaluation. The AHP was widely used in the extensive research of weights identify of ecological security index. The characteristics of authority and quantitative can fully reflect the views of relevant experts. On the basis of building the ecological security evaluation index of Harbin, the paper combed and used the basic principle of the AHP, and calculated the weights of Harbin ecological security evaluation index through the process of the expert opinions “summary-feedback-summary”. And lay a foundation of future study of Harbin ecological security index, and guide the quantitative evaluation of Harbin ecological security.

Keywords: AHP, ecological security, evaluation Index, weights identify, harbin

Procedia PDF Downloads 466
4849 Placement of English Lexical Stress by Arabic-Speaking EFL Learners: How Computer-Generated Spectrographic Representations of Correct Pronunciations Can Provide a Visual Aid to Learners

Authors: Rami Al-Sadi

Abstract:

The assignment of lexical stress in English to its correct syllable is an enormous challenge to EFL learners, especially if their first language (L1) phonology is very different from English phonology. Arabic-speaking EFL learners not only stumble very frequently when it comes to placing the lexical stress in a given word, but they also seem to relegate the role of lexical stress as unimportant, mainly because in Arabic, unlike in English, lexical stress is not phonemic. This study aims at exploring the possible benefits of utilizing spectrographic representations of English words correctly pronounced, for the purpose of finding out how these spectrograms can provide a visual aid to the learners and help them rectify their stress placement errors as they see in real time spectrograms of the correct pronunciations juxtaposed on a computer screen with spectrograms of their own pronunciations for easy comparison. The study involved 120 students from the English Department at Prince Sattam bin Abdulaziz University in Saudi Arabia. 60 participants were taught the English lexical stress rules and also received spectrographic guidance on pronunciation; the other 60 received only verbal instruction on the stress rules and verbal feedback on their pronunciations. Statistical results showed that when the learners had the opportunity to ‘see’ their pronunciation mistakes, they were three times more likely to rectify their placement of lexical stress.

Keywords: Arabic-speaking EFL learners, lexical stress, pronunciation, spectrographic representation, stress placement

Procedia PDF Downloads 79
4848 Embarrassment as a Trigger Factor of Code Switching From Arabic to English in Egypt: A Case Study in Sociolinguistic

Authors: Samar Mohamed Magdy Abdelrahim

Abstract:

This study is an attempt to investigate the phenomenon of code-switching that takes place between Arabic and English in social discourse among high, well-educated, and young people in Egypt. The study aims at digging deeper to extract the trigger factors of such occurrences, namely when people encounter embarrassing situations in their daily conversations. Nowadays, most young Egyptians tend to use English words in certain situations that might make them feel embarrassed. To disguise their feelings and soften the impact of these words in the context, they code-switch (CS) from Arabic into English. To obtain accurate results, the study utilized a quantitative analysis approach that combines personal observations and a questionnaire to examine the phenomenon appropriately. The questionnaire was designed to categorize different types of embarrassing topics to be evaluated by participants. These topics include certain parts of the human body, types of clothes, taboo words, and specific medical conditions. Many studies have examined the use of CS as a prestigious way of communicating and expressing solidarity between Arabic and English. Other studies have dealt with switches that take place in classrooms. However, not many studies have paid attention to this angle of CS, especially in Egypt. The results conclude that gender and the circumstances that surround the conversation are essential factors of CS since females tend to switch codes more than males in embarrassing situations. According to the study, CS serves the socio-pragmatic function in terms of helping young, well-educated bilinguals express themselves in a second language that would be distressing in the first.

Keywords: code-switching, embarrassment, Arabic, English

Procedia PDF Downloads 52
4847 Pharyngealization Spread in Ibbi Dialect of Yemeni Arabic: An Acoustic Study

Authors: Fadhl Qutaish

Abstract:

This paper examines the pharyngealization spread in one of the Yemeni Arabic dialects, namely, Ibbi Arabic (IA). It investigates how pharyngealized sounds spread their acoustic features onto the neighboring vowels and change their default features. This feature has been investigated quietly well in MSA but still has to be deeply studied in the different dialect of Arabic which will bring about a clearer picture of the similarities and the differences among these dialects and help in mapping them based on the way this feature is utilized. Though the studies are numerous, no one of them has illustrated how far in the multi-syllabic word the spread can be and whether it takes a steady or gradient manner. This study tries to fill this gap and give a satisfactory explanation of the pharyngealization spread in Ibbi Dialect. This study is the first step towards a larger investigation of the different dialects of Yemeni Arabic in the future. The data recorded are represented in minimal pairs in which the trigger (pharyngealized or the non-pharyngealized sound) is in the initial or final position of monosyllabic and multisyllabic words. A group of 24 words were divided into four groups and repeated three times by three subjects which will yield 216 tokens that are tested and analyzed. The subjects are three male speakers aged between 28 and 31 with no history of neurological, speaking or hearing problems. All of them are bilingual speakers of Arabic and English and native speakers of Ibbi-Dialect. Recordings were done in a sound-proof room and praat software was used for the analysis and coding of the trajectories of F1 and F2 for the low vowel /a/ to see the effect of pharyngealization on the formant trajectory within the same syllable and in other syllables of the same word by comparing the F1 and F2 formants to the non-pharyngealized environment. The results show that pharyngealization spread is gradient (progressively and regressively). The spread is reflected in the gradual raising of F1 as we move closer towards the trigger and the gradual lowering of F2 as well. The results of the F1 mean values in tri-syllabic words when the trigger is word initially show that there is a raise of 37.9 HZ in the first syllable, 26.8HZ in the second syllable and 14.2HZ in the third syllable. F2 mean values undergo a lowering of 239 HZ in the first syllable, 211.7 HZ in the second syllable and 176.5 in the third syllable. This gradual decrease in the difference of F2 values in the non-pharyngealized and pharyngealized context illustrates that the spread is gradient. A similar result was found when the trigger is word-final which proves that the spread is gradient (progressively and regressively.

Keywords: pharyngealization, Yemeni Arabic, Ibbi dialect, pharyngealization spread

Procedia PDF Downloads 193
4846 Executive Order as an Effective Tool in Combating Insecurities and Human Rights Violations: The Case of the Special Anti-Robbery Squad and Youths in Nigeria

Authors: Cita Ayeni

Abstract:

Following countless violations of Human Rights in Nigeria by the various arms and agencies of government; from the Military to the Federal Police and other law enforcement agencies, Nigeria has been riddled with several reports of acts by these agencies against the citizens, ranging from illegal arrest and imprisonment, torture, disappearing, and extrajudicial killings, just to mention a few. This paper, focuses on SARS (Special Anti-Robbery Squad), a division of the Nigeria Police Force, and its reported threats to the people’s security, particularly the Nigerian youths, with continuous violence, extortion, illegal arrest and imprisonment, terror, and extrajudicial activities resulting in maiming and in most cases death, thus infringing on the human rights of the people it’s sworn to protect. This research further analyses how the activities of SARS has over the years instigated fear on the average Nigerian youth, preventing the free participation in daily life, education, job, and individual development, in turn impeding the realization of their full potentials for growth and participation in collective national development. This research analyzes the executive order by the then Acting President (Vice-President) of Nigeria, directing the overhauling of SARS, and its implementation by the Federal Police Force in determining if it’s enough to prevent or put a stop to the continuous Human Rights abuse and threat to the security of the individual citizen. Concluding that although the order by the Acting President was given with an intent to halt the various violations by SARS, and the Inspector General of Police’s (IGP) subsequent action by releasing a statement following the order, the bureaucracy in Nigeria, with a history of incompetency and a return to 'business as usual' after a reduced public outcry, it’s most likely that there will not be adequate follow up put in place and these violations would be slowly 'swept under the rug' with SARS officials not held accountable. It is recommended therefore that the Federal Government through the NPF, following the reforms made, in collaboration with the mentioned Independent Human Rights and civil societies organizations should periodically produce unbiased and publicly accessible reports on the implementation of these reforms and progress made. This will go a long way in assuring the public of actual fulfillment of the restructuring, reduce fear by the youths and restore some public faith in the government.

Keywords: special anti-robbery squad, youths in Nigeria, overhaul, insecurities, human rights violations

Procedia PDF Downloads 274
4845 Comparing Phonological Processes in Persian-Arabic Bilingual Children and Monolingual Children

Authors: Vafa Delphi, Maryam Delphi, Talieh Zarifian, Enayatolah Bakhshi

Abstract:

Background and Aim: Bilingualism is a common phenomenon in many countries of the world and May be consistent consonant errors in the speech of bilingual children. The aim of this study was to evaluate Phonological skills include occurrence proportion, frequency and type of phonological processes in Persian-Arabic speaking children in Ahvaz city, the center of Khuzestan. Method: This study is descriptive-analytical and cross-sectional. Twenty-eight children aged 36-48 months were divided into two groups Persian monolingual and Persian-Arabic bilingual: (14 participants in each group). Sampling was recruited randomly based on inclusion criteria from kindergartens of the Ahvaz city in Iran. The tool of this study was the Persian Phonological Test (PPT), a subtest of Persian Diagnostic Evaluation Articulation and Phonological test. In this test, Phonological processes were investigated in two groups: structure and substitution processes. Data was investigated using SPSS software and the U Mann-Whitney test. Results: The results showed that the proportion occurrence of substitution process was significantly different between two groups of monolingual and bilingual (P=0/001), But the type of phonological processes didn’t show a significant difference in both monolingual and bilingual children of the Persian-Arabic.The frequency of phonological processes is greater in bilingual children than monolingual children. Conclusion: The study showed that bilingualism has no effect on type of phonological processes, but this can be effective on the frequency of processes. Since the type of phonological processes in bilingual children is similar to monolingual children So we can conclude the Persian_arabic bilingual children's phonological system is similar to monolingual children.

Keywords: Persian-Arabic bilingual child, phonological processes, the proportion occurrence of syllable structure, the proportion occurrence of substitution

Procedia PDF Downloads 274
4844 Economic Environment and Entrepreneurial Development in Lagos and Ogun States, Nigeria

Authors: Jayeola Olabisi, T. Olawale Oladunjoye, Ademola A. Adewumi

Abstract:

The study empirically examines the relationship that exists between the economic environment and entrepreneurial development in Nigeria. A structured questionnaire is administered on the study and data collected are analysed using Analysis of Variance and Regression. The following variables are indices of determination; Interest Rate (IR); Income Tax (IT). The results of the study show that there is a significant relationship between IR and ED in Nigeria (p < 0.5) with a positive correlation (r=0.526, r2=0.276). Also, there is a significant relationship between IT and ED in Nigeria (p < 0.05), with a positive association (r=0.546; r2=0.299). The study concludes that the emergence of the higher level of the stable economic environment is critical to entrepreneurial development in Nigeria. Therefore, government involvement in public private partnership for infrastructural development, enlargement of productive, judicious and transparent use of funds collected from income tax and affordable interest rate will galvanise the inward sourcing of raw materials that boost entrepreneurial development in Nigeria.

Keywords: interest rate, income tax, business environment and entrepreneurial development

Procedia PDF Downloads 321
4843 Impacts of Sociological Dynamics on Entomophagy Practice and Food Security in Nigeria

Authors: O. B. Oriolowo, O. J. John

Abstract:

Empirical findings have shown insects to be nutritious and good source of food for man. However, human food preferences are not only determined by nutritional values of food consumed but, more importantly, by sociology and economic pressure. This study examined the interrelation between science and sociology in sustaining the acceptance of entomophagy among college students to combat food insecurity. A twenty items five Likert scale, College Students Entomophagy Questionnaire (CSEQ), was used to elucidate information from the respondents. The reliability coefficient was obtained to be 0.91 using Spearman-Brown Prophecy formula. Three research questions and three hypotheses were raised. Also, quantitative nutritional analysis of few insects and some established conventional protein sources were undertaking in order to compare their nutritional status. The data collected were analyzed using descriptive statistics of percentages and inferential statistics of correlation and Analysis of Variance (ANOVA). The results obtained showed that entomophagy has cultural heritage among different tribes in Nigeria and is an acceptable practice; it cuts across every social stratum and is practiced among both major religions. Moreover, insects compared favourably in term of nutrient contents when compared with the conventional animal protein sources analyzed. However, there is a gradual decline in the practice of entomophagy among students, which may be attributed to the influence of western civilization. This study, therefore, recommended an intensification of research and enlightenment of people on the usefulness of entomophagy so as to preserve its cultural heritage as well as boost human food security.

Keywords: entomophagy, food security, malnutrition, poverty alleviation, sociology

Procedia PDF Downloads 94
4842 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 487
4841 Control and Control Systems of Administration in Nigeria

Authors: Inuwa Abdu Ibrahim

Abstract:

Public officials are required to posses certain values to adequately protect public interest, by being leaders that are servants of the people. The reality in Nigeria is that leaders rule as masters of the people rather than servants. The paper looked at control and control systems of administration in Nigeria, its resultant consequences and ways of achieving true control of administrators and administration. Secondary source of data was adopted for the research. It concludes that the keys to administrative efficiency and effectiveness through control are implementation of the already existing procedures and laws, as well as commitment on the part of public officials.

Keywords: Accountability, Fraud, Administration, Nigeria

Procedia PDF Downloads 321
4840 Utilizing Entrepreneurship Education for National Development: Solving the Unemployment Problems in Nigeria

Authors: Kemi Olalekan Oduntan

Abstract:

This paper is of the view that entrepreneurship education (if well utilized) can solve the problems of unemployment and the clamor for paid employment in Nigeria. Nigeria educational system is bookish too more academically oriented thereby neglecting the entrepreneurial and vocational values to a greater extent. This paper examines the utilization of entrepreneurship education as a way out of the myriad of unemployment in Nigeria, with the need to refocus Nigeria educational system towards skills acquisition that prepares Nigerians for self-reliance, hence being an employer of labor, while sustainable development and economic diversification are also stressed. The paper further argues that entrepreneurship education will equip the students and Nigeria working class youth with the skills to be jobs creators and become an employer of labor which it will solve Nigeria’s problems such as poverty, overdependence on foreign goods, low economic growth and poor infrastructural development among others. We concludes and recommends that a new pedagogy that prepares students and working class youth with knowledge and practical skills to be entrepreneurial be instituted, promoted and made compulsory in all our tertiary institutions as a way of reducing the menace unemployment in Nigeria.

Keywords: entrepreneurship education, unemployment, national development, self-employment

Procedia PDF Downloads 385
4839 Predicting Mobile Payment System Adoption in Nigeria: An Empirical Analysis

Authors: Aminu Hamza

Abstract:

This study examines the factors that play vital role in the adoption of mobile payment system among consumers in Nigeria. Technology Acceptance Model (TAM) was used with two additional variables to form the conceptual model. The study was conducted in three Universities in Kano state, Nigeria. Convenience sampling method was used with a total valid 202 respondents which involved the students of Bayero University Kano (BUK), Northwest University, and Kano University of Science and Technology (KUST) Wudil, Kano, Nigeria. Results of the regression analysis revealed that Perceived ease of use (PEOU) and Perceived usefulness (PU) have significant and positive correlation with the behavioral intention to adopt mobile payment system. The findings of this study would be useful to the policy makers Central Bank of Nigeria (CBN), mobile network operators and providers of the services.

Keywords: mobile payment system, Nigeria, technology adoption, technology acceptance model

Procedia PDF Downloads 274
4838 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 392
4837 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 90
4836 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 502
4835 Generating Arabic Fonts Using Rational Cubic Ball Functions

Authors: Fakharuddin Ibrahim, Jamaludin Md. Ali, Ahmad Ramli

Abstract:

In this paper, we will discuss about the data interpolation by using the rational cubic Ball curve. To generate a curve with a better and satisfactory smoothness, the curve segments must be connected with a certain amount of continuity. The continuity that we will consider is of type G1 continuity. The conditions considered are known as the G1 Hermite condition. A simple application of the proposed method is to generate an Arabic font satisfying the required continuity.

Keywords: data interpolation, rational ball curve, hermite condition, continuity

Procedia PDF Downloads 393
4834 Pragmatics of Illness: A View from Jordanian Arabic

Authors: Marwan Jarrah, Nadia Nugrush, Sukainah Ali, Areej Allawzi

Abstract:

This research article investigates how illnesses (different types and severity) are expressed in Arabic discourse with a particular focus on input coming from Colloquial Jordanian Arabic (CJA). Drawing on a corpus of naturally occurring conversations, this article offers evidence that illnesses are predominantly expressed through two different sets of expressive strategies, namely direct expressive strategies (DES) and indirect expressive strategies (IES). The latter are exclusively used when cancer and mental health disorders are targeted. IES include the substitution of the name of the illness with some religious expressions (e.g., ʔallah ʔijdʒi:rna ‘May Allah keeps us safe’) or certain terms especially when cancer is meant (e.g., haðˤa:k ʔil-maraðˤ ‘that disease’). On the other hand, DES are used in conjunction with other illnesses (e.g., heart, kidneys, diabetes, etc.), regardless of their severity. DES include specific formulas that remarkably mention the name of the inflicted organ (e.g., [with-SOMEONE the ORGAN] as in ʕinduh ʔil-qalb ‘lit. with-him the heart’ meaning ‘He has a heart disease). We discuss the effects of religious beliefs and local norms and values in determining the use of these strategies.

Keywords: Illnesses, pragmatics, expressive strategies, religion

Procedia PDF Downloads 48
4833 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 517
4832 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 404
4831 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 470
4830 ICT Applications and Gender Participation on the Sustainability of Tourism and Hospitality Industry

Authors: Ayanfulu Yekini

Abstract:

The hotel and tourism industry remains male-dominated, particularly in the upper echelons of management and ICT remained underutilized. While there is a massive revolution in this trend across the globe, it appears much progress has not been made in our nation Nigeria. This paper aimed at evaluating the relevance of ICT and Gender Participation to Sustainability of Hospitality and Tourism Industry in Nigeria. The research study was conducted in tourism organizations, travel agents, hotels, restaurants, resorts, professionals in tourism, travel and hospitality industry within Nigeria. The respondents are from the tourism/hospitality industries employees and entrepreneurs only.

Keywords: ICT, hotel, gender participation, Nigeria, tourism

Procedia PDF Downloads 422
4829 Environment Problems of Energy Exploitation and Utilization in Nigeria

Authors: Aliyu Mohammed Lawal

Abstract:

The problems placed on the environment as a result of energy generation and usage in Nigeria is: potential damage to the environment health by CO, CO2, SOx, and NOx, effluent gas emissions and global warming. For instance in the year 2004 in Nigeria energy consumption was 58% oil and 34% natural gas but about 94 million metric tons of CO2 was emitted out of which 64% came from fossil fuels while about 35% came from fuel wood. The findings from this research on how to alleviate these problems are that long term sustainable development solutions should be enhanced globally; energy should be used more rationally renewable energy resources should be exploited and the existing emissions should be controlled to tolerate limits because the increase in energy demand in Nigeria places enormous strain on current energy facilities.

Keywords: effluent gas, emissions, NOx, SOx

Procedia PDF Downloads 346
4828 Human Security as a Tool of Protecting International Human Rights Law

Authors: Arenca Trashani

Abstract:

20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.

Keywords: human security, international human rights law, development, Albania, international law

Procedia PDF Downloads 720
4827 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: treaties, national security, Iran, Islamic Revolution

Procedia PDF Downloads 439
4826 Internalising Islamic Principles of Theocracy as a Pedestal for Good Governance in Nigeria

Authors: Busari Moshood Olanyi

Abstract:

Good governance remains the expectation of every political party in power, especially in this democratic dispensation of the Nigerian Nation. The need to ensure that the citizenry enjoys the dividends of democracy as often promised during various electioneering campaigns is envisioned to be the motif for different agendas and political slogans by different administrations. Unfortunately, different political agendas towards the security of lives and properties, halting the pillage of the economy by corrupt public officials and creation of employment opportunities for the youths, have a record of setback in the history of political leadership and governance in Nigeria. Therefore, the paper examined the principles of Islamic theocracy in its advocacy for a paradigm shift in the Nigerian political system, with a view to engendering good governance. Islamic political terms such as Shūrā (mutual consultation), ‘Adālah (equality and justice), Khilāfah (succession and stewardship) Majlis ash-Shūrā (consultative forum) and Muḥāsabah (accountability) were espoused as sacrosanct to implementing Islamic theocracy as an alternative system of government in Nigeria. The paper concluded by being flexible on the nomenclature of the suggested political system, considering the multi-religious nature of the country as a political entity. Among other recommendations, infusion of politics into our moral/religious system and not the other way round was considered a good step in the direction of a political paradigm shift for ensuring good governance and guaranteeing its sustainability in Nigeria.

Keywords: Nigerian nation, democracy, good governance, Islamic theocracy, paradigm shift

Procedia PDF Downloads 117
4825 On the Comprehension of English Compound Nouns by Arabic-Speaking EFL Learners

Authors: Abdel Rahman Altakhaineh, Mohamma Alaghawat, Hiba Alhendi

Abstract:

This paper reports an investigation of the comprehension of English compound nouns by sixty Arabic-speaking English Foreign Language (EFL) learners majoring in English at the University of Jordan, Amman. The investigation focused on the problems that these learners may encounter in understanding certain types of compounds and their ability to use their L1 compound noun knowledge to produce the meaning of L2 compound nouns. Participants whose English proficiency level was advanced underwent a test to identify the meaning ofan underlined compound without using a dictionary. Theresponses to the three different types of compounds were analyzed usingTwo-Way repeated measures ANOVA, and the results showed that there were different endocentric and exocentric compound responses within subordinative compounds, with a statistically significant difference between the two in favor of endocentric compounds. We argue that the endocentric, especially subordinative endocentric compounds,weremore easily understood due to its representative nature, i.e., because the head represents the meaning of the whole compound. The study concludes with pedagogical implications for teaching compound nouns.

Keywords: morphology, compounding, SLA, arabic-speaking EFL learners

Procedia PDF Downloads 81