Search results for: critical security studies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17259

Search results for: critical security studies

16899 Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces

Authors: Emmanuel Mugiraneza

Abstract:

Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission.

Keywords: defence diplomacy, collective security, Rwanda, Peacekeeping

Procedia PDF Downloads 88
16898 Assessing Sustainability Dimensions of Transportation as a Critical Infrastructure: Jordan as a Case Study

Authors: Malak M. Shatnawi

Abstract:

Infrastructure is the fundamental facility that plays an important part in socio-economic development for modern societies, if such sector is well planned, managed by decision makers in a way that is compatible with the population growth, safety, and national security needs; it will enrich progress, prosperity, awareness, social and economic welfare for any country. Infrastructure is the most important aspect of life because it can provide materials, products, and services that will improve and facilitate living conditions and maintain sustainability at the same time, and in order to study critical infrastructure, in general, we must think sustainability. Otherwise there will be a significant gap. The planning processes for sustainability include urban infrastructure and public transportation are considered the most important sectors for economic development for both developed and developing countries as they are linked to the civilizational and urban development, meanwhile, choosing the appropriate transportation mode that will provide a good level of service, and increase the satisfaction of the potential users is a difficult task. This research paper tries to assess where is Jordan located vs. each transportation sustainability dimensions in aspects related to social, economic and environmental dimensions based on (Zietsman et al. 2006) adopted model for sustainability transportation infrastructure. Measures of performance indicators for each dimensional goal were traced and supported with needed data, figures and statistical findings. The study uses analytical, descriptive style and methodology based on different references and previous studies from secondary data sources to support the case. Recommendations for enhancing sustainability were concluded, and future reform directions were proposed which can be applied to Jordan and generalized for other developing countries with similar circumstances.

Keywords: infrastructure transportation sustainability, economic, social, environmental

Procedia PDF Downloads 217
16897 The Need for the Inclusion of Museum Studies at All Levels of Education in Nigeria

Authors: Stephany Inalegwu

Abstract:

Museums play a very critical role in understanding the cultural values and the history of any given society in Nigeria and the world at large. The role of Museums as an avenue through which artefacts are collected, preserved and exhibited cannot be over emphasized as they are now seen as not only with the above stated aims but also as a creator of employment and revenue generation if properly harnessed. Interestingly, despite its importance, museum studies have been limited to University curriculum alone causing a dearth of information for the younger generation up until they attain the University age. It is against this background that this paper carefully analyses the definitions of museums, the state of museums and museum studies in Nigeria today and the need to include its studies at all the levels of Education in Nigeria from the primary, to secondary and tertiary levels. It should reflect a study of all ages, as this is vital in the development of individuals. It concludes by harping on the need for a better appreciation of the Nigerian culture ranging from the famous Nok Terracotta, Benin Bronze works etc and its importance of museums as an avenue to display the rich Nigerian cultural heritage.

Keywords: culture, curriculum, education, museum

Procedia PDF Downloads 178
16896 National Standard of Canada for Psychological Health and Safety in the Workplace: A Critical Review

Authors: Lucie Cote, Isabelle Rodier

Abstract:

The main objective of the research was to identify demonstrated mechanisms promoting psychological well-being and psychological health in the workplace, and to take a critical look at the 'National Standard of Canada for Psychological Health and Safety in the Workplace - Prevention, Promotion and Guidance to Staged Implementation (Standard)' as a mechanism to promote the psychological well-being and psychological health in the workplace. A review of the scientific literature was conducted, and a case study was done using data from a Canadian federal department. The following six mechanisms with an efficiency supported by most of the studies reviewed were identified: improving psychological well-being in the workplace literacy; strengthening the resilience of employees; creating an environmentally friendly and healthy workplace; promoting a healthy lifestyle; taking into account psychological characteristics in the drafting of job descriptions and tasks during the hiring process; and offering psychological self-care tools. The Standard offers several mechanisms beyond those previously identified and their implementation can be demanding. Research based on objective data and addressing the magnitude of the effect would be required.

Keywords: critical review, national standard of Canada, psychological health, workplace

Procedia PDF Downloads 203
16895 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment

Authors: Ritsuko Kawasaki, Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 348
16894 Identification of Thermally Critical Zones Based on Inter Seasonal Variation in Temperature

Authors: Sakti Mandal

Abstract:

Varying distribution of land surface temperature in an urbanized environment is a globally addressed phenomenon. Usually has been noticed that criticality of surface temperature increases from the periphery to the urban centre. As the centre experiences maximum severity of heat throughout the year, it also represents most critical zone in terms of thermal condition. In this present study, an attempt has been taken to propose a quantitative approach of thermal critical zonation (TCZ) on the basis of seasonal temperature variation. Here the zonation is done by calculating thermal critical value (TCV). From the Landsat 8 thermal digital data of summer and winter seasons for the year 2014, the land surface temperature maps and thermally critical zonation has been prepared, and corresponding dataset has been computed to conduct the overall study of that particular study area. It is shown that TCZ can be clearly identified and analyzed by the help of inter-seasonal temperature range. The results of this study can be utilized effectively in future urban development and planning projects as well as a framework for implementing rules and regulations by the authorities for a sustainable urban development through an environmentally affable approach.

Keywords: thermal critical values (TCV), thermally critical zonation (TCZ), land surface temperature (LST), Landsat 8, Kolkata Municipal Corporation (KMC)

Procedia PDF Downloads 169
16893 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 94
16892 Growth Performance and Critical Supersaturation of Heterogeneous Condensation for High Concentration of Insoluble Sub-Micron Particles

Authors: Jie Yin, Jun Zhang

Abstract:

Measuring the growth performance and critical supersaturation of particle group have a high reference value for constructing a supersaturated water vapor environment that can improve the removal efficiency of the high-concentration particle group. The critical supersaturation and the variation of the growth performance with supersaturation for high-concentration particles were measured by a flow cloud chamber. Findings suggest that the influence of particle concentration on the growth performance will reduce with the increase of supersaturation. Reducing residence time and increasing particle concentration have similar effects on the growth performance of the high-concentration particle group. Increasing particle concentration and shortening residence time will increase the critical supersaturation of the particle group. The critical supersaturation required to activate a high-concentration particle group is lower than that of the single-particle when the minimum particle size in the particle group is the same as that of a single particle.

Keywords: sub-micron particles, heterogeneous condensation, critical supersaturation, nucleation

Procedia PDF Downloads 124
16891 Evaluation of Critical Success Factors in Public-Private Partnership Projects Based on Structural Equation Model

Authors: Medya Fathi

Abstract:

Today, success in the construction industry is not merely about project completion in a timely manner within an established budget and meeting required quality considerations. Management practices and partnerships need to be emphasized as well. In this regard, critical success factors (CSFs) cover necessary considerations for a successful project beyond the traditional success definition, which vary depending on project outcomes, delivery methods, project types, and partnering processes. Despite the extensive research on CSFs, there is a paucity of studies that examine CSFs for public-private partnership (PPP); the delivery method, which has gained increasing attention from researchers and practitioners over the last decade with a slow but growing adoption in the transportation infrastructure, particularly, highway industry. To fill this knowledge gap, data are collected through questionnaire surveys among private and public parties involved in PPP transportation projects in the United States. Then, the collected data are analyzed to explore the causality relationships between CSFs and PPP project success using structural equation model and provide a list of factors with the greatest influence. This study advocates adopting a critical success factor approach to enhance PPP success in the U.S. transportation industry and identify elements essential for public and private organizations to achieve this success.

Keywords: project success, critical success factors, public-private partnership, transportation

Procedia PDF Downloads 61
16890 Critical Thinking and Creativity of Undergraduate Nursing Students: Descriptive and Disposition in Academic Levels

Authors: Kamolrat Turner, Chularat Howharn

Abstract:

Critical thinking and creativity are desirable competency for contemporary nurses although there are growing concerns supporting a disturbing paucity in its achievement. Nursing colleges in Thailand have developed teaching strategies and curricula that nurture critical thinking and creativity dispositions according academic levels. Objectives: This descriptive study identified critical thinking and creativity dispositions of Thai nursing students according academic levels. Methods: A cross-sectional questionnaire survey was conducted among 515 nursing students for four academic levels. All are studying at Boromarajonani College of Nursing Chon Buri, Thailand. Descriptive and univariate general linear model analysis were applied. Results: The scores on critical thinking disposition gradually increased as academic level is rising from the junior year throughout the senior year, but its scores are neutral. Scores on creativity skill is neutral and constant thorough the four academic years. The fourth grade students had slightly higher scores on creativity when compared to others. A significant relationship between critical thinking and creativity was also found. Conclusions: The scores on critical thinking disposition gradually improved which greatly increased in the senior year. However, creativity has neutrally progressed. The findings suggest the importance of targeting the development of curriculum and teaching strategies for all grades of nursing students to increase their critical thinking and creativity skills.

Keywords: critical thinking, creativity, undergraduate nursing students, competency

Procedia PDF Downloads 398
16889 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 134
16888 Enhancing Critical Thinking through a Virtual Learning Environment

Authors: Diana Meeks

Abstract:

The use of a virtual learning environment (VLE), via the Second Life Platform has been a positive experience to enhance critical thinking, for executive graduate nursing practicum students. Due to the interest of faculty and students, the opportunity to immerse students via a virtual learning environment to enhance critical thinking related to the nurse executive role was explored. The College of Nursing realized the potential to enhance critical thinking and incorporated the Second Life, virtual learning environment platform into their graduate nursing program within their executive practicum course. The results from students and faculty regarding this experience have been positive. Students state the VLE platform has enhanced their critical thinking and interaction with peers. To date, course refinement incorporating a Second Life, virtual learning environment for the nurse executive practicum students continues. As a result, a designated subject matter expert has been designated for this course. The development and incorporation of the VLE approach will be presented.

Keywords: nursing, virtual learning environment, critical thinking, VLE

Procedia PDF Downloads 441
16887 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 272
16886 Tuning Cubic Equations of State for Supercritical Water Applications

Authors: Shyh Ming Chern

Abstract:

Cubic equations of state (EoS), popular due to their simple mathematical form, ease of use, semi-theoretical nature and, reasonable accuracy are normally fitted to vapor-liquid equilibrium P-v-T data. As a result, They often show poor accuracy in the region near and above the critical point. In this study, the performance of the renowned Peng-Robinson (PR) and Patel-Teja (PT) EoS’s around the critical area has been examined against the P-v-T data of water. Both of them display large deviations at critical point. For instance, PR-EoS exhibits discrepancies as high as 47% for the specific volume, 28% for the enthalpy departure and 43% for the entropy departure at critical point. It is shown that incorporating P-v-T data of the supercritical region into the retuning of a cubic EoS can improve its performance above the critical point dramatically. Adopting a retuned acentric factor of 0.5491 instead of its genuine value of 0.344 for water in PR-EoS and a new F of 0.8854 instead of its original value of 0.6898 for water in PT-EoS reduces the discrepancies to about one third or less.

Keywords: equation of state, EoS, supercritical water, SCW

Procedia PDF Downloads 495
16885 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 364
16884 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 125
16883 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 365
16882 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law

Procedia PDF Downloads 98
16881 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 629
16880 Tracing the Concept of Equivalence in Translation Theories from the Linguistics Oriented Era to Present

Authors: Fatma Ülkü Kavruk

Abstract:

The comparison of the old and new approaches reveals that the concept of equivalence has been interpreted and categorized in different ways by different scholars throughout the history. The aim of this study is to trace the concept of equivalence in translation theories from the linguistics-oriented era to present, referring to various translation scholars and to provide a critical evaluation of the nature and applicability of the concept of equivalence in today’s world of translation studies. Within the study, various interpretations of equivalence proposed by international scholars in translation studies are to be presented. In order to find out the reflections of these scholars’ approaches to the Turkish scholars’ research, the interpretations of equivalence by various Turkish scholars are to be examined. At the end of the paper, the applicability of the concept of equivalence in real life is to be discussed in light of these approaches.

Keywords: translation studies, equivalence, translation theories, evaluation

Procedia PDF Downloads 462
16879 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 441
16878 A Framework on the Critical Success Factors of E-Learning Implementation in Higher Education: A Review of the Literature

Authors: Sujit K. Basak, Marguerite Wotto, Paul Bélanger

Abstract:

This paper presents a conceptual framework on the critical success factors of e-learning implementation in higher education, derived from an in-depth survey of literature review. The aim of this study was achieved by identifying critical success factors that affect for the successful implementation of e-learning. The findings help to articulate issues that are related to e-learning implementation in both formal and non-formal higher education and in this way contribute to the development of programs designed to address the relevant issues.

Keywords: critical success factors, e-learning, higher education, life-long learning

Procedia PDF Downloads 332
16877 Women-Hating Masculinities: How the Demand for Prostitution Fuels Sex Trafficking

Authors: Rosa M. Senent

Abstract:

Over the centuries, prostitution has been problematized from many sides, with women always at the center of the debate. However, prostitution is a gendered, demand-driven phenomenon. Thus, a focus must be put on the men who demand it, as an increasing number of studies have been done in the last few decades. The purpose of this paper is to expose how men's discourse online reveals the link between their demand for paid sex in prostitution and sex trafficking. The methodological tool employed was Critical Discourse Analysis (CDA). A critical analysis of sex buyers' discourse online showed that online communities of sex buyers are a useful tool in researching their behavior towards women, that their knowledge of sex trafficking and exploitation do not work as a deterrent for them to buy sex, and that the type of masculinity that sex buyers endorse is characterized by attitudes linked to the perpetuation of violence against women.

Keywords: masculinities, prostitution, sex trafficking, violence

Procedia PDF Downloads 112
16876 Critical Thinking Skills in Activities Included in 11th Grade Chemistry Textbook - An Analytical Study

Authors: Sozan H. Omar, Luluah A. Al Jabr

Abstract:

The current study aimed to identify critical thinking skills and its level of inclusion in all the activities (44) listed in 11th grade chemistry textbooks. The researcher used a descriptive analytical method by using the content analyzing design. An instrument was created for this purpose and tested for validity and reliability. Results showed that, all activities included critical thinking skills with different ratios as follow: conclusion skill was (87.72%), induction skill was (80.90%), interpretation skill was (77. 72%), discussion of evaluation skill was (68.64%), and assumption skill was (50.45%). Also, the study results indicated that, the level of inclusion of critical thinking skills in the scientific activities was more explicit than implicit with same order as the level of inclusions. In the light of the study's results, the researcher provided some recommendations including the need to provide and redistribute critical thinking skills in the activities listed the chemistry textbook, as well as the need to pay attention to the inclusion level of these skills more implicitly in the activities.

Keywords: critical thinking skills, chemistry textbooks, scientific activities

Procedia PDF Downloads 374
16875 A Nonlinear Stochastic Differential Equation Model for Financial Bubbles and Crashes with Finite-Time Singularities

Authors: Haowen Xi

Abstract:

We propose and solve exactly a class of non-linear generalization of the Black-Scholes process of stochastic differential equations describing price bubble and crashes dynamics. As a result of nonlinear positive feedback, the faster-than-exponential price positive growth (bubble forming) and negative price growth (crash forming) are found to be the power-law finite-time singularity in which bubbles and crashes price formation ending at finite critical time tc. While most literature on the market bubble and crash process focuses on the nonlinear positive feedback mechanism aspect, very few studies concern the noise level on the same process. The present work adds to the market bubble and crashes literature by studying the external sources noise influence on the critical time tc of the bubble forming and crashes forming. Two main results will be discussed: (1) the analytical expression of expected value of the critical time is found and unexpected critical slowing down due to the coupling external noise is predicted; (2) numerical simulations of the nonlinear stochastic equation is presented, and the probability distribution of Prob(tc) is found to be the inverse gamma function.

Keywords: bubble, crash, finite-time-singular, numerical simulation, price dynamics, stochastic differential equations

Procedia PDF Downloads 103
16874 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 50
16873 Sociocultural and Critical Approach for Summer Study Abroad Program in Higher Education

Authors: Magda Silva

Abstract:

This paper presents the empirical and the theoretical principles associated with the Duke in Brazil Summer Program. Using a sociocultural model and critical theory, this study abroad maximizes students’ ability to enrich language competence, intercultural skills, and critical thinking. The fourteen-year implementation of this project demonstrates the global importance of foreign language teaching as the program unfolds into real life scenarios within the cultures of distinct regions of Brazil; Cosmopolitan Rio, in the southeast, and rural Belém, northern Amazon region.

Keywords: study abroad, critical thinking, sociocultural theory, foreign language, empirical, theoretical

Procedia PDF Downloads 386
16872 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 109
16871 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 500
16870 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 102