Search results for: administrator
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 51

Search results for: administrator

51 Exploration of Perceived Value of a Special Education Laws and Ethics’ Course Impact on Administrator Capacity

Authors: Megan Chaney

Abstract:

In the United States, research continues to show school administrators do not view themselves as adequately prepared in the area of special education. Often, special education is an omitted topic of study for school administrator preparation programs. The majority of special education teachers do not view their principals as well-prepared to support them in the educational context. Administrator preparation in the area of special education may begin at the foundational levels of understanding but is fundamentally an equity issue when serving individuals from marginalized populations with an urgent need to increase inclusionary practices. Special education and building-level administrators have a direct impact on teacher quality, instructional practices, inclusion, and equity with the opportunity to shape positive school culture. The current study was situated within an innovative IHE/LEA partnership pathway implemented with current K-12 administrators earning a Mild/Moderate Education Specialist Credential or coursework equivalent. Specifically, the study examined administrator’s perception of the Special Education Laws and Ethics’ course value and impact on the capacity to serve children with exceptionalities within the comprehensive school site context.

Keywords: special education laws and ethics, school adminstrator perspectives, school administrator training, inclusive practices

Procedia PDF Downloads 75
50 Awareness of Child Rights as a Determinant of Effective Student Personnel Services in Public Secondary Schools in Southwestern Nigeria

Authors: Ademola Ibukunolu Atanda, Gbenga Nathaniel Adeola

Abstract:

The study examined awareness of child rights as a determinant of effective student personnel services in public secondary schools in Southwestern Nigeria. It was survey research. The sample comprised 433 teachers, 137 school administrators, and 968 students who were drawn by simple random sampling techniques. The respondents were given copies of questionnaires tagged “school administrator/teacher’s awareness of child’s rights and student personnel services elements inventory.” Key Informant Interview (KII) was also employed. The data were analysed using frequency count, percentages, weighted average, grand mean, standard deviation, and Pearson Product Moment Correlation, while KII was qualitatively analysed. The findings of the study revealed that public secondary school administrator awareness of child rights was at a moderate level, but the awareness of child rights was low among the teachers. The study equally revealed that student personnel services are moderately provided in public secondary schools in Southwestern Nigeria, but security remains a major challenge. It was also found that there was a significant relationship between awareness of child rights and effective student personnel services. It was therefore recommended, based on the findings, that attention should be given to heightening awareness of child rights among public secondary school administrators and teachers for effective student personnel services. Copies of the Child Right Act 2003 should also be made available in all public secondary schools in Southwestern Nigeria, as the study revealed that the documents were not available.

Keywords: student personnel, child right, administrator awareness, practice of child right

Procedia PDF Downloads 101
49 Diversity in Hockey: Factors Affecting Minority Participants in Ice Hockey, An Ethnography of the BGSU Ice Arena

Authors: Abass Suara

Abstract:

Following careful observation of the Bowling Green State University Ice Hockey Arena, it became imperative to study the reason for low racial minority participation in the game of Hockey. Therefore, this research aims to better understand the factors affecting diversity in Hockey. it conducted semi-structured interviews with two unique participants: a former hockey player who is now a coach and administrator while the other is a racial minority student-athlete. Following a content narrative analysis of the data gathered from observations and interviews, three higher-order themes emerged: economic, social, and relationship factors. The administrator's perceptions of low diversity bear heavily on the sport's financial demands while he also harps on how the sport fosters stronger team relationships. The perception of the student-athlete does not differ except that he added racism as a significant factor to the less racial minority participation in Ice Hockey. So, as much as Hockey has proved to be a costly sport to play, society also needs to pay some attention to the other psychological warfare racial minorities battle that has nothing to do with financial capabilities.

Keywords: sport, ice hockey, diversity in sport, ethnography

Procedia PDF Downloads 5
48 The Bioequivalent: A Medical Drug Search Tool Based on a Collaborative Database

Authors: Rosa L. Figueroa, Joselyn A. Hernández

Abstract:

During the last couple of years, the Ministry of Health have been developing new health policies in order to regulate and improve in benefit of the patient the pharmaceutical system in our country. However, there are still some deficiencies in how medicines have been accessed, distributed, and sold. Therefore, it is necessary to empower the patient by offering new instances to improve access to drug information. This work introduces ‘the bioequivalent’ a medical drug search tool created to increase both diffusion and getting information about the therapeutic equivalence of medicines for the patient. The development of the search tool started with a study on the availability of sources of drug information accessible to the patient where advantages and disadvantages were analyzed. The information obtained was used to feed the functional design of the new tool. The design of the new tool shows an external interface that includes a header, body, sidebar and footer. The header has a menu containing ‘Home,’ ‘Who we are,’ and ‘Mission and vision.’ The Body contains the medical drug search tool, and the Sidebar is for the user logging in. It could be anonym, registered user, as well as, administrator. Anonym user could only use the tool. Registered users could add some information on existing medicines in the database; however, adding information will be restricted and limited to specific items and subject to administrator approval because the information added must be endorsed by the Chilean Public Health Institute. On the other hand, the administrator will have all the privileges, including creating or deleting drugs or information about them. The Bioequivalent was tested on different mobile devices, and no fails have been found. Moreover, a small survey was answered by ten people who tested the tool, and all of them agree that the tool was useful to get information about bioequivalent drugs, and they would recommend the tool to others. Nevertheless, an 80% of people who tested the tool says it was easy to use, and a 70% indicates that additional help is not required. These results are evidence that ‘the Bioequivalent’ may contribute to the knowledge about the therapeutic bioequivalence and bioequivalent drugs existing in Chile. As future work, the tool will be developed to make it available to the public for a first testing stage in a more massive scenario.

Keywords: collaborative database, bioequivalent drugs, search tool, web platform

Procedia PDF Downloads 195
47 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 288
46 Geographic Information System Using Google Fusion Table Technology for the Delivery of Disease Data Information

Authors: I. Nyoman Mahayasa Adiputra

Abstract:

Data in the field of health can be useful for the purposes of data analysis, one example of health data is disease data. Disease data is usually in a geographical plot in accordance with the area. Where the data was collected, in the city of Denpasar, Bali. Disease data report is still published in tabular form, disease information has not been mapped in GIS form. In this research, disease information in Denpasar city will be digitized in the form of a geographic information system with the smallest administrative area in the form of district. Denpasar City consists of 4 districts of North Denpasar, East Denpasar, West Denpasar and South Denpasar. In this research, we use Google fusion table technology for map digitization process, where this technology can facilitate from the administrator and from the recipient information. From the administrator side of the input disease, data can be done easily and quickly. From the receiving end of the information, the resulting GIS application can be published in a website-based application so that it can be accessed anywhere and anytime. In general, the results obtained in this study, divided into two, namely: (1) Geolocation of Denpasar and all of Denpasar districts, the process of digitizing the map of Denpasar city produces a polygon geolocation of each - district of Denpasar city. These results can be utilized in subsequent GIS studies if you want to use the same administrative area. (2) Dengue fever mapping in 2014 and 2015. Disease data used in this study is dengue fever case data taken in 2014 and 2015. Data taken from the profile report Denpasar Health Department 2015 and 2016. This mapping can be useful for the analysis of the spread of dengue hemorrhagic fever in the city of Denpasar.

Keywords: geographic information system, Google fusion table technology, delivery of disease data information, Denpasar city

Procedia PDF Downloads 95
45 Managment Skills and Values of School Aministrator Public Secondary School Division of Leyte Area IV: Enchancement Model

Authors: Jenney Perez Bacalla

Abstract:

The study was conducted to assess the five (5) identified school administrators of the identified secondary schools in terms of professional characteristics, management skills and values patterns in the Division of Leyte Area IV for a proposed enhancement model for school administrators. The study utilized the qualitative method. There were two (2) groups of respondents: the teachers and the school administrators. The teachers perceived the management skills of the school administrators in their technical and conceptual skills and values in planning and organizing work, allocating and using of funds, submitting reports, decision-making, leading people, public relations and community involvement and other value development. It was found out in the study that most of the school administrators’ management skills were very well manifested. Their value patterns were also very well manifested. Most of them had earned master’s degree and with a unit in doctoral and five (5) years and above in service as a school administrator. Most administrators were performing and successfully execute the planning, organizing and utilizing funds and they were able to lead their subordinates. In planning, it shows that administrators studied the future and arrange the plan. Administrators also were able to manage, maintained the good environment wherein individual work together. School administrators were creating an environment conducive to learning. The school administrator is manifesting the desirable practices in school management. In terms of their educational qualifications, they were all qualified. Academic preparation, trainings and maturation were their attributes to the development of managerial skills of the school administrators. They showed competence in the areas of management skills that they were able to carry their functions with utmost responsibility and capability. School administrators in terms of seminars and trainings on administration and supervision were already equipped. It is concluded that the school administrators possessed the necessary skills and work values in administering the school.

Keywords: management skills and values, public secondary schools, qualitative, school administrators

Procedia PDF Downloads 291
44 Expert System: Debugging Using MD5 Process Firewall

Authors: C. U. Om Kumar, S. Kishore, A. Geetha

Abstract:

An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.

Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization

Procedia PDF Downloads 372
43 A Simple User Administration View of Computing Clusters

Authors: Valeria M. Bastos, Myrian A. Costa, Matheus Ambrozio, Nelson F. F. Ebecken

Abstract:

In this paper a very simple and effective user administration view of computing clusters systems is implemented in order of friendly provide the configuration and monitoring of distributed application executions. The user view, the administrator view, and an internal control module create an illusionary management environment for better system usability. The architecture, properties, performance, and the comparison with others software for cluster management are briefly commented.

Keywords: big data, computing clusters, administration view, user view

Procedia PDF Downloads 288
42 Upon Further Reflection: More on the History, Tripartite Role, and Challenges of the Professoriate

Authors: Jeffrey R. Mueller

Abstract:

This paper expands on the role of the professor by detailing the origins of the profession, adding some of the unique contributions of North American Universities, as well as some of the best practice recommendations, to the unique tripartite role of the professor. It describes current challenges to the profession including the ever-controversial student rating of professors. It continues with the significance of empowerment to the role of the professor. It concludes with a predictive prescription for the future of the professoriate and the role of the university-level educational administrator toward that end.

Keywords: professoriate history, tripartite role, challenges, empowerment, shared governance, administratization

Procedia PDF Downloads 370
41 Using the Dokeos Platform for Industrial E-Learning Solution

Authors: Kherafa Abdennasser

Abstract:

The application of Information and Communication Technologies (ICT) to the training area led to the creation of this new reality called E-learning. That last one is described like the marriage of multi- media (sound, image and text) and of the internet (diffusion on line, interactivity). Distance learning became an important totality for training and that last pass in particular by the setup of a distance learning platform. In our memory, we will use an open source platform named Dokeos for the management of a distance training of GPS called e-GPS. The learner is followed in all his training. In this system, trainers and learners communicate individually or in group, the administrator setup and make sure of this system maintenance.

Keywords: ICT, E-learning, learning plate-forme, Dokeos, GPS

Procedia PDF Downloads 443
40 A Study on Unix Process Crash Based on Efficient Process Management Method

Authors: Guo Haonan, Chen Peiyu, Zhao Hanyu, Burra Venkata Durga Kumar

Abstract:

Unix and Unix-like operating systems are widely used due to their high stability but are limited by the parent-child process structure, and the child process depends on the parent process, so the crash of a single process may cause the entire process group or even the entire system to fail. Another possibility of unexpected process termination is that the system administrator inadvertently closed the terminal or pseudo-terminal where the application was launched, causing the application process to terminate unexpectedly. This paper mainly analyzes the reasons for the problems and proposes two solutions.

Keywords: process management, daemon, login-bash and non-login bash, process group

Procedia PDF Downloads 94
39 Hospital Evacuation: Best Practice Recommendations

Authors: Ronald Blough

Abstract:

Hospitals, clinics, and medical facilities are the core of the Health Services sector providing 24/7 medical care to those in need. Any disruption of these important medical services highlights the vulnerabilities in the medical system. An internal or external event can create a catastrophic incident paralyzing the medical services causing the facility to shift into emergency operations with the possibility of evacuation. The hospital administrator and government officials must decide in a very short amount of time whether to shelter in place or evacuate. This presentation will identify best practice recommendations regarding the hospital evacuation decision and response analyzing previous hospital evacuations to encourage hospitals in the region to review or develop their own emergency evacuation plans.

Keywords: disaster preparedness, hospital evacuation, shelter-in-place, incident containment, health services vulnerability, hospital resources

Procedia PDF Downloads 329
38 Simulation Approach for a Comparison of Linked Cluster Algorithm and Clusterhead Size Algorithm in Ad Hoc Networks

Authors: Ameen Jameel Alawneh

Abstract:

A Mobile ad-hoc network (MANET) is a collection of wireless mobile hosts that dynamically form a temporary network without the aid of a system administrator. It has neither fixed infrastructure nor wireless ad hoc sessions. It inherently reaches several nodes with a single transmission, and each node functions as both a host and a router. The network maybe represented as a set of clusters each managed by clusterhead. The cluster size is not fixed and it depends on the movement of nodes. We proposed a clusterhead size algorithm (CHSize). This clustering algorithm can be used by several routing algorithms for ad hoc networks. An elected clusterhead is assigned for communication with all other clusters. Analysis and simulation of the algorithm has been implemented using GloMoSim networks simulator, MATLAB and MAPL11 proved that the proposed algorithm achieves the goals.

Keywords: simulation, MANET, Ad-hoc, cluster head size, linked cluster algorithm, loss and dropped packets

Procedia PDF Downloads 353
37 Managing Human-Wildlife Conflicts Compensation Claims Data Collection and Payments Using a Scheme Administrator

Authors: Eric Mwenda, Shadrack Ngene

Abstract:

Human-wildlife conflicts (HWCs) are the main threat to conservation in Africa. This is because wildlife needs overlap with those of humans. In Kenya, about 70% of wildlife occurs outside protected areas. As a result, wildlife and human range overlap, causing HWCs. The HWCs in Kenya occur in the drylands adjacent to protected areas. The top five counties with the highest incidences of HWC are Taita Taveta, Narok, Lamu, Kajiado, and Laikipia. The common wildlife species responsible for HWCs are elephants, buffaloes, hyenas, hippos, leopards, baboons, monkeys, snakes, and crocodiles. To ensure individuals affected by the conflicts are compensated, Kenya has developed a model of HWC compensation claims data collection and payment. We collected data on HWC from all eight Kenya Wildlife Service (KWS) Conservation Areas from 2009 to 2019. Additional data was collected from stakeholders' consultative workshops held in the Conservation Areas and a literature review regarding payment of injuries and ongoing insurance schemes being practiced in areas. This was followed by the description of the claims administration process and calculation of the pricing of the compensation claims. We further developed a digital platform for data capture and processing of all reported conflict cases and payments. Our product recognized four categories of HWC (i.e., human death and injury, property damage, crop destruction, and livestock predation). Personal bodily injury and human death were provided based on the Continental Scale of Benefits. We proposed a maximum of Kenya Shillings (KES) 3,000,000 for death. Medical, pharmaceutical, and hospital expenses were capped at a maximum of KES 150,000, as well as funeral costs at KES 50,000. Pain and suffering were proposed to be paid for 12 months at the rate of KES 13,500 per month. Crop damage was to be based on farm input costs at a maximum of KES 150,000 per claim. Livestock predation leading to death was based on Tropical Livestock Unit (TLU), which is equivalent to KES 30,000, whick includes Cattle (1 TLU = KES 30,000), Camel (1.4 TLU = KES 42,000), Goat (0.15 TLU = 4,500), Sheep (0.15 TLU = 4,500), and Donkey (0.5 TLU = KES 15,000). Property destruction (buildings, outside structures and harvested crops) was capped at KES 150,000 per any one claim. We conclude that it is possible to use an administrator to collect data on HWC compensation claims and make payments using technology. The success of the new approach will depend on a piloting program. We recommended that a pilot scheme be initiated for eight months in Taita Taveta, Kajiado, Baringo, Laikipia, Narok, and Meru Counties. This will test the claims administration process as well as harmonize data collection methods. The results of this pilot will be crucial in adjusting the scheme before country-wide roll out.

Keywords: human-wildlife conflicts, compensation, human death and injury, crop destruction, predation, property destruction

Procedia PDF Downloads 9
36 TMBCoI-SIOT: Trust Management System Based on the Community of Interest for the Social Internet of Things

Authors: Oumaima Ben Abderrahim, Mohamed Houcine Elhedhili, Leila Saidane

Abstract:

In this paper, we propose a trust management system based on clustering architecture for the social internet of things called TMBCO-SIOT. The proposed model integrates numerous factors such as direct and indirect trust; transaction factor; precaution factor; and social modeling of trust. The novelty of our approach can be summed up in two aspects. The first aspect concerns the architecture based on the community of interest (CoT) where each community is headed by an administrator (admin). However, the second aspect is the trust management system that tries to prevent On-Off attacks and mitigates dishonest recommendations using the k-means algorithm and guarantor things. The effectiveness of the proposed system is proved by simulation against malicious nodes.

Keywords: IoT, trust management system, attacks, trust, dishonest recommendations, K-means algorithm

Procedia PDF Downloads 180
35 Negotiating Communication Options for Deaf-Disabled Children

Authors: Steven J. Singer, Julianna F. Kamenakis, Allison R. Shapiro, Kimberly M. Cacciato

Abstract:

Communication and language are topics frequently studied among deaf children. However, there is limited research that focuses specifically on the communication and language experiences of Deaf-Disabled children. In this ethnography, researchers investigated the language experiences of six sets of parents with Deaf-Disabled children who chose American Sign Language (ASL) as the preferred mode of communication for their child. Specifically, the researchers were interested in the factors that influenced the parents’ decisions regarding their child’s communication options, educational placements, and social experiences. Data collection in this research included 18 hours of semi-structured interviews, 20 hours of participant observations, over 150 pages of reflexive journals and field notes, and a 2-hour focus group. The team conducted constant comparison qualitative analysis using NVivo software and an inductive coding procedure. The four researchers each read the data several times until they were able to chunk it into broad categories about communication and social influences. The team compared the various categories they developed, selecting ones that were consistent among researchers and redefining categories that differed. Continuing to use open inductive coding, the research team refined the categories until they were able to develop distinct themes. Two team members developed each theme through a process of independent coding, comparison, discussion, and resolution. The research team developed three themes: 1) early medical needs provided time for the parents to explore various communication options for their Deaf-Disabled child, 2) without intervention from medical professionals or educators, ASL emerged as a prioritized mode of communication for the family, 3) atypical gender roles affected familial communication dynamics. While managing the significant health issues of their Deaf-Disabled child at birth, families and medical professionals were so fixated on tending to the medical needs of the child that the typical pressures of determining a mode of communication were deprioritized. This allowed the families to meticulously research various methods of communication, resulting in an informed, rational, and well-considered decision to use ASL as the primary mode of communication with their Deaf-Disabled child. It was evident that having a Deaf-Disabled child meant an increased amount of labor and responsibilities for parents. This led to a shift in the roles of the family members. During the child’s development, the mother transformed from fulfilling the stereotypical roles of nurturer and administrator to that of administrator and champion. The mother facilitated medical proceedings and educational arrangements while the father became the caretaker and nurturer of their Deaf-Disabled child in addition to the traditional role of earning the family’s primary income. Ultimately, this research led to a deeper understanding of the critical role that time plays in parents’ decision-making process regarding communication methods with their Deaf-Disabled child.

Keywords: American Sign Language, deaf-disabled, ethnography, sociolinguistics

Procedia PDF Downloads 84
34 Attack Redirection and Detection using Honeypots

Authors: Chowduru Ramachandra Sharma, Shatunjay Rawat

Abstract:

A false positive state is when the IDS/IPS identifies an activity as an attack, but the activity is acceptable behavior in the system. False positives in a Network Intrusion Detection System ( NIDS ) is an issue because they desensitize the administrator. It wastes computational power and valuable resources when rules are not tuned properly, which is the main issue with anomaly NIDS. Furthermore, most false positives reduction techniques are not performed during the real-time of attempted intrusions; instead, they have applied afterward on collected traffic data and generate alerts. Of course, false positives detection in ‘offline mode’ is tremendously valuable. Nevertheless, there is room for improvement here; automated techniques still need to reduce False Positives in real-time. This paper uses the Snort signature detection model to redirect the alerted attacks to Honeypots and verify attacks.

Keywords: honeypot, TPOT, snort, NIDS, honeybird, iptables, netfilter, redirection, attack detection, docker, snare, tanner

Procedia PDF Downloads 122
33 How to Perform Proper Indexing?

Authors: Watheq Mansour, Waleed Bin Owais, Mohammad Basheer Kotit, Khaled Khan

Abstract:

Efficient query processing is one of the utmost requisites in any business environment to satisfy consumer needs. This paper investigates the various types of indexing models, viz. primary, secondary, and multi-level. The investigation is done under the ambit of various types of queries to which each indexing model performs with efficacy. This study also discusses the inherent advantages and disadvantages of each indexing model and how indexing models can be chosen based on a particular environment. This paper also draws parallels between various indexing models and provides recommendations that would help a Database administrator to zero-in on a particular indexing model attributed to the needs and requirements of the production environment. In addition, to satisfy industry and consumer needs attributed to the colossal data generation nowadays, this study has proposed two novel indexing techniques that can be used to index highly unstructured and structured Big Data with efficacy. The study also briefly discusses some best practices that the industry should follow in order to choose an indexing model that is apposite to their prerequisites and requirements.

Keywords: indexing, hashing, latent semantic indexing, B-tree

Procedia PDF Downloads 113
32 An E-Assessment Website to Implement Hierarchical Aggregate Assessment

Authors: M. Lesage, G. Raîche, M. Riopel, F. Fortin, D. Sebkhi

Abstract:

This paper describes a Web server implementation of the hierarchical aggregate assessment process in the field of education. This process describes itself as a field of teamwork assessment where teams can have multiple levels of hierarchy and supervision. This process is applied everywhere and is part of the management, education, assessment and computer science fields. The E-Assessment website named “Cluster” records in its database the students, the course material, the teams and the hierarchical relationships between the students. For the present research, the hierarchical relationships are team member, team leader and group administrator appointments. The group administrators have the responsibility to supervise team leaders. The experimentation of the application has been performed by high school students in geology courses and Canadian army cadets for navigation patrols in teams. This research extends the work of Nance that uses a hierarchical aggregation process similar as the one implemented in the “Cluster” application.

Keywords: e-learning, e-assessment, teamwork assessment, hierarchical aggregate assessment

Procedia PDF Downloads 333
31 Challenges and Opportunities for University Management Brought by 2016 Presidential Campaign Immigration Policies and Politics within the United States

Authors: Autumn Tooms Cypres

Abstract:

Throughout the 2016 presidential campaign, Republican nominee Donald Trump, capitalizing on his reputation for blunt and brash comments, created a political brand based on unedited statements and sweeping promises. While he vowed to 'Make America Great Again,' for many, the candidate’s discourse invoked legacies of marginalization and exclusion. As a result, this discussion focuses on Trump’s anti-immigration discourse (one of the primary foci of his campaign platform) and its influence across educational settings. The purpose of this effort is to demonstrate the power of political discourses relative to educational settings and to discuss the resulting everyday leadership challenges and opportunities. Discourse analysis frameworks are used to unpack the socio-political implications of the presidential campaign. In particular, they examine a serious of emails that a university administrator received post-election. The discussion concludes that leaders in education have a critical role to maintaining democratic institutions and ensuring inclusivity and belonging for all educational stakeholders.

Keywords: educational managment, politics, immigration, discourse

Procedia PDF Downloads 249
30 The Impact on the Composition of Survey Refusals΄ Demographic Profile When Implementing Different Classifications

Authors: Eva Tsouparopoulou, Maria Symeonaki

Abstract:

The internationally documented declining survey response rates of the last two decades are mainly attributed to refusals. In fieldwork, a refusal may be obtained not only from the respondent himself/herself, but from other sources on the respondent’s behalf, such as other household members, apartment building residents or administrator(s), and neighborhood residents. In this paper, we investigate how the composition of the demographic profile of survey refusals changes when different classifications are implemented and the classification issues arising from that. The analysis is based on the 2002-2018 European Social Survey (ESS) datasets for Belgium, Germany, and United Kingdom. For these three countries, the size of selected sample units coded as a type of refusal for all nine under investigation rounds was large enough to meet the purposes of the analysis. The results indicate the existence of four different possible classifications that can be implemented and the significance of choosing the one that strengthens the contrasts of the different types of respondents' demographic profiles. Since the foundation of social quantitative research lies in the triptych of definition, classification, and measurement, this study aims to identify the multiplicity of the definition of survey refusals as a methodological tool for the continually growing research on non-response.

Keywords: non-response, refusals, European social survey, classification

Procedia PDF Downloads 51
29 Relationship between Teachers' Empowerment and Personality Traits, Case Study: Tehran Public Schools of Region 5

Authors: Alireza Ladan Moghaddam, Hadi Rezghi Shirsavar, Panteha Pirayandeh

Abstract:

This study aimed to investigate the Relationship between Teachers' Empowerment and Personality Traits (Case Study: Tehran Public Schools of region 5). To achieve this objective, a descriptive research in correlation type has been used. The statistical population of this research includes all teachers and administrators in Tehran Public Schools of region 5. In this study, a five factor model of personality and a 49-item questionnaire to measure empowerment of teachers have been used to assess personality traits of administrators and the teachers' empowerment, respectively. The research hypotheses test has been done using SPSS and LISREL software. The results show that in general there is no significant relationship between personality traits of administrators and teachers' empowerment, and among the 5 dimensions of personality, there is only significant relationship between the characteristic of administrators' agreeableness and teachers' empowerment. The results suggested a way to improve knowledge and skills of teachers a top priority administrator consider. In addition, the performance of teachers affected by the performance of the executive directors, so it is necessary to improve their yield towering notice.

Keywords: personality traits, five factor model of personality, teacher, empowerment

Procedia PDF Downloads 313
28 Monitoring System for Electronic Procurement Systems

Authors: Abdulah Fajar

Abstract:

Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP.

Keywords: procurement system, SNMP, LKPP, LPSE

Procedia PDF Downloads 371
27 Academic Staff Identity and Emotional Labour: Exploring Pride, Motivation, and Relationships in Universities

Authors: Keith Schofield, Garry R. Prentice

Abstract:

The perceptions of the work an academic does, and the environment in which they do it, contributes to the professional identity of that academic. In turn, this has implications for the level of involvement they have in their job, their satisfaction, and their work product. This research explores academic identities in British and Irish institutions and considers the complex interplay between identity, practice, and participation. Theoretical assumptions made in this paper assert that meaningful work has positive effects on work pride, organisational commitment, organisational citizenship, and motivation; when employees participate enthusiastically they are likely to be more engaged, more successful, and more satisfied. Further examination is given to the context in which this participation happens; the nature of institutional process, management, and relationships with colleagues, team members, and students is considered. The present study follows a mixed-methods approach to explore work satisfaction constructs in a number of academic contexts in the UK and Ireland. The quantitative component of this research (Convenience Sample: 155 academics, and support/ administrative staff; 36.1% male, 63.9% female; 60.8% academic staff, 39.2% support/ administration staff; across a number of universities in the UK and Ireland) was based on an established emotional labour model and was tested across gender groups, job roles, and years of service. This was complimented by qualitative semi-structured interviews (Purposive Sample: 10 academics, and 5 support/ administrative staff across the same universities in the UK and Ireland) to examine various themes including values within academia, work conditions, professional development, and transmission of knowledge to students. Experiences from both academic and support perspectives were sought in order to gain a holistic view of academia and to provide an opportunity to explore the dynamic of the academic/administrator relationship within the broader institutional context. The quantitative emotional labour model, tested via a path analysis, provided a robust description of the relationships within the data. The significant relationships found within the quantitative emotional labour model included a link between non-expression of true feelings resulting in emotional labourious work and lower levels of intrinsic motivation and higher levels of extrinsic motivation. Higher levels of intrinsic motivation also linked positively to work pride. These findings were further explored in the qualitative elements of the research where themes emerged including the disconnection between faculty management and staff, personal fulfilment and the friction between the identities of teacher, researcher/ practitioner and administrator. The implications of the research findings from this study are combined and discussed in relation to possible identity-related and emotional labour management-related interventions. Further, suggestions are made to institutions concerning the application of these findings including the development of academic practices, with specific reference to the duality of identity required to service the combined teacher/ researcher role. Broader considerations of the paper include how individuals and institutions may engage with the changing nature of students-as-consumers as well as a recommendation to centralise personal fulfillment through the development of professional academic identities.

Keywords: academic work, emotional labour, identity friction, mixed methods

Procedia PDF Downloads 233
26 Influence of Human Resource Management Practices on Agricultural Employees’ Behavior

Authors: B. G. Abiona, O. E. Fapojuwo, T. Akinlawon

Abstract:

This study assessed the influence of human resource management practices on agricultural employees’ behavior. Data were collected from 75 randomly selected respondents using a well-structured questionnaire. The mean age of the employees’ was 43.2 years. Major human resource management practices that influence employees behaviors were: In-service training are given to employees on a regular basis (average value of x=3.44), management reward employees who are committed to their job (average value of x =3.41) and reward are designed to encourage wide participation and activity (average value of x=3.41). Also, major employees’ behavior include: Managers and employees’ wants to create better job performance (average value of x=3.13) and administrator provides praise and recognition for effective performance and show appreciation for special effort (average value of x=3.05). Major factors affecting employees’ behavior were: inadequate training (average value of x=2.93), inadequate local and international training (average value of x=2.87), inadequate grants for training programmes (average value of x= 2.81). A significant relationship was found between gender (χ2 = 37.204, P<0.05), educational qualification (χ2 = 59.093, P<0.05), income (r =0.122, P<0.05) and human resource management practices (r = 0.573, P< 0.05) of the respondents and employees’ behavior. Management should encourage employees who are committed to their job through awards and recognition.

Keywords: human resources management, agricultural employees, behaviour research institutes, Nigeria

Procedia PDF Downloads 207
25 Identifying Understanding Expectations of School Administrators Regarding School Assessment

Authors: Eftah Bte. Moh Hj Abdullah, Izazol Binti Idris, Abd Aziz Bin Abd Shukor

Abstract:

This study aims to identify the understanding expectations of school administrators concerning school assessment. The researcher utilized a qualitative descriptive study on 19 administrators from three secondary schools in the North Kinta district. The respondents had been interviewed on their understanding expectations of school assessment using the focus group discussion method. Overall findings showed that the administrators’ understanding expectations of school assessment was weak; especially in terms of content focus, articulation across age and grade, transparency and fairness, as well as the pedagogical implications. Findings from interviews indicated that administrators explained their understanding expectations of school assessment from the aspect of school management, and not from the aspect of instructional leadership or specifically as assessment leaders. The study implications from the administrators’ understanding expectations may hint at the difficulty of the administrators to function as assessment leaders, in order to reduce their focus as manager, and move towards their primary role in the process of teaching and learning. The administrator, as assessment leaders, would be able to reach assessment goals via collaboration in identifying and listing teacher assessment competencies, how to construct assessment capacity, how to interpret assessment correctly, the use of assessment and how to use assessment information to communicate confidently and effectively to the public.

Keywords: assessment leaders, assessment goals, instructional leadership, understanding expectation of assessment

Procedia PDF Downloads 407
24 Cyber Bullying Victimization of Elementary School Students and Their Reflections on the Victimization

Authors: Merve Sadetas Sezer, Ismail Sahin, Ahmet Oguz Akturk

Abstract:

With the use of developing technology, mostly in communication and entertainment, students spend considerable time on the internet. In addition to the advantages provided by the internet, social isolation brings problems such as addiction. This is one of the problems of the virtual violence. Cyber-bullying is the common name of the intensities which students are exposed on the internet. The purpose of this study designed as a qualitative research is to find out the cyber bullying varieties and its effects on elementary school students. The participants of this research are 6th, 7th and 8th grade students of a primary school and 24 students agreed to participate in the study. The students were asked to fill an interview with semi-structured open-ended questions. According to the results obtained in the research, the most important statements determined by the participants are breaking passwords on social networking sites, slang insult to blasphemy and taking friendship offers from unfamiliar people. According to participants from the research, the most used techniques to prevent themselves from cyber bullying are to complain to the site administrator, closing accounts on social networking sites and countercharging. Also, suggestions were presented according to the findings.

Keywords: bullying, cyber-bullying, elementary, peer-relationship, virtual victimization

Procedia PDF Downloads 308
23 The Reality of Engineering Education in the Kingdom of Saudi Arabia and Its Suitainability to The Requirements of The Labor Market

Authors: Hamad Albadr

Abstract:

With the development that has occurred in the orientation of universities from liability cognitive and maintain the culture of the community to responsibility job formation graduates to work according to the needs of the community development; representing universities in today's world, the prime motivator for the wheel of development in the community and find appropriate solutions to the problems they are facing and adapt to the demands of the changing environment. In this paper review of the reality of engineering education in the Kingdom of Saudi Arabia and its suitability to the requirements of the labor market, where they will be looking at the university as a system administrator educational using System Analysis Approach as one of the methods of modern management to analyze the performance of organizations and institutions, administrative and quality assessment. According to this approach is to deal with the system as a set of subsystems as components of the main divided into : input, process, and outputs, and the surrounding environment, will also be used research descriptive method and analytical , to gather information, data and analysis answers of the study population that consisting of a random sample of the beneficiaries of these services that the universities provided that about 500 professionals about employment in the business sector.

Keywords: universities in Saudi Arabia, engineering education, labor market, administrative, quality assessment

Procedia PDF Downloads 302
22 Constraints Women Academician's Participation at Administrative Positions in Higher Education of Developing Countries

Authors: Bahieh Mohajeri, Mohamad Sharif Mustaf, Mahani Mokhtar

Abstract:

Purpose: This paper attempts to set the stage for the exploration of female participation in administrative positions within non-western countries by reviewing the studies on female in administrative positions within non-western countries and suggesting guidelines for future studies in this area in developing countries. Methodology: The paper is based on a systematic review of papers that have been published in journals. Findings: The review focuses on constraints to female’s participation in higher education of developing countries (e.g. strong family responsibility, low levels of women faculty members, social values and gendered cultural factors). Practical Implications: Further guidelines for future examination of this field of study are suggested (e.g. adopting a different theoretical view).Value: The article is an initial attempt to gather knowledge about constraints of female administrators in higher education of developing countries. The subject has received less attention in studies on administration and gender. In addition, the article provides suggestions for future studies in order to understand women administrators’ experiences in different educational and cultural settings.

Keywords: administrative position, female administrator, developing countries, participation

Procedia PDF Downloads 223