Search results for: case studies of cyberattacks in armed conflicts
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 20520

Search results for: case studies of cyberattacks in armed conflicts

20280 Neuroanatomical Specificity in Reporting & Diagnosing Neurolinguistic Disorders: A Functional & Ethical Primer

Authors: Ruairi J. McMillan

Abstract:

Introduction: This critical analysis aims to ascertain how well neuroanatomical aetiologies are communicated within 20 case reports of aphasia. Neuroanatomical visualisations based on dissected brain specimens were produced and combined with white matter tract and vascular taxonomies of function in order to address the most consistently underreported features found within the aphasic case study reports. Together, these approaches are intended to integrate aphasiological knowledge from the past 20 years with aphasiological diagnostics, and to act as prototypal resources for both researchers and clinical professionals. The medico-legal precedent for aphasia diagnostics under Canadian, US and UK case law and the neuroimaging/neurological diagnostics relative to the functional capacity of aphasic patients are discussed in relation to the major findings of the literary analysis, neuroimaging protocols in clinical use today, and the neuroanatomical aetiologies of different aphasias. Basic Methodology: Literature searches of relevant scientific databases (e.g, OVID medline) were carried out using search terms such as aphasia case study (year) & stroke induced aphasia case study. A series of 7 diagnostic reporting criteria were formulated, and the resulting case studies were scored / 7 alongside clinical stroke criteria. In order to focus on the diagnostic assessment of the patient’s condition, only the case report proper (not the discussion) was used to quantify results. Statistical testing established if specific reporting criteria were associated with higher overall scores and potentially inferable increases in quality of reporting. Statistical testing of whether criteria scores were associated with an unclear/adjusted diagnosis were also tested, as well as the probability of a given criterion deviating from an expected estimate. Major Findings: The quantitative analysis of neuroanatomically driven diagnostics in case studies of aphasia revealed particularly low scores in the connection of neuroanatomical functions to aphasiological assessment (10%), and in the inclusion of white matter tracts within neuroimaging or assessment diagnostics (30%). Case studies which included clinical mention of white matter tracts within the report itself were distributed among higher scoring cases, as were case studies which (as clinically indicated) related the affected vascular region to the brain parenchyma of the language network. Concluding Statement: These findings indicate that certain neuroanatomical functions are integrated less often within the patient report than others, despite a precedent for well-integrated neuroanatomical aphasiology also being found among the case studies sampled, and despite these functions being clinically essential in diagnostic neuroimaging and aphasiological assessment. Therefore, ultimately the integration and specificity of aetiological neuroanatomy may contribute positively to the capacity and autonomy of aphasic patients as well as their clinicians. The integration of a full aetiological neuroanatomy within the reporting of aphasias may improve patient outcomes and sustain autonomy in the event of medico-ethical investigation.

Keywords: aphasia, language network, functional neuroanatomy, aphasiological diagnostics, medico-legal ethics

Procedia PDF Downloads 37
20279 Studies on the Teaching Pedagogy and Effectiveness for the Multi-Channel Storytelling for Social Media, Cinema, Game, and Streaming Platform: Case Studies of Squid Game

Authors: Chan Ka Lok Sobel

Abstract:

The rapid evolution of digital media platforms has given rise to new forms of narrative engagement, particularly through multi-channel storytelling. This research focuses on exploring the teaching pedagogy and effectiveness of multi-channel storytelling for social media, cinema, games, and streaming platforms. The study employs case studies of the popular series "Squid Game" to investigate the diverse pedagogical approaches and strategies used in teaching multi-channel storytelling. Through qualitative research methods, including interviews, surveys, and content analysis, the research assesses the effectiveness of these approaches in terms of student engagement, knowledge acquisition, critical thinking skills, and the development of digital literacy. The findings contribute to understanding best practices for incorporating multi-channel storytelling into educational contexts and enhancing learning outcomes in the digital media landscape.

Keywords: digital literacy, game-based learning, artificial intelligence, animation production, educational technology

Procedia PDF Downloads 64
20278 Research Methods and Design Strategies to Improve Resilience in Coastal and Estuary Cities

Authors: Irene Perez Lopez

Abstract:

Delta and estuary cities are spaces constantly evolving, incessantly altered by the ever-changing actions of water transformation. Strategies that incorporate comprehensive and integrated approaches to planning and design with water will play a powerful role in defining new types of flood defense. These strategies will encourage more resilient and active urban environments, allowing for new spatial and functional programs. This abstract presents the undergoing research in Newcastle, the first urbanized delta in New South Wales (Australia), and the region's second-biggest catchment and estuary. The research methodology is organized in three phases: 1) a projective cartography that analyses maps and data across the region's recorded history, identifying past and present constraints, and predicting future conditions. The cartography aids to identify worst-case scenarios, revealing the implications of land reclamation that have not considered the confronting evolution of climate change and its conflicts with inhabitation; 2) the cartographic studies identify the areas under threat and form the basis for further interdisciplinary research, complimented by community consultation, to reduce flood risk and increase urban resilience and livability; 3) a speculative or prospective phase of design with water to generate evidence-based guidelines that strengthen urban resilience of shorelines and flood prone areas.

Keywords: coastal defense, design, urban resilience, mapping

Procedia PDF Downloads 102
20277 From Arab Spring to Arabian Nightmare: State Failure and Identity in the Middle East

Authors: Kenneth Christie

Abstract:

Syria and Iraq are Arabian nightmares at the local, the regional and global levels in terms of human security and the protection of the vulnerable. Wracked by civil war, ethnic and political violence in the last 5 years in the case of Syria and 13 years in the case of Iraq, the body count now is staggering; the humanitarian crisis continues and there appears no end to this. A crisis that has claimed the lives of 200,000 people so far in Syria, sparked a humanitarian catastrophe fuelled violent Islamic extremism and exposed serious splits in the international community who appear to have no consensus. The international community’s failure to act is simply another sign of the desperate situation which has developed over conflicts that appears unsolvable in the immediate future and may be intractable in the long range. Three things are really at stake I’m going to argue in these continuing crises and how it will affect the human security dimensions of the conflict. Firstly, the protection of vulnerable individuals and civilians in the war, 2ndly, the dire consequences for regional instability as a result and thirdly the risks for minority and ethnic identities who are caught up in this, within and across these volatile borders. This paper will examine these elements and the consequences of the conflict in terms of human security, migration and development.

Keywords: human security, migration, Syria and Iraq, conflict and development

Procedia PDF Downloads 337
20276 Infernal Affairs (Hong Kong) versus Double Face (Japan): Remaking and Context

Authors: Roman Kusaiko

Abstract:

For decades, remaking was one of the film industry’s main practices but has become vivid in recent years. The latest geopolitical developments, though, are becoming a new challenge for filmmakers regarding cultural landscapes and contextual differences. Deglobalization may also affect transnational remaking practices. Thus, these upcoming challenges can be addressed through the analysis of contemporary academic thought, primarily from adaptation and film studies and their understanding of the issues of transmediality and how it affects film remaking. However, the analysis would be insufficient without conducting case studies. This paper is part of broader research about transnational remaking practices and their cultural and contextual specifics. This paper aims to understand whether shifting medium affects remaking as a critical category and present case studies of the popular Hong Kong motion picture Infernal Affairs and its transition into the Japanese remake Double Face. Consequently, the analysis of their contextual distinctions will lead to the correct categorization of the transnational remakes allowing scholars and filmmakers to better understand the existing remaking practices and whether they affect the final result.

Keywords: cinema, context, culture, films, remaking, transmediality

Procedia PDF Downloads 71
20275 Relationships between the Components of Love by Stenberg and Personality Disorder Traits

Authors: Barbara Gawda

Abstract:

The study attempts to show the relationship between the structure of love by Sternberg and personality disorder traits. People with personality disorders experience dysfunctional emotionality. They manifest difficulties in experiencing love and closeness. Their relationships are marked by ambivalence and conflicts, e.g., as in borderline and narcissistic personality disorders. Considering love as a crucial human feeling, the study was planned to describe the associations between intimacy, passion, commitment, and personality disorder traits in a community sample. A sample of 194 participants was investigated (men and women in similar age and education levels). The following techniques were used: the SCID-II to assess personality disorders’ traits and the Triangular Love Scale by Sternberg to assess the components of love. Results show there are significant negative correlations between intimacy, commitment and personality disorders traits. Many personality disorders are associated with decreasing of intimacy and commitment, whereas passion was not associated with personality disorders’ traits. Results confirm that emotional impairments in personality disorders elicit conflicts and problems in relationships based on love and closeness.

Keywords: intimacy, commitment, love, passion, personality disorders

Procedia PDF Downloads 248
20274 A Framework for Information Quality in Accounting Information Systems Adoption

Authors: Wongsim Manirath

Abstract:

In order to implement AIS adoption successfully, it is important to consider the quality of information management and understand Information Quality (IQ) factors influencing AIS adoption. This research aims to explore ways of managing AIS adoption to investigate the adoption of accounting information systems within organisations. The study has led to the development of a framework for understanding the AIS adoption process in an organisation. This research used qualitative, interpretive evidence. This framework was developed from case studies and by collecting qualitative data (interviews). This research has conducted 10 case studies to study how IQ is managed through the accounting information system adoption process. A special focus is placed on determining how organisation size influences the information quality practices. The finding is especially useful to SMEs as many SMEs have the desire to grow bigger. By better dealing with IQ issues, there could be a successful future.

Keywords: data quality, information quality, accounting information system, information management

Procedia PDF Downloads 442
20273 Prototyping Exercise for the Construction of an Ancestral Violentometer in Buenaventura, Valle Del Cauca

Authors: Mariana Calderón, Paola Montenegro, Diana Moreno

Abstract:

Through this study, it was possible to identify the different levels and types of violence, both individual and collective, experienced by women, girls, and the sexually diverse population of Buenaventura translated from the different tensions and threats against ancestrality and accounting for a social and political context of violence related to race and geopolitical location. These threats are related to: the stigma and oblivion imposed on practices and knowledge; the imposition of the hegemonic culture; the imposition of external customs as a way of erasing ancestrality; the singling out and persecution of those who practice it; the violence that the health system has exercised against ancestral knowledge and practices, especially in the case of midwives; the persecution of the Catholic religion against this knowledge and practices; the difficulties in maintaining the practices in the displacement from rural to urban areas; the use and control of ancestral knowledge and practices by the armed actors; the rejection and stigma exercised by the public forces; and finally, the murder of the wise women at the hands of the armed actors. This research made it possible to understand the importance of using tools such as the violence meter to support processes of resistance to violence against women, girls, and sexually diverse people; however, it is essential that these tools be adapted to the specific contexts of the people. In the analysis of violence, it was possible to identify that these not only affect women, girls, and sexually diverse people individually but also have collective effects that threaten the territory and the ancestral culture to which they belong. Ancestrality has been the object of violence, but at the same time, it has been the place from which resistance has been organized. The identification of the violence suffered by women, girls, and sexually diverse people is also an opportunity to make visible the forms of resistance of women and communities in the face of this violence. This study examines how women, girls, and sexually diverse people in Buenaventura have been exposed to sexism and racism, which historically have been translated into specific forms of violence, in addition to the other forms of violence already identified by the traditional models of the violentometer. A qualitative approach was used in the study. The study included the participation of more than 40 people and two women's organizations from Buenaventura. The participants came from both urban and rural areas of the municipality of Buenaventura and were over 15 years of age. The participation of such a diverse group allowed for the exchange of knowledge and experiences, particularly between younger and older people. The instrument used for the exercise was previously defined with the leaders of the organizations and consisted of four moments that referred to i) ancestry, ii) threats to ancestry, iii) identification of resistance and iv) construction of the ancestral violentometer.

Keywords: violence against women, intersectionality, sexual and reproductive rights, black communities

Procedia PDF Downloads 54
20272 A Comparative Analysis of Evacuation Behavior in Case of Cyclone Sidr, Typhoon Yolanda and the Great East Japan Earthquake

Authors: Swarnali Chakma, Akihiko Hokugo

Abstract:

Research on three case studies reviewed here explains many aspects and complications of evacuation behavior during an emergency period. The scenario and phenomenon of the disaster were different, but the similarities are that after receiving the warning peoples does not take it seriously. Many individuals evacuated after taking some kind of action, for example; return to home, searching for family members, prepared valuable things etc. Based on a review of the literature, the data identified a number of factors that help explain evacuation behavior during the disaster. In the case of Japan, cultural inhibitors impact people’s behavior; for example, following the traffic rules, some people lost their time to skip because of the slow-moving car makes overcrowded traffic and some of them were washed away by the tsunami. In terms of Bangladeshi culture, women did not want to evacuate without men because staying men and women who do not know each other under the same roof together is not regular practice or comfortable. From these three case studies, it is observed that early warning plays an important role in cyclones, typhoons and earthquakes. A high level of trust from residents in the warning system is important to real evacuation. It is necessary to raise awareness of disaster and provide information on the vulnerability to cyclones, typhoons and earthquakes hazards at community levels. The local level may help decision makers and other stakeholders to make a better decision regarding an effective disaster management.

Keywords: disaster management, emergency period, evacuation, shelter, typhoon

Procedia PDF Downloads 132
20271 The Distribution of rs5219 Polymorphism in the Non-Diabetic Elderly Jordanian Subject

Authors: Foad Alzoughool

Abstract:

Conflicting studies on the association between the rs5219 polymorphism and type 2 diabetes, some studies have confirmed a strong relationship between this variant and type2 diabetes, on the other hand, many studies denied the existence of this association. This study aimed to provide evidence about whether the rs5219 polymorphism has or hasn't a role as a risk factor for diabetes and meta-analysis to investigate the role of the control age group in the association. Genotyping of the rs5219 polymorphism was performed in a cohort of 266 healthy elderly subjects with a mean age (60.2 ± 5.1) with no history of diabetes (HbA1c < 6%) using standard Sanger sequencing methods. Lys/Lys alleles were detected in 20 persons (7.5%), Lys/Glu alleles in 96 persons (36.1%), and Glu/Glu in 150 persons (56.4%). The genotype distribution was consistent with Hardy–Weinberg equilibrium (P =0.7). Meta-analysis notably indicates no association between rs5219 polymorphism and type 2 diabetes in all studies used the younger age of the control group compared to the patient's age. In conclusion, our study sheds light on the importance of age factor among the control group recruited in case-control studies.

Keywords: Type 2 diabetes, rs5219 polymorphism, E23K, KCNJ11 gene

Procedia PDF Downloads 128
20270 Post-Pandemic Public Space, Case Study of Public Parks in Kerala

Authors: Nirupama Sam

Abstract:

COVID-19, the greatest pandemic since the turn of the century, presents several issues for urban planners, the most significant of which is determining appropriate mitigation techniques for creating pandemic-friendly and resilient public spaces. The study is conducted in four stages. The first stage consisted of literature reviews to examine the evolution and transformation of public spaces during pandemics throughout history and the role of public spaces during pandemic outbreaks. The second stage is to determine the factors that influence the success of public spaces, which was accomplished by an analysis of current literature and case studies. The influencing factors are categorized under comfort and images, uses and activity, access and linkages, and sociability. The third stage is to establish the priority of identified factors for which a questionnaire survey of stakeholders is conducted and analyzing of certain factors with the help of GIS tools. COVID-19 has been in effect in India for the last two years. Kerala has the highest daily COVID-19 prevalence due to its high population density, making it more susceptible to viral outbreaks. Despite all preventive measures taken against COVID-19, Kerala remains the worst-affected state in the country. Finally, two live case studies of the hardest-hit localities, namely Subhash bose park and Napier Museum park in the Ernakulam and Trivandrum districts of Kerala, respectively, were chosen as study areas for the survey. The responses to the questionnaire were analyzed using SPSS for determining the weights of the influencing factors. The spatial success of the selected case studies was examined using the GIS interpolation model. Following the overall assessment, the fourth stage is to develop strategies and guidelines for planning public spaces to make them more efficient and robust, which further leads to improved quality, safety and resilience to future pandemics.

Keywords: urban design, public space, covid-19, post-pandemic, public spaces

Procedia PDF Downloads 113
20269 Nigerian Media Coverage of the Chibok Girls Kidnap: A Qualitative News Framing Analysis of the Nation Newspaper

Authors: Samuel O. Oduyela

Abstract:

Over the last ten years, many studies have examined the media coverage of terrorism across the world. Nevertheless, most of these studies have been inclined to the western narrative, more so in relation to the international media. This study departs from that partiality to explore the Nigerian press and its coverage of the Boko Haram. The study intends to illustrate how the Nigerian press has reported its homegrown terrorism within its borders. On 14 April 2014, the Shekau-led Boko Haram kidnapped over 200 female students from Chibok in the Borno State. This study analyses a structured sample of news stories, feature articles, editorial comments, and opinions from the Nation newspaper. The study examined the representation of the Chibok girls kidnaps by concentrating on four main viewpoints. The news framing of the Chibok girls’ kidnap under Presidents Goodluck Jonathan (2014) and Mohammadu Buhari (2016-2018), the sourcing model present in the news reporting of the kidnap and the challenges Nation reporters face in reporting Boko Haram. The study adopted the use of qualitative news framing analysis to provide further insights into significant developments established from the examination of news contents. The study found that the news reportage mainly focused on the government response to Chibok girls kidnap, international press and Boko Haram. Boko Haram was also framed, as a political conspiracy, as prevailing, and as instilling fear. Political, and economic influence appeared to be a significant determinant of the reportage. The study found that the Nation newspaper's portrayal of the crisis under President Jonathan differed significantly from under President Buhari. While the newspaper framed the action of President Jonathan as lacklustre, dismissive, and confusing, it was less critical of President Buhari's government's handling of the crisis. The Nation newspaper failed to promote or explore non-violent approaches. News reports of the kidnap, thus, were presented mainly from a political and ethnoreligious perspective. The study also raised questions of what roles should journalists play in covering conflicts? Should they merely report comments on and interpret it, or should they be actors in the resolution or, more importantly, the prevention of conflicts? The study underlined the need for the independence of the media, more training for journalists to advance a more nuanced and conflict-sensitive news coverage in the Nigerian context.

Keywords: boko haram, chibok girls kidnap, conflict in nigeria, media framing

Procedia PDF Downloads 119
20268 Artificial Intelligence and Governance in Relevance to Satellites in Space

Authors: Anwesha Pathak

Abstract:

With the increasing number of satellites and space debris, space traffic management (STM) becomes crucial. AI can aid in STM by predicting and preventing potential collisions, optimizing satellite trajectories, and managing orbital slots. Governance frameworks need to address the integration of AI algorithms in STM to ensure safe and sustainable satellite activities. AI and governance play significant roles in the context of satellite activities in space. Artificial intelligence (AI) technologies, such as machine learning and computer vision, can be utilized to process vast amounts of data received from satellites. AI algorithms can analyse satellite imagery, detect patterns, and extract valuable information for applications like weather forecasting, urban planning, agriculture, disaster management, and environmental monitoring. AI can assist in automating and optimizing satellite operations. Autonomous decision-making systems can be developed using AI to handle routine tasks like orbit control, collision avoidance, and antenna pointing. These systems can improve efficiency, reduce human error, and enable real-time responsiveness in satellite operations. AI technologies can be leveraged to enhance the security of satellite systems. AI algorithms can analyze satellite telemetry data to detect anomalies, identify potential cyber threats, and mitigate vulnerabilities. Governance frameworks should encompass regulations and standards for securing satellite systems against cyberattacks and ensuring data privacy. AI can optimize resource allocation and utilization in satellite constellations. By analyzing user demands, traffic patterns, and satellite performance data, AI algorithms can dynamically adjust the deployment and routing of satellites to maximize coverage and minimize latency. Governance frameworks need to address fair and efficient resource allocation among satellite operators to avoid monopolistic practices. Satellite activities involve multiple countries and organizations. Governance frameworks should encourage international cooperation, information sharing, and standardization to address common challenges, ensure interoperability, and prevent conflicts. AI can facilitate cross-border collaborations by providing data analytics and decision support tools for shared satellite missions and data sharing initiatives. AI and governance are critical aspects of satellite activities in space. They enable efficient and secure operations, ensure responsible and ethical use of AI technologies, and promote international cooperation for the benefit of all stakeholders involved in the satellite industry.

Keywords: satellite, space debris, traffic, threats, cyber security.

Procedia PDF Downloads 42
20267 Sexual Violence against Men in Conflicts: A Neglected Serious Issue

Authors: Olalekan Olaluwoye, Joanne Williams, Elizabeth Hoban, Sonia Brockington

Abstract:

Cases of sexual violence against men have been reported in at least twenty-five conflict situations in history. However, there is a paucity of academic literature and minimal media, policy and legal discussions on sexual violence against men. Most studies and discussions remain locked in the ‘male perpetrators, female victims’ paradigm. Male victims continue to suffer the consequences of sexual violence in conflict and post-conflict settings in silence. A rigorous narrative systematic review of the literature revealed few studies on the subject and those that exist have a narrow focus on rape as the only form of sexual violence despite the existence of other forms of sexual violence that have equally devastating effects. This paper argues that while research and discussions on sexual violence against women should continue, it is time to conduct rigorous mixed methods research to understand the experiences of men and boys survivors of sexual violence. There is a need to study sexual violence more broadly, without limiting it to rape, and to understand the determinants and health implications of sexual violence perpetrated on men. The paper concludes by proposing a research approach that gives voice to the experiences of male survivors of sexual violence in conflict and post-conflict settings.

Keywords: conflict, male survivors, post-conflict settings, sexual violence

Procedia PDF Downloads 124
20266 The Politics and Consequences of Decentralized Vocational Education: The Modified System of Vocational Studies in Ghana

Authors: Nkrumak Micheal Atta Ofori

Abstract:

The Vocational System is a decentralized Studies System implemented in Ghana as vocation studies strategy for grassroot that focuses on providing individuals with the specific skills, knowledge, and training necessary for a particular trade, craft, profession, or occupation. This article asks how devolution of vocational studies to local level authorities produces responsive and accountable representation and sustainable vocational learning under the vocational Studies System. It focuses on two case studies: Asokore Mampong and Atwima kwanwoma Municipal. Then, the paper asks how senior high school are developing new material and social practices around the vocational studies System to rebuild their livelihoods and socio-economic wellbeing. Here, the article focusses on Kumasi District, drawing lessons for the two other cases. The article shows how the creation of representative groups under the Vocational Studies System provides the democratic space necessary for effective representation of community aspirations. However, due to elite capture, the interests of privilege few people are promoted. The state vocational training fails to devolve relevant and discretionary resources to local teachers and do not follow the prescribed policy processes of the Vocational Studies System. Hence, local teachers are unable to promote responsive and accountable representation. Rural communities continue to show great interest in the Vocational Studies System, but the interest is bias towards gaining access to vocational training schools for advancing studies. There is no active engagement of the locals in vocational training, and hence, the Vocational Studies System exists only to promote individual interest of communities. This article shows how ‘failed’ interventions can gain popular support for rhetoric and individual gains.

Keywords: vocational studies system, devolution of vocational studies, local-level authorities, senior high schools and vocational learning, community aspirations and representation

Procedia PDF Downloads 45
20265 Ideology Shift in Political Translation

Authors: Jingsong Ma

Abstract:

In political translation, ideology plays an important role in conveying implications accurately. Ideological collisions can occur in political translation when there existdifferences of political environments embedded in the translingual political texts in both source and target languages. To reach an accurate translationrequires the translatorto understand the ideologies implied in (and often transcending) the texts. This paper explores the conditions, procedure, and purpose of processingideological collision and resolution of such issues in political translation. These points will be elucidated by case studies of translating English and Chinese political texts. First, there are specific political terminologies in certain political environments. These terminological peculiarities in one language are often determined by ideological elements rather than by syntactical and semantical understanding. The translation of these ideological-loaded terminologiesis a process and operation consisting of understanding the ideological context, including cultural, historical, and political situations. This will be explained with characteristic Chinese political terminologies and their renderings in English. Second, when the ideology in the source language fails to match with the ideology in the target language, the decisions to highlight or disregard these conflicts are shaped by power relations, political engagement, social context, etc. It thus is necessary to go beyond linguisticanalysis of the context by deciphering ideology in political documents to provide a faithful or equivalent rendering of certain messages. Finally, one of the practical issues is about equivalence in political translation by redefining the notion of faithfulness and retainment of ideological messages in the source language in translations of political texts. To avoid distortion, the translator should be liberated from grip the literal meaning, instead diving into functional meanings of the text.

Keywords: translation, ideology, politics, society

Procedia PDF Downloads 89
20264 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces

Authors: Igor Pejic

Abstract:

The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.

Keywords: asymmetrical warfare, conventional forces, security, terrorism

Procedia PDF Downloads 237
20263 Creating a Profound Sense of Comfort to Stimulate Workers Innovation and Productivity: Exploring Research and Case Study Applications

Authors: Rana Bazaid, Debajyoti Pati

Abstract:

Purpose: The aim of this research is to explore and discuss innovative workspaces, and how the design of the space has the potential to facilitate the work process and employees’ satisfaction which can lead to innovative results. Background: The relationship between the workforce and the work environment has a strong potential to enhance human capabilities associated with innovation outcomes. The need for innovation in workplaces can benefit employees’ satisfaction, health, and performance. To understand this complicated relationship, this research explores and comprehends innovative work environments. Methods: A review of 26 peer-reviewed articles, seven books, and 23 companies’ websites was conducted, along with analysis for five case studies on successful types of research and development fields to detect appropriate examples for the study. Results: The analysis of the five case studies showed the similarity-characteristics of innovation work environments among those five fields and observed what is unique about each field that makes them stand out in their industries. Conclusion: Understanding the psychological, cultural, physiological, and social needs of workers, physical workplaces, and issues found in the work environment may help enhance multifaceted innovation and productivity.

Keywords: innovation, productivity , work environment, workers satisfaction

Procedia PDF Downloads 71
20262 Strategies and Approaches for Curriculum Development and Training of Faculty in Cybersecurity Education

Authors: Lucy Tsado

Abstract:

As cybercrime and cyberattacks continue to increase, the need to respond will follow suit. When cybercrimes occur, the duty to respond sometimes falls on law enforcement. However, criminal justice students are not taught concepts in cybersecurity and digital forensics. There is, therefore, an urgent need for many more institutions to begin teaching cybersecurity and related courses to social science students especially criminal justice students. However, many faculty in universities, colleges, and high schools are not equipped to teach these courses or do not have the knowledge and resources to teach important concepts in cybersecurity or digital forensics to criminal justice students. This research intends to develop curricula and training programs to equip faculty with the skills to meet this need. There is a current call to involve non-technical fields to fill the cybersecurity skills gap, according to experts. There is a general belief among non-technical fields that cybersecurity education is only attainable within computer science and technologically oriented fields. As seen from current calls, this is not entirely the case. Transitioning into the field is possible through curriculum development, training, certifications, internships and apprenticeships, and competitions. There is a need to identify how a cybersecurity eco-system can be created at a university to encourage/start programs that will lead to an interest in cybersecurity education as well as attract potential students. A short-term strategy can address this problem through curricula development, while a long-term strategy will address developing training faculty to teach cybersecurity and digital forensics. Therefore this research project addresses this overall problem in two parts, through curricula development for the criminal justice discipline; and training of faculty in criminal justice to teaching the important concepts of cybersecurity and digital forensics.

Keywords: cybersecurity education, criminal justice, curricula development, nontechnical cybersecurity, cybersecurity, digital forensics

Procedia PDF Downloads 75
20261 A Method for Multimedia User Interface Design for Mobile Learning

Authors: Shimaa Nagro, Russell Campion

Abstract:

Mobile devices are becoming ever more widely available, with growing functionality, and are increasingly used as an enabling technology to give students access to educational material anytime and anywhere. However, the design of educational material user interfaces for mobile devices is beset by many unresolved research issues such as those arising from emphasising the information concepts then mapping this information to appropriate media (modelling information then mapping media effectively). This report describes a multimedia user interface design method for mobile learning. The method covers specification of user requirements and information architecture, media selection to represent the information content, design for directing attention to important information, and interaction design to enhance user engagement based on Human-Computer Interaction design strategies (HCI). The method will be evaluated by three different case studies to prove the method is suitable for application to different areas / applications, these are; an application to teach about major computer networking concepts, an application to deliver a history-based topic; (after these case studies have been completed, the method will be revised to remove deficiencies and then used to develop a third case study), an application to teach mathematical principles. At this point, the method will again be revised into its final format. A usability evaluation will be carried out to measure the usefulness and effectiveness of the method. The investigation will combine qualitative and quantitative methods, including interviews and questionnaires for data collection and three case studies for validating the MDMLM method. The researcher has successfully produced the method at this point which is now under validation and testing procedures. From this point forward in the report, the researcher will refer to the method using the MDMLM abbreviation which means Multimedia Design Mobile Learning Method.

Keywords: human-computer interaction, interface design, mobile learning, education

Procedia PDF Downloads 222
20260 Pavement Quality Evaluation Using Intelligent Compaction Technology: Overview of Some Case Studies in Oklahoma

Authors: Sagar Ghos, Andrew E. Elaryan, Syed Ashik Ali, Musharraf Zaman, Mohammed Ashiqur Rahman

Abstract:

Achieving desired density during construction is an important indicator of pavement quality. Insufficient compaction often compromises pavement performance and service life. Intelligent compaction (IC) is an emerging technology for monitoring compaction quality during the construction of asphalt pavements. This paper aims to provide an overview of findings from four case studies in Oklahoma involving the compaction quality of asphalt pavements, namely SE 44th St project (Project 1) and EOC Turnpike project (Project 2), Highway 92 project (Project 3), and 108th Avenue project (Project 4). For this purpose, an IC technology, the intelligent compaction analyzer (ICA), developed at the University of Oklahoma, was used to evaluate compaction quality. Collected data include GPS locations, roller vibrations, roller speed, the direction of movement, and temperature of the asphalt mat. The collected data were analyzed using a widely used software, VETA. The average densities for Projects 1, 2, 3 and 4, were found as 89.8%, 91.50%, 90.7% and 87.5%, respectively. The maximum densities were found as 94.6%, 95.8%, 95.9%, and 89.7% for Projects 1, 2, 3, and 4, respectively. It was observed that the ICA estimated densities correlated well with the field core densities. The ICA results indicated that at least 90% of the asphalt mats were subjected to at least two roller passes. However, the number of passes required to achieve the desired density (94% to 97%) differed from project to project depending on the underlying layer. The results of these case studies show both opportunities and challenges in using IC for monitoring compaction quality during construction in real-time.

Keywords: asphalt pavement construction, density, intelligent compaction, intelligent compaction analyzer, intelligent compaction measure value

Procedia PDF Downloads 130
20259 Challenges Faced by Physician Leaders in Teaching Hospitals of Private Medical Schools in the National Capital Region, Philippines

Authors: Policarpio Jr. Joves

Abstract:

Physicians in most teaching hospitals are commonly promoted into managerial roles, yet their training is mostly in clinical and scientific skills but not in leadership competencies. When they shift into roles of physician leadership, the majority hold on to their primary identity of physicians. These conflicting roles affect their identity and eventually their work. The physician leaders also face additional challenges related to academics which include incorporation of new knowledge into the existing curriculum, use of technology in the delivery of teaching, the need to train medical students outside of hospital wards, etc. The study aims to explore how physician leaders in teaching hospitals of private medical schools enact their leadership roles and how they face the challenges as physician leaders. The study setting shall be teaching hospitals of three private medical schools situated in the National Capital Region, Philippines. A multiple case study design shall be adopted in this research. Physicians shall be eligible to participate in the study if they are practicing clinicians limited to the five major clinical specialty: Internal Medicine, Pediatrics, Family Medicine, Surgery, Obstetrics and Gynecology. They must be teaching in the College of Medicine prior to their appointments as physician leaders in both medical school and teaching hospital. Semi-structured face-to-face interviews shall be utilized as a means of data collection, with open-ended questions, enabling physician leaders to present narratives about their identity, role enactment, conflicts, reaction of colleagues, and the challenges encountered in their day-to-day work as physician leaders. Interviews shall be combined with observations and review of records to gain more insights into how the physician leaders are 'doing' management. Within-case analysis shall be done initially followed by a thematic analysis across the cases, referred to as cross–case analysis or cross-case synthesis.

Keywords: academic leaders, academic managers, physician leaders, physician managers

Procedia PDF Downloads 319
20258 Classification of Sturm-Liouville Problems at Infinity

Authors: Kishor J. shinde

Abstract:

We determine the values of k and p such that the Sturm-Liouville differential operator τu=-(d^2 u)/(dx^2) + kx^p u is in limit point case or limit circle case at infinity. In particular it is shown that τ is in the limit point case when (i) for p=2 and ∀k, (ii) for ∀p and k=0, (iii) for all p and k>0, (iv) for 0≤p≤2 and k<0, (v) for p<0 and k<0. τ is in the limit circle case when (i) for p>2 and k<0.

Keywords: limit point case, limit circle case, Sturm-Liouville, infinity

Procedia PDF Downloads 338
20257 Affordable and Sustainable Housing Construction: Case Studies

Authors: Tony Rizk

Abstract:

Recent material advances and cost efficiencies are transforming the housing industry away from traditional lumber and gypsum material to alternate fiberboard material that is workable and resistant to fire, mold, and pest infestation. The use of these materials may add to the initial cost of construction. However, the life cycle (cradle to grave) cost of houses using these construction materials and methods are lower than the life cycle costs using traditional housing construction materials and methods. This paper will present four (4) case studies of sustainable house projects. Each project was designed and constructed using earthen-based, sustainable fiberboard material that is resistant to fire, mold, and infestation and fabricated at a very low material calorific value. These house projects have a living space ranging from 625 sq. ft. for an accessory dwelling unit and up to 3,200 sq. ft. 1-story and 2-story homes. For each case study, we will present the house engineering design and construction method, the initial construction costs, a summary of the life cycle costs, and a comparison to the life cycle cost of traditional housing available in the literature.

Keywords: residential housing, sustainable housing, life cycle cost, fire resistance, mold, infestation resistance

Procedia PDF Downloads 97
20256 Modulated Bioavailability of an Anti HIV Drug through a Self-Nanoemulsifying Drug Delivery System

Authors: Sunit Kumar Sahoo, Prakash Chandra Senapati

Abstract:

The main drawback to design drug delivery systems with BCS class II drugs is their low bioavailabilty due to their inherent low permeability characteristics. So the present investigation aspire to develop a self-nanoemulsifying drug delivery system (SNEDDS) of BCS class II anti HIV drug efavirenz (EFZ) using mixtures of non-ionic surfactant mixtures with the main objective to improve the oral bioavailability of said drug. Results obtained from solubility studies of EFZ in various expients utilized for construction of the pseudo ternary phase diagram containing surfactant mixtures. Surfactants in 1:1 combination are used with different co-surfactants in different ratio to delineate the area of monophasic region of the pseudo ternary phase diagram. The formulations which offered positive results in different thermodynamic stability studies were considered for percentage transmittance and turbidity analysis. The various characterization studies like the TEM analysis of post diluted SNEDDS formulations r confirmed the size in nanometric range (below 50 nm) and FT-IR studies confirmed the intactness of the drug the in the preconcentrate. The in vitro dissolution profile of SNEDDS showed that 80% drug was released within 30 min in case of optimized SNEDDS while it was approximately 18.3 % in the case of plain drug powder.. The Pharmacokinetic study using rat model revealed a 2.63 fold increase in AUC (0-∞) in comparison to plain EFZ suspension. The designed delivery system illustrated the confidence in creating a formulation of EFZ with enhanced bioavailability for better HIV treatment.

Keywords: efavirenz, self-nanoemulsifying, surfactant mixture, bioavailability

Procedia PDF Downloads 331
20255 The Convention of Culture: A Comprehensive Study on Dispute Resolution Pertaining to Heritage and Related Issues

Authors: Bhargavi G. Iyer, Ojaswi Bhagat

Abstract:

In recent years, there has been a lot of discussion about ethnic imbalance and diversity in the international context. Arbitration is now subject to the hegemony of a small number of people who are constantly reappointed. When a court system becomes exclusionary, the quality of adjudication suffers significantly. In such a framework, there is a misalignment between adjudicators' preconceived views and the interests of the parties, resulting in a biased view of the proceedings. The world is currently witnessing a slew of intellectual property battles around cultural appropriation. The term "cultural appropriation" refers to the industrial west's theft of indigenous culture, usually for fashion, aesthetic, or dramatic purposes. Selena Gomez exemplifies cultural appropriation by commercially using the “bindi,” which is sacred to Hinduism, as a fashion symbol. In another case, Victoria's Secret insulted indigenous peoples' genocide by stealing native Indian headdresses. In the case of yoga, a similar process can be witnessed, with Vedic philosophy being reduced to a type of physical practice. Such a viewpoint is problematic since indigenous groups have worked hard for generations to ensure the survival of their culture, and its appropriation by the western world for purely aesthetic and theatrical purposes is upsetting to those who practise such cultures. Because such conflicts involve numerous jurisdictions, they must be resolved through international arbitration. However, these conflicts are already being litigated, and the aggrieved parties, namely developing nations, do not believe it prudent to use the World Intellectual Property Organization's (WIPO) already established arbitration procedure. This practise, it is suggested in this study, is the outcome of Europe's exclusionary arbitral system, which fails to recognise the non-legal and non-commercial nature of indigenous culture issues. This research paper proposes a more comprehensive, inclusive approach that recognises the non-legal and non-commercial aspects of IP disputes involving cultural appropriation, which can only be achieved through an ethnically balanced arbitration structure. This paper also aspires to expound upon the benefits of arbitration and other means of alternative dispute resolution (ADR) in the context of disputes pertaining to cultural issues; positing that inclusivity is a solution to the existing discord between international practices and localised cultural points of dispute. This paper also hopes to explicate measures that will facilitate ensuring inclusion and ideal practices in the domain of arbitration law, particularly pertaining to cultural heritage and indigenous expression.

Keywords: arbitration law, cultural appropriation, dispute resolution, heritage, intellectual property

Procedia PDF Downloads 117
20254 A Case of Borderline Personality Disorder: An Explanatory Study of Unconscious Conflicts through Dream-Analysis

Authors: Mariam Anwaar, Kiran B. Ahmad

Abstract:

Borderline Personality Disorder (BPD) is an invasive presence of affect instability, disturbance in self-concept and attachment in relationships. The profound indicator is the dichotomous approach of the world in which the ego categorizes individuals, especially their significant others, into secure or threatful beings, leaving little room for a complex combination of characteristics in one person. This defense mechanism of splitting their world has been described through the explanatory model of unconscious conflict theorized by Sigmund Freud’s Electra Complex in the Phallic Stage. The central role is of the father with whom the daughter experiences penis envy, thus identifying with the mother’s characteristics to receive the father’s attention. However, Margret Mahler, an object relation theorist, elucidates the central role of the mother and that the split occurs during the pre-Electra complex stage. Amid the 14 and 24 months of the infant, it acknowledges the world away from the mother as they have developed milestones such as crawling. In such novelty, the infant crawls away from the mother creating a sense of independence (individuation). On the other hand, being distant causes anxiety, making them return to their original object of security (separation). In BPD, the separation-individuation stage is disrupted, due to contradictory actions of the caregiver, which results in splitting the object into negative and positive aspects, repressing the former and adhering to the latter for survival. Thus, with time, the ego distorts the reality into dichotomous categories, using the splitting defenses, and the mental representation of the self is distorted due to the internalization of the negative objects. The explanatory model was recognized in the case study of Fizza, at 21-year-old Pakistani female, residing in Karachi. Her marital status is single with an occupation being a dental student. Fizza lives in a nuclear family but is surrounded by her extended family as they all are in close vicinity. She came with the complaints of depressive symptoms for two-years along with self-harm due to severe family conflicts. Through the intervention of Dialectical Behavior Therapy (DBT), the self-harming actions were reduced, however, this libidinal energy transformed into claustrophobic symptoms and, along with this, Fizza has always experienced vivid dreams. A retrospective method of Jungian dream-analysis was applied to locate the origins of the splitting in the unconscious. The result was the revelation of a sexual harassment trauma at the age of six-years which was displaced in the form of self-harm. In addition to this, the presence of a conflict at the separation-individuation stage was detected during the dream-analysis, and it was the underlying explanation of the claustrophobic symptoms. This qualitative case study implicates the use of a patient’s subjective experiences, such as dreams, to journey through the spiral of the unconscious in order to not only detect repressed memories but to use them in psychotherapy as a means of healing the patient.

Keywords: borderline personality disorder, dream-analysis, Electra complex, separation-individuation, splitting, unconscious

Procedia PDF Downloads 132
20253 Life-Cycle Cost and Life-Cycle Assessment of Photovoltaic/Thermal Systems (PV/T) in Swedish Single-Family Houses

Authors: Arefeh Hesaraki

Abstract:

The application of photovoltaic-thermal hybrids (PVT), which delivers both electricity and heat simultaneously from the same system, has become more popular during the past few years. This study addresses techno-economic and environmental impacts assessment of photovoltaic/thermal systems combined with a ground-source heat pump (GSHP) for three single-family houses located in Stockholm, Sweden. Three case studies were: (1) A renovated building built in 1936, (2) A renovated building built in 1973, and (3) A new building built-in 2013. Two simulation programs of SimaPro 9.1 and IDA Indoor Climate and Energy 4.8 (IDA ICE) were applied to analyze environmental impacts and energy usage, respectively. The cost-effectiveness of the system was evaluated using net present value (NPV), internal rate of return (IRR), and discounted payback time (DPBT) methods. In addition to cost payback time, the studied PVT system was evaluated using the energy payback time (EPBT) method. EPBT presents the time that is needed for the installed system to generate the same amount of energy which was utilized during the whole lifecycle (fabrication, installation, transportation, and end-of-life) of the system itself. Energy calculation by IDA ICE showed that a 5 m² PVT was sufficient to create a balance between the maximum heat production and the domestic hot water consumption during the summer months for all three case studies. The techno-economic analysis revealed that combining a 5 m² PVT with GSHP in the second case study possess the smallest DPBT and the highest NPV and IRR among the three case studies. It means that DPBTs (IRR) were 10.8 years (6%), 12.6 years (4%), and 13.8 years (3%) for the second, first, and the third case study, respectively. Moreover, environmental assessment of embodied energy during cradle- to- grave life cycle of the studied PVT, including fabrication, delivery of energy and raw materials, manufacture process, installation, transportation, operation phase, and end of life, revealed approximately two years of EPBT in all cases.

Keywords: life-cycle cost, life-cycle assessment, photovoltaic/thermal, IDA ICE, net present value

Procedia PDF Downloads 91
20252 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 119
20251 Conceptualizing the Knowledge to Manage and Utilize Data Assets in the Context of Digitization: Case Studies of Multinational Industrial Enterprises

Authors: Martin Böhmer, Agatha Dabrowski, Boris Otto

Abstract:

The trend of digitization significantly changes the role of data for enterprises. Data turn from an enabler to an intangible organizational asset that requires management and qualifies as a tradeable good. The idea of a networked economy has gained momentum in the data domain as collaborative approaches for data management emerge. Traditional organizational knowledge consequently needs to be extended by comprehensive knowledge about data. The knowledge about data is vital for organizations to ensure that data quality requirements are met and data can be effectively utilized and sovereignly governed. As this specific knowledge has been paid little attention to so far by academics, the aim of the research presented in this paper is to conceptualize it by proposing a “data knowledge model”. Relevant model entities have been identified based on a design science research (DSR) approach that iteratively integrates insights of various industry case studies and literature research.

Keywords: data management, digitization, industry 4.0, knowledge engineering, metamodel

Procedia PDF Downloads 329