Search results for: cybersecurity competency
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 406

Search results for: cybersecurity competency

286 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 192
285 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 149
284 Critical Thinking and Creativity of Undergraduate Nursing Students: Descriptive and Disposition in Academic Levels

Authors: Kamolrat Turner, Chularat Howharn

Abstract:

Critical thinking and creativity are desirable competency for contemporary nurses although there are growing concerns supporting a disturbing paucity in its achievement. Nursing colleges in Thailand have developed teaching strategies and curricula that nurture critical thinking and creativity dispositions according academic levels. Objectives: This descriptive study identified critical thinking and creativity dispositions of Thai nursing students according academic levels. Methods: A cross-sectional questionnaire survey was conducted among 515 nursing students for four academic levels. All are studying at Boromarajonani College of Nursing Chon Buri, Thailand. Descriptive and univariate general linear model analysis were applied. Results: The scores on critical thinking disposition gradually increased as academic level is rising from the junior year throughout the senior year, but its scores are neutral. Scores on creativity skill is neutral and constant thorough the four academic years. The fourth grade students had slightly higher scores on creativity when compared to others. A significant relationship between critical thinking and creativity was also found. Conclusions: The scores on critical thinking disposition gradually improved which greatly increased in the senior year. However, creativity has neutrally progressed. The findings suggest the importance of targeting the development of curriculum and teaching strategies for all grades of nursing students to increase their critical thinking and creativity skills.

Keywords: critical thinking, creativity, undergraduate nursing students, competency

Procedia PDF Downloads 398
283 Entrepreneurial Leadership in Malaysian Public University: Competency and Behavior in the Face of Institutional Adversity

Authors: Noorlizawati Abd Rahim, Zainai Mohamed, Zaidatun Tasir, Astuty Amrin, Haliyana Khalid, Nina Diana Nawi

Abstract:

Entrepreneurial leaders have been sought as in-demand talents to lead profit-driven organizations during turbulent and unprecedented times. However, research regarding the pertinence of their roles in the public sector has been limited. This paper examined the characteristics of the challenging experiences encountered by senior leaders in public universities that require them to embrace entrepreneurialism in their leadership. Through a focus group interview with five Malaysian university top senior leaders with experience being Vice-Chancellor, we explored and developed a framework of institutional adversity characteristics and exemplary entrepreneurial leadership competency in the face of adversity. Complexity of diverse stakeholders, multiplicity of academic disciplines, unfamiliarity to lead different and broader roles, leading new directions, and creating change in high velocity and uncertain environment are among the dimensions that characterise institutional adversities. Our findings revealed that learning agility, opportunity recognition capacity, and bridging capability are among the characteristics of entrepreneurial university leaders. The findings reinforced that the presence of specific attributes in institutional adversity and experiences in overcoming those challenges may contribute to the development of entrepreneurial leadership capabilities.

Keywords: bridging capability, entrepreneurial leadership, leadership development, learning agility, opportunity recognition, university leaders

Procedia PDF Downloads 83
282 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network

Authors: Phillip Garrad, Saritha Unnikrishnan

Abstract:

The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.

Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing

Procedia PDF Downloads 77
281 Learning Outcomes Alignment across Engineering Core Courses

Authors: A. Bouabid, B. Bielenberg, S. Ainane, N. Pasha

Abstract:

In this paper, a team of faculty members of the Petroleum Institute in Abu Dhabi, UAE representing six different courses across General Engineering (ENGR), Communication (COMM), and Design (STPS) worked together to establish a clear developmental progression of learning outcomes and performance indicators for targeted knowledge, areas of competency, and skills for the first three semesters of the Bachelor of Sciences in Engineering curriculum. The sequences of courses studied in this project were ENGR/COMM, COMM/STPS, and ENGR/STPS. For each course’s nine areas of knowledge, competency, and skills, the research team reviewed the existing learning outcomes and related performance indicators with a focus on identifying linkages across disciplines as well as within the courses of a discipline. The team reviewed existing performance indicators for developmental progression from semester to semester for same discipline related courses (vertical alignment) and for different discipline courses within the same semester (horizontal alignment). The results of this work have led to recommendations for modifications of the initial indicators when incoherence was identified, and/or for new indicators based on best practices (identified through literature searches) when gaps were identified. It also led to recommendations for modifications of the level of emphasis within each course to ensure developmental progression. The exercise has led to a revised Sequence Performance Indicator Mapping for the knowledge, skills, and competencies across the six core courses.

Keywords: curriculum alignment, horizontal and vertical progression, performance indicators, skill level

Procedia PDF Downloads 187
280 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 100
279 Vocational Teaching Method: A Conceptual Model in Teaching Automotive Practical Work

Authors: Adnan Ahmad, Yusri Kamin, Asnol Dahar Minghat, Mohd. Khir Nordin, Dayana Farzeha, Ahmad Nabil

Abstract:

The purpose of this study is to identify the teaching method practices of the practical work subject in Vocational Secondary School. This study examined the practice of Vocational Teaching Method in Automotive Practical Work. The quantitative method used the sets of the questionnaire. 283 students and 63 teachers involved from ten VSS involved in this research. Research finding showed in conducting the introduction session teachers prefer used the demonstration method and questioning technique. While in deliver the content of practical task, teachers applied group monitoring and problem-solving approach. To conclude the task of automotive practical work, teachers choose re-explain and report writing to make sure students really understand all the process of teaching. VTM-APW also involved the competency-based concept to embed in the model. Derived from factors investigated, research produced the combination of elements in teaching skills and vocational skills which could be used as the best teaching method in automotive practical work for school level. As conclusion this study has concluded that the VTM-APW model is able to apply in teaching to make an improvement with current practices in Vocational Secondary School. Hence, teachers are suggested to use this method to enhance student's knowledge in Automotive and teachers will deliver skills to the current and future workforce relevant with the required competency skilled in workplace.

Keywords: vocational teaching method, practical task, teacher preferences, student preferences

Procedia PDF Downloads 426
278 Predictive Analytics Algorithms: Mitigating Elementary School Drop Out Rates

Authors: Bongs Lainjo

Abstract:

Educational institutions and authorities that are mandated to run education systems in various countries need to implement a curriculum that considers the possibility and existence of elementary school dropouts. This research focuses on elementary school dropout rates and the ability to replicate various predictive models carried out globally on selected Elementary Schools. The study was carried out by comparing the classical case studies in Africa, North America, South America, Asia and Europe. Some of the reasons put forward for children dropping out include the notion of being successful in life without necessarily going through the education process. Such mentality is coupled with a tough curriculum that does not take care of all students. The system has completely led to poor school attendance - truancy which continuously leads to dropouts. In this study, the focus is on developing a model that can systematically be implemented by school administrations to prevent possible dropout scenarios. At the elementary level, especially the lower grades, a child's perception of education can be easily changed so that they focus on the better future that their parents desire. To deal effectively with the elementary school dropout problem, strategies that are put in place need to be studied and predictive models are installed in every educational system with a view to helping prevent an imminent school dropout just before it happens. In a competency-based curriculum that most advanced nations are trying to implement, the education systems have wholesome ideas of learning that reduce the rate of dropout.

Keywords: elementary school, predictive models, machine learning, risk factors, data mining, classifiers, dropout rates, education system, competency-based curriculum

Procedia PDF Downloads 140
277 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid

Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni

Abstract:

In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.

Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic

Procedia PDF Downloads 75
276 Salvage Reconstruction of Intraoral Dehiscence following Free Fibular Flap with a Superficial Temporal Artery Islandized Flap (STAIF)

Authors: Allyne Topaz

Abstract:

Intraoral dehiscence compromises free fibula flaps following mandibular reconstruction. Salivary contamination risks thrombosis of microvascular anastomosis and hardware infection. The superficial temporal artery islandized flap (STAIF) offers an efficient, non-microsurgical reconstructive option for regaining intraoral competency for a time sensitive complication. Methods: The STAIF flap is based on the superficial temporal artery coursing along the anterior hairline. The flap is mapped with assistance of the doppler probe. The width of the skin paddle is taken based on the ability to close the donor site. The flap is taken down to the level of the zygomatic arch and tunneled into the mouth. Results: We present a case of a patient who underwent mandibular reconstruction with a free fibula flap after a traumatic shotgun wound. The patient developed repeated intraoral dehiscence following failed local buccal and floor of mouth flaps leading to salivary contamination of the flap and hardware. The intraoral dehiscence was successfully salvaged on the third attempt with a STAIF flap. Conclusions: Intraoral dehiscence creates a complication requiring urgent attention to prevent loss of free fibula flap after mandibular reconstruction. The STAIF is a non-microsurgical option for restoring intraoral competency. This robust, axially vascularized skin paddle may be split for intra- and extra-oral coverage, as needed and can be an important tool in the reconstructive armamentarium.

Keywords: free fibula flap, intraoral dehiscence, mandibular reconstruction, superficial temporal artery islandized flap

Procedia PDF Downloads 107
275 Development of the ‘Teacher’s Counselling Competence Self-Efficacy Scale’

Authors: Riin Seema

Abstract:

Guidance and counseling as a whole-school responsibility is a global trend. Counseling is a specific competence, that consist of cognitive, emotional, attitudinal, and behavioral components. To authors best knowledge, there are no self-assessment scales for teachers in the whole world to measure teachers’ counseling competency. In 2016 an Estonian scale on teachers counseling competence was developed during an Interdisciplinary Project at Tallinn University. The team consisted of 10 interdisciplinary students (psychology, nursery school, special and adult education) and their supervisor. In 2017 another international Interdisciplinary Project was carried out for adapting the scale in English for international students. Firstly, the Estonian scale was translated by 2 professional translators, and then a group of international Erasmus students (again from psychology, nursery school, special and adult education) selected the most suitable translation for the scale. The developed ‘Teacher’s Counselling Competence Self-Efficacy Scale’ measures teacher’s self-efficacy beliefs in their own competence to perform different counseling tasks (creating a counseling relationship, using different reflection techniques, etc.). The scale consists of 47 questions in a 5-point numeric scale. The scale is created based on counseling theory and scale development and validation theory. The scale has been used as a teaching and learning material for counseling courses by 174 Estonian and 10 international student teachers. After filling out the scale, the students also reflected on the scale and their own counseling competencies. The study showed that the scale is unidimensional and has an excellent Cronbach alpha coefficient. Student’s qualitative feedback on the scale has been very positive, as the scale supports their self-reflection. In conclusion, the developed ‘Teacher’s Counselling Competence Self-Efficacy Scale’ is a useful tool for supporting student teachers’ learning.

Keywords: competency, counseling, self-efficacy, teacher students

Procedia PDF Downloads 111
274 The Relationship between the Competence Perception of Student and Graduate Nurses and Their Autonomy and Critical Thinking Disposition

Authors: Zülfiye Bıkmaz, Aytolan Yıldırım

Abstract:

This study was planned as a descriptive regressive study in order to determine the relationship between the competency levels of working nurses, the levels of competency expected by nursing students, the critical thinking disposition of nurses, their perceived autonomy levels, and certain socio demographic characteristics. It is also a methodological study with regard to the intercultural adaptation of the Nursing Competence Scale (NCS) in both working and student samples. The sample of the study group of nurses at a university hospital for at least 6 months working properly and consists of 443 people filled out questionnaires. The student group, consisting of 543 individuals from the 4 public university nursing 3rd and 4th grade students. Data collection tools consisted of a questionnaire prepared in order to define the socio demographic, economic, and personal characteristics of the participants, the ‘Nursing Competency Scale’, the ‘Autonomy Subscale of the Sociotropy – Autonomy Scale’, and the ‘California Critical Thinking Disposition Inventory’. In data evaluation, descriptive statistics, nonparametric tests, Rasch analysis and correlation and regression tests were used. The language validity of the ‘NCS’ was performed by translation and back translation, and the context validity of the scale was performed with expert views. The scale, which was formed into its final structure, was applied in a pilot application from a group consisting of graduate and student nurses. The time constancy of the test was obtained by analysis testing retesting method. In order to reduce the time problems with the two half reliability method was used. The Cronbach Alfa coefficient of the scale was found to be 0.980 for the nurse group and 0.986 for the student group. Statistically meaningful relationships between competence and critical thinking and variables such as age, gender, marital status, family structure, having had critical thinking training, education level, class of the students, service worked in, employment style and position, and employment duration were found. Statistically meaningful relationships between autonomy and certain variables of the student group such as year, employment status, decision making style regarding self, total duration of employment, employment style, and education status were found. As a result, it was determined that the NCS which was adapted interculturally was a valid and reliable measurement tool and was found to be associated with autonomy and critical thinking.

Keywords: nurse, nursing student, competence, autonomy, critical thinking, Rasch analysis

Procedia PDF Downloads 366
273 Prenatal Genetic Screening and Counselling Competency Challenges of Nurse-Midwife

Authors: Girija Madhavanprabhakaran, Frincy Franacis, Sheeba Elizabeth John

Abstract:

Introduction: A wide range of prenatal genetic screening is introduced with increasing incidences of congenital anomalies even in low-risk pregnancies and is an emerging standard of care. Being frontline caretakers, the role and responsibilities of nurses and midwives are critical as they are working along with couples to provide evidence-based supportive educative care. The increasing genetic disorders and advances in prenatal genetic screening with limited genetic counselling facilities urge nurses and midwifery nurses with essential competencies to help couples to take informed decision. Objective: This integrative literature review aimed to explore nurse midwives’ knowledge and role in prenatal screening and genetic counselling competency and the challenges faced by them to cater to all pregnant women to empower their autonomy in decision making and ensuring psychological comfort. Method: An electronic search using keywords prenatal screening, genetic counselling, prenatal counselling, nurse midwife, nursing education, genetics, and genomics were done in the PUBMED, SCOPUS and Medline, Google Scholar. Finally, based on inclusion criteria, 8 relevant articles were included. Results: The main review results suggest that nurses and midwives lack essential support, knowledge, or confidence to be able to provide genetic counselling and help the couples ethically to ensure client autonomy and decision making. The majority of nurses and midwives reported inadequate levels of knowledge on genetic screening and their roles in obtaining family history, pedigrees, and providing genetic information for an affected client or high-risk families. The deficiency of well-recognized and influential clinical academic midwives in midwifery practice is also reported. Evidence recommended to update and provide sound educational training to improve nurse-midwife competence and confidence. Conclusion: Overcoming the challenges to achieving informed choices about fetal anomaly screening globally is a major concern. Lack of adequate knowledge and counselling competency, communication insufficiency, need for education and policy are major areas to address. Prenatal nurses' and midwives’ knowledge on prenatal genetic screening and essential counselling competencies can ensure services to the majority of pregnant women around the globe to be better-informed decision-makers and enhances their autonomy, and reduces ethical dilemmas.

Keywords: challenges, genetic counselling, prenatal screening, prenatal counselling

Procedia PDF Downloads 169
272 EECS: Reimagining the Future of Technology Education through Electrical Engineering and Computer Science Integration

Authors: Yousef Sharrab, Dimah Al-Fraihat, Monther Tarawneh, Aysh Alhroob, Ala’ Khalifeh, Nabil Sarhan

Abstract:

This paper explores the evolution of Electrical Engineering (EE) and Computer Science (CS) education in higher learning, examining the feasibility of unifying them into Electrical Engineering and Computer Science (EECS) for the technology industry. It delves into the historical reasons for their separation and underscores the need for integration. Emerging technologies such as AI, Virtual Reality, IoT, Cloud Computing, and Cybersecurity demand an integrated EE and CS program to enhance students' understanding. The study evaluates curriculum integration models, drawing from prior research and case studies, demonstrating how integration can provide students with a comprehensive knowledge base for industry demands. Successful integration necessitates addressing administrative and pedagogical challenges. For academic institutions considering merging EE and CS programs, the paper offers guidance, advocating for a flexible curriculum encompassing foundational courses and specialized tracks in computer engineering, software engineering, bioinformatics, information systems, data science, AI, robotics, IoT, virtual reality, cybersecurity, and cloud computing. Elective courses are emphasized to keep pace with technological advancements. Implementing this integrated approach can prepare students for success in the technology industry, addressing the challenges of a technologically advanced society reliant on both EE and CS principles. Integrating EE and CS curricula is crucial for preparing students for the future.

Keywords: electrical engineering, computer science, EECS, curriculum integration of EE and CS

Procedia PDF Downloads 19
271 Agricultural Extension Workers’ Education in Indonesia - Roles of Distance Education

Authors: Adhi Susilo

Abstract:

This paper addresses the roles of distance education in the agricultural extension workers’ education. Agriculture plays an important role in both poverty reduction and economic growth. The technology of agriculture in the developing world should change continuously to keep pace with rising populations and rapidly changing social, economic, and environmental conditions. Therefore, agricultural extension workers should have several competencies in order to carry out their duties properly. One of the essential competencies that they must possess is the professional competency that is directly related to their duties in carrying out extension activities. Such competency can be acquired through studying at Universitas Terbuka (UT). With its distance learning system, agricultural extension workers can study at UT without leaving their duties. This paper presenting sociological analysis and lessons learnt from the specific context of Indonesia. Diversities in geographic, demographic, social cultural and economic conditions of the country provide specific challenges for its distance education practice and the process of social transformation to which distance education can contribute. Extension officers used distance education for personal benefits and increased professional productivity. An increase in awareness is important for the further adoption of distance learning for extension purposes. Organizations in both the public and private sector must work to increase knowledge of ICTs for the benefit of stakeholders. The use of ICTs can increase productivity for extensions officers and expand educational opportunities for learners. The use of distance education by extension to disseminate educational materials around the world is widespread. Increasing awareness and use of distance learning can lead to more productive relationships between extension officers and agricultural stakeholders.

Keywords: agricultural extension, demographic and geographic condition, distance education, ICTs

Procedia PDF Downloads 483
270 The Development of Student Core Competencies through the STEM Education Opportunities in Classroom

Authors: Z. Dedovets, M. Rodionov

Abstract:

The goal of the modern education system is to prepare students to be able to adapt to ever-changing life situations. They must be able to acquire required knowledge independently; apply such knowledge in practice to solve various problems by using modern technologies; think critically and creatively; competently use information; be communicative, work in a team; and develop their own moral values, intellect and cultural awareness. As a result, the status of education significantly increases; new requirements to its quality have been formed. In recent years, the competency-based approach in education has become of significant interest. This approach is a strengthening of applied and practical characteristics of a school education and leads to the forming of the key students’ competencies which define their success in future life. In this article, the authors’ attention focuses on a range of key competencies, educational, informational and communicative and on the possibility to develop such competencies via STEM education. This research shows the change in students’ attitude towards scientific disciplines such as mathematics, general science, technology and engineering as a result of STEM education. Two-staged analyzes questionnaires completed by students of forms II to IV in the republic of Trinidad and Tobago allowed the authors to categorize students between two levels that represent students’ attitude to various disciplines. The significance of differences between selected levels was confirmed with the use of Pearsons’ chi-squared test. In summary, the analysis of obtained data makes it possible to conclude that STEM education has a great potential for development of core students’ competencies and encourages the development of positive student attitude towards the above mentioned above scientific disciplines.

Keywords: STEM, science, technology, engineering, mathematics, students’ competency, Pearson's chi-squared test

Procedia PDF Downloads 363
269 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 116
268 A Measurement Instrument to Determine Curricula Competency of Licensure Track Graduate Psychotherapy Programs in the United States

Authors: Laith F. Gulli, Nicole M. Mallory

Abstract:

We developed a novel measurement instrument to assess Knowledge of Educational Programs in Professional Psychotherapy Programs (KEP-PPP or KEP-Triple P) within the United States. The instrument was designed by a Panel of Experts (PoE) that consisted of Licensed Psychotherapists and Medical Care Providers. Licensure track psychotherapy programs are listed in the databases of the Commission on Accreditation for Marriage and Family Therapy Education (COAMFTE); American Psychological Association (APA); Council on Social Work Education (CSWE); and the Council for Accreditation of Counseling & Related Educational Programs (CACREP). A complete list of psychotherapy programs can be obtained from these professional databases, selecting search fields of (All Programs) in (All States). Each program has a Web link that electronically and directly connects to the institutional program, which can be researched using the KEP-Triple P. The 29-item KEP Triple P was designed to consist of six categorical fields; Institutional Type: Degree: Educational Delivery: Accreditation: Coursework Competency: and Special Program Considerations. The KEP-Triple P was designed to determine whether a specific course(s) is offered in licensure track psychotherapy programs. The KEP-Triple P is designed to be modified to assess any part or the entire curriculum of licensure graduate programs. We utilized the KEP-Triple P instrument to study whether a graduate course in Addictions was offered in Marriage and Family Therapy (MFT) programs. Marriage and Family Therapists are likely to commonly encounter patients with Addiction(s) due to the broad treatment scope providing psychotherapy services to individuals, couples and families of all age groups. Our study of 124 MFT programs which concluded at the end of 2016 found that we were able to assess 61 % of programs (N = 76) since 27 % (N = 34) of programs were inaccessible due to broken Web links. From the total of all MFT programs 11 % (N = 14) did not have a published curriculum on their Institutional Web site. From the sample study, we found that 66 % (N = 50) of curricula did not offer a course in Addiction Treatment and that 34 % (N =26) of curricula did require a mandatory course in Addiction Treatment. From our study sample, we determined that 15 % (N = 11) of MFT doctorate programs did not require an Addictions Treatment course and that 1 % (N = 1) did require such a course. We found that 99 % of our study sample offered a Campus based program and 1 % offered a hybrid program with both online and residential components. From the total sample studied, we determined that 84 % of programs would be able to obtain reaccreditation within a five-year period. We recommend that MFT programs initiate procedures to revise curricula to include a required course in Addiction Treatment prior to their next accreditation cycle, to improve the escalating addiction crisis in the United States. This disparity in MFT curricula raises serious ethical and legal consideration for national and Federal stakeholders as well as for patients seeking a competently trained psychotherapist.

Keywords: addiction, competency, curriculum, psychotherapy

Procedia PDF Downloads 124
267 Teaching Foreign Languages Across the Curriculum (FLAC): Hybrid French/English Courses and their Dual Impact on Interdisciplinarity and L2 Competency

Authors: M. Caporale

Abstract:

French Curricula across the US have recently suffered low enrollment and have experienced difficulties with retention, thus resulting in fewer students minoring and majoring in French and enrolling in upper-level classes. Successful undergraduate programs offer French courses with a strong cultural and interdisciplinary or multidisciplinary component. The World Language Curriculum in liberal arts colleges in America needs to take into account the cultural aspects of the language and encourage students to think critically about the country or countries they are studying. Limiting the critical inquiry to language or literature narrowly defined provides and incomplete and stagnant picture of France and the Francophone world in today's global community. This essay discusses the creation and implementation of a hybrid interdisciplinary L1/L2 course titled "Topics in Francophone Cinema" (subtitle "Francophone Women on Screen and Behind the Camera"). Content-based interdisciplinary courses undoubtedly increase the profile of French and Francophone cultural Studies by introducing students of other disciplines to fundamental questions relating to the French and Francophone cultures (in this case, women's rights in the Francophone world). At the same time, this study determines that through targeted reading and writing assignments, sustained aural exposure to L2 through film,and student participation in a one-credit supplementary weekly practicum (creative film writing workshop), significant advances in L2 competence are achieved with students' oral and written production levels evolving from Advanced Low to Advanced-mid, as defined by the ACFL guidelines. Use of differentiated assessment methods for L1/L2 and student learning outcomes for both groups will also be addressed.

Keywords: interdisciplinary, Francophone cultural studies, language competency, content-based

Procedia PDF Downloads 475
266 Entrepreneur Competencies: An Exploratory Study Applied to Educational Social Enterprise in South East Asia

Authors: D. Songpol, K. Taweesak, T. Sookyuen

Abstract:

A social enterprise is an organization that operates commercial business as a source of income with the aim of addressing social and environmental issues. Though it is clear that this kind of organization will benefit society and environment but in practice, it is found that most of social enterprises’ goals cannot be achieved. The most success factors of social enterprises usually rely on individual characteristics of entrepreneurs, especially in educational business. This study aims to find out the magnitude of influence from the components of entrepreneur competencies to social enterprises in education. There are developmental models of research demonstrating that knowledge, skills and attributes affect the success of social enterprises in term of sustainability, social opportunities and innovation leadership. The 5-scale questionnaire was used to collect data from the social entrepreneurs in education who operates in the South East Asian region of 135 samples and then processed by the methods of structural equation models. The results show that the competency of entrepreneurs in attributes has the greatest impact on the success of social enterprises while the skills and knowledge have respectively impact on the social enterprises’ success as well. The reason why attributes of entrepreneurs have the greatest impact on social enterprise success is because, social enterprise is an organization that does not motivate or provide attractive financial incentives to the entrepreneur. Entrepreneurs, who succeed in developing their organizations, therefore need attribute factor higher than normal entrepreneurs, especially those in education sector that have somewhat few human resources to operate their businesses. More importantly, attribute’s traits such as entrepreneurial passion, self-efficacy, entrepreneurial identity and, innovativeness and perseverance will significantly affect the ideology and tolerance of the entrepreneurs once facing the problem in doing business. In conclusion, the education social enterprise would be successful depending on the performance of the entrepreneurs which derives from higher attributes competency.

Keywords: education, entrepreneur competencies, social enterprise, South East Asia

Procedia PDF Downloads 132
265 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 52
264 Evaluating the Learning Outcomes of Physical Therapy Clinical Fieldwork Course

Authors: Hui-Yi Wang, Shu-Mei Chen, Mei-Fang Liu

Abstract:

Background and purpose: Providing clinical experience in medical education is an important discipline method where students can gradually apply their academic knowledge to clinical situations. The purpose of this study was to establish self-assessment questionnaires for students to assess their learning outcomes for two fields of physical therapy, orthopedic physical therapy, and pediatric physical therapy, in a clinical fieldwork course. Methods: The questionnaires were developed based on the core competence dimensions of the course. The content validity of the questionnaires was evaluated and established by expert meetings. Among the third-year undergraduate students who took the clinical fieldwork course, there were 49 students participated in this study. Teachers arranged for the students to study two professional fields, and each professional field conducted a three-week clinical lesson. The students filled out the self-assessment questionnaires before and after each three-week lesson. Results: The self-assessment questionnaires were established by expert meetings that there were six core competency dimensions in each of the two fields, with 20 and 21 item-questions, respectively. After each three-week clinical fieldwork, the self-rating scores in each core competency dimension were higher when compared to those before the course, indicating having better clinical abilities after the lessons. The best self-rating scores were the dimension of attitude and humanistic literacy, and the two lower scores were the dimensions of professional knowledge and skills and problem-solving critical thinking. Conclusions: This study developed questionnaires for clinical fieldwork courses to reflect students' learning outcomes, including the performance of professional knowledge, practice skills, and professional attitudes. The use of self-assessment of learning performance can help students build up their reflective competencies. Teachers can guide students to pay attention to the performance of abilities in each core dimension to enhance the effectiveness of learning through self-reflection and improvement.

Keywords: physical therapy, clinical fieldwork course, learning outcomes assessment, medical education, self-reflection ability

Procedia PDF Downloads 91
263 Application of Digital Technologies as Tools for Transformative Agricultural Science Instructional Delivery in Secondary Schools

Authors: Cajethan U. Ugwuoke

Abstract:

Agriculture is taught in secondary schools to develop skills in students which will empower them to contribute to national economic development. Unfortunately, our educational system emphasizes the application of conventional teaching methods in delivering instructions, which fails to produce students competent enough to carry out agricultural production. This study was therefore aimed at examining the application of digital technologies as tools for transformative instructional delivery. Four specific purposes, research questions and hypotheses guided the study. The study adopted a descriptive survey research design where 80 subjects representing 64 teachers of agriculture and 16 principals in the Udenu local government area of Enugu State, Nigeria, participated in the study. A structured questionnaire was used to collect data. The assumption of normality was ascertained by subjecting the data collected to a normality test. Data collected were later subjected to mean, Pearson product-moment correlation, ANOVA and t-test to answer the research questions and test the hypotheses at a 5% significant level. The result shows that the application of digital technologies helps to reduce learners’ boredom (3.52.75), improves learners’ performance (3.63.51), and is used as a visual aid for learners (3.56.61), among others. There was a positive, strong and significant relationship between the application of digital technologies and effective instructional delivery (+.895, p=.001<.05, F=17.73), competency of teachers to the application of digital technologies and effective instructional delivery (+998, p=.001<0.5, F=16263.45), and frequency of the application of digital technologies and effective instructional delivery (+.999, p=.001<.05, F=31436.14). There was no evidence of autocorrelation and multicollinearity in the regression models between the application of digital technologies and effective instructional delivery (2.03, Tolerance=1.00, VIF=1.00), competency of teachers in the application of digital technologies and effective instructional delivery (2.38, Tolerance=1.00, VIF=1.00) and frequency of the application of digital technologies and effective instructional delivery (2.00, Tolerance=1.00, VIF=1.00). Digital technologies should be therefore applied in teaching to facilitate effective instructional delivery in agriculture.

Keywords: agricultural science, digital technologies, instructional delivery, learning

Procedia PDF Downloads 40
262 Determinants of Customer Satisfaction: The case of Abyssinia Bank Customers in Addis Ababa Ethiopia

Authors: Yosef Ferede Bogale

Abstract:

The purpose of this study was to evaluate the degree of customer satisfaction and the variables influencing it in the instance of the Bank of Abyssinia branches in the districts of Arada and Bole in Addis Ababa. The study was carried out utilizing a mixed research approach and a descriptive and explanatory research design in Addis Ababa, the capital city of Ethiopia. Both primary and secondary data were employed in this investigation. The study's target population consisted of 1000 of the bank's most prestigious clients. With a 93% response rate, 265 respondents from both genders in the active age group had higher levels of education and work experience and were in the active age group. Customers of the case bank under consideration comprised the study's target audience. The respondents, who belonged to both gender groups, were in the active age bracket with superior levels of education and work experience. As a result, this investigation discovered that the degree of client satisfaction was assigned a medium rating. Additionally given a middling rating were the company's image practices, employee competency, technology, and service quality. Further, the results also demonstrate that corporate image, employees’ competency, technology, and service quality all positively and significantly affect customer happiness. This study found that, to varying degrees, company image, technology, competence, and high-quality financial services will all improve consumer happiness. According to this report, banks should monitor customer satisfaction and service quality at least twice a year. This is because there is a growing movement among bank service providers for accountability, and measuring these factors is crucial. This study also recommends that banks make every effort to satisfy consumers' expectations to the highest level.

Keywords: customer satisfaction, corporate image, quality service risk, banks

Procedia PDF Downloads 42
261 Determinants of Customer Satisfaction: The Case of Abyssinia Bank Customers in Addis Ababa Ethiopia

Authors: Yosef Ferede Bogale

Abstract:

The purpose of this study was to evaluate the degree of customer satisfaction and the variables influencing it in the instance of the Bank of Abyssinia branches in the districts of Arada and Bole in Addis Ababa. The study was carried out utilizing a mixed research approach and a descriptive and explanatory research design in Addis Ababa, the capital city of Ethiopia. Both primary and secondary data were employed in this investigation. The study's target population consisted of 1000 of the bank's most prestigious clients. With a 93% response rate, 265 respondents from both genders in the active age group had higher levels of education and work experience and were in the active age group. Customers of the case bank under consideration comprised the study's target audience. The respondents, who belonged to both gender groups, were in the active age bracket with superior levels of education and work experience. As a result, this investigation discovered that the degree of client satisfaction was assigned a medium rating. Additionally given a middling rating were the company's image practices, employee competency, technology, and service quality. Further, the results also demonstrate that corporate image, employees’ competency, technology, and service quality all positively and significantly affect customer happiness. This study found that, to varying degrees, company image, technology, competence, and high-quality financial services will all improve consumer happiness. According to this report, banks should monitor customer satisfaction and service quality at least twice a year. This is because there is a growing movement among bank service providers for accountability, and measuring these factors is crucial. This study also recommends that banks make every effort to satisfy consumers' expectations to the highest level.

Keywords: customer satisfaction, corporate image, quality services risk, bank

Procedia PDF Downloads 26
260 An Early Intervention Framework for Supporting Students’ Mathematical Development in the Transition to University STEM Programmes

Authors: Richard Harrison

Abstract:

Developing competency in mathematics and related critical thinking skills is essential to the education of undergraduate students of Science, Technology, Engineering and Mathematics (STEM). Recently, the HE sector has been impacted by a seemingly widening disconnect between the mathematical competency of incoming first-year STEM students and their entrance qualification tariffs. Despite relatively high grades in A-Level Mathematics, students may initially lack fundamental skills in key areas such as algebraic manipulation and have limited capacity to apply problem solving strategies. Compounded by compensatory measures applied to entrance qualifications during the pandemic, there has been an associated decline in student performance on introductory university mathematics modules. In the UK, a number of online resources have been developed to help scaffold the transition to university mathematics. However, in general, these do not offer a structured learning journey focused on individual developmental needs, nor do they offer an experience coherent with the teaching and learning characteristics of the destination institution. In order to address some of these issues, a bespoke framework has been designed and implemented on our VLE in the Faculty of Engineering & Physical Sciences (FEPS) at the University of Surrey. Called the FEPS Maths Support Framework, it was conceived to scaffold the mathematical development of individuals prior to entering the university and during the early stages of their transition to undergraduate studies. More than 90% of our incoming STEM students voluntarily participate in the process. Students complete a set of initial diagnostic questions in the late summer. Based on their performance and feedback on these questions, they are subsequently guided to self-select specific mathematical topic areas for review using our proprietary resources. This further assists students in preparing for discipline related diagnostic tests. The framework helps to identify students who are mathematically weak and facilitates early intervention to support students according to their specific developmental needs. This paper presents a summary of results from a rich data set captured from the framework over a 3-year period. Quantitative data provides evidence that students have engaged and developed during the process. This is further supported by process evaluation feedback from the students. Ranked performance data associated with seven key mathematical topic areas and eight engineering and science discipline areas reveals interesting patterns which can be used to identify more generic relative capabilities of the discipline area cohorts. In turn, this facilitates evidence based management of the mathematical development of the new cohort, informing any associated adjustments to teaching and learning at a more holistic level. Evidence is presented establishing our framework as an effective early intervention strategy for addressing the sector-wide issue of supporting the mathematical development of STEM students transitioning to HE

Keywords: competency, development, intervention, scaffolding

Procedia PDF Downloads 42
259 An Exploratory Study: Mobile Learning as a Means of Promoting Sustainable Learning in the Saudi General Educational Schools via an Activity Theory Lens

Authors: Aiydh Aljeddani

Abstract:

Sustainable learning is an emerging concept that aims at enhancing sustainability literacy and competency in educational contexts. Mobile learning is one of the means increasingly used in sustainable development education nowadays. Studies which have explored this issue in the Saudi educational context so far are rare. Therefore, the current study attempted to explore the current situation of the usage of mobile learning in the Saudi elementary and secondary schools as a means of promoting sustainable learning. It also focused on how mobile learning has been implemented in those schools to promote sustainable learning and what factors have contributed to the success/failure of the implementation of mobile learning and possible ways to improve the current practice. An interpretive approach was followed in this study to gain a thorough understanding of the explored issue in the Saudi educational context using the activity theory as a lens to do so. A qualitative case study methodology in which semi-structured interviews, documents analysis and nominal group were used to gather the data for this study. Two hundred and twenty-nine participants representing several main stakeholders in the educational system took part in this study. Those included six general education schools, head teachers, teachers, students’ parents, educational supervisors, one curriculum designer and academic curriculum specialists. Through the lens of activity theory, the results of the study showed that there were contradictions in the current practice between the elements of the activity system and within each of its elements. Furthermore, several sociocultural factors have influenced both the division of labour and the community's members. These have acted as obstacles which have impeded the usage of mobile learning to promote sustainable learning in this context. It was found that shifting from the current practice to sustainable learning via the usage of mobile learning requires appropriate interrelationship between the different elements of the activity system. The study finally offers a number of recommendations to improve on the current practices and suggests areas for further studies.

Keywords: activity theory, mobile learning, sustainability competency, sustainability literacy, sustainable learning

Procedia PDF Downloads 222
258 A Cloud-Based Federated Identity Management in Europe

Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas

Abstract:

Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).

Keywords: cybersecurity, identity federation, trust, user authentication

Procedia PDF Downloads 141
257 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 263