Search results for: Rosemond Mbii
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2

Search results for: Rosemond Mbii

2 Experiences and Challenges of Menstruation Among Rural Schoolgirls in Ghana: A Case of Nadowli-Kaleo District in the Upper West Region of Ghana

Authors: Rosemond Mbii

Abstract:

Menstruation is a critical topic. However normal menstruation is, it has become a determinant in the education of young women today. The research focuses on Breaking the silence and accessing menstrual hygiene management's challenges and experiences among rural schoolgirls in Ghana. The study's goal was to examine the menstrual hygiene practices of female students. Participants described their menstrual hygiene practices, their problems, and how they coped with their menstrual symptoms. The research used a qualitative technique through group interviews, personal interviews, and open-ended questionnaires since it is easier to understand a phenomenon from the subject's viewpoint. Sen's capacities approach and Feminist Political Ecology (FPE) were used to analyze the data. Menstruation was known to girls even before their menarche. A mother or grandmother, friends, and teachers were the primary sources of menstrual knowledge. The study also found that most girls use sanitary products made of fabrics, pads, and cotton during menstruation. Among the difficulties the girls faced, the study found were emotional upset, physical discomfort (cramps in the stomach, fatigue), embarrassment, and inadequate sanitation hygiene facilities. The girls wore many garments to avoid leaks; checked their skirts continuously, went to the bathroom with their friends to act as spics while they changed; sat differently on the chairs, and took medicine to reduce period discomfort. Introduction of a health care teacher who supplies sanitary products and medications to girls during school time. Euphemisms as a form of communication amongst girls were all coping mechanisms girls and the school developed. Another finding was that some girls continued to go to school even while having their periods, while others did not. Discomfort and menstruation cramps hampered class participation. In addition, the study revealed insufficient sanitation and hygiene for females to change sanitary products in private and manage menstrual hygiene comfortably.

Keywords: MHM (menstrual hygiene management), rural area, sanitation, menstruation, water, schoolgirl, rural area, sanitation, menstruation, water

Procedia PDF Downloads 82
1 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 131