Search results for: cybersecurity competency
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 406

Search results for: cybersecurity competency

196 Beyond Learning Classrooms: An Undergraduate Experience at Instituto Politecnico Nacional Mexico

Authors: Jorge Sandoval Lezama, Arturo Ivan Sandoval Rodriguez, Jose Arturo Correa Arredondo

Abstract:

This work aims to share innovative educational experiences at IPN Mexico, that involve collaborative learning at institutional and global level through course competition and global collaboration projects. Students from universities in China, USA, South Korea, Canada and Mexico collaborate to design electric vehicles to solve global urban mobility problems. The participation of IPN students in the 2015-2016 global competition (São Paolo, Brazil and Cincinnati, USA) Reconfigurable Shared-Use Mobility Systems allowed to apply pedagogical strategies of groups of collaboration and of learning based on projects where they shared activities, commitments and goals, demonstrating that students were motivated to develop / self-generate their knowledge with greater meaning and understanding. One of the most evident achievements is that the students are self-managed, so the most advanced students train the students who join the project with CAD, CAE, CAM tools. Likewise, the motivation achieved is evident since in 2014 there were 12 students involved in the project, and there are currently more than 70 students.

Keywords: collaboration projects, global competency, course competition, active learning

Procedia PDF Downloads 241
195 Administration Model for the College of Film, Television, Multimedia and Performing Arts, Suan Sunandha Rajabhat University

Authors: Somdech Rungsrisawat

Abstract:

The objective of this research was to investigate how to develop an appropriate management and administration model for the College of Film, Television, Multimedia and Performing Arts at Suan Sunandha Rajabhat University. A combination of qualitative and quantitative data collection and analysis methods was employed. The data collection was from the 8 experts who were the academic staff and entrepreneurs in films, television, multimedia and performing arts, and from 471 students studying in the communication arts field. The findings of this research paper presented the appropriate management and administration model for the College of Film, Television, Multimedia and Performing Arts, which depended on 3 factors: [i] the marketing management and the supporting facilities such as buildings, equipments and accessibility for students to the college; [ii] the competency of academic staff or lecturers and supporting staff; and [iii] career opportunities after graduation.

Keywords: educational institution management, educational management, learning resources, non-formal education, Thai qualifications framework for higher education

Procedia PDF Downloads 303
194 Strengths Profiling: An Alternative Approach to Assessing Character Strengths Based on Personal Construct Psychology

Authors: Sam J. Cooley, Mary L. Quinton, Benjamin J. Parry, Mark J. G. Holland, Richard J. Whiting, Jennifer Cumming

Abstract:

Practitioners draw attention to people’s character strengths to promote empowerment and well-being. This paper explores the possibility that existing approaches for assessing character strengths (e.g., the Values in Action survey; VIA-IS) could be even more autonomy supportive and empowering when combined with strengths profiling, an ideographic tool informed by personal construct theory (PCT). A PCT approach ensures that: (1) knowledge is co-created (i.e., the practitioner is not seen as the ‘expert’ who leads the process); (2) individuals are not required to ‘fit’ within a prescribed list of characteristics; and (3) individuals are free to use their own terminology and interpretations. A combined Strengths Profiling and VIA approach was used in a sample of homeless youth (aged 16-25) who are commonly perceived as ‘hard-to-engage’ through traditional forms of assessment. Strengths Profiling was completed face-to-face in small groups. Participants (N = 116) began by listing a variety of personally meaningful characteristics. Participants gave each characteristic a score out of ten for how important it was to them (1 = not so important; 10 = very important), their ideal competency, and their current competency (1 = poor; 10 = excellent). A discrepancy score was calculated for each characteristic (discrepancy score = ideal score - current score x importance), whereby a lower discrepancy score indicated greater satisfaction. Strengths Profiling was used at the beginning and end of a 10-week positive youth development programme. Experiences were captured through video diary room entries made by participants and through reflective notes taken by the facilitators. Participants were also asked to complete a pre-and post-programme questionnaire, measuring perceptions of well-being, self-worth, and resilience. All of the young people who attended the strengths profiling session agreed to complete a profile, and the majority became highly engaged in the process. Strengths profiling was found to be an autonomy supportive and empowering experience, with each participant identifying an average of 10 character strengths (M = 10.27, SD = 3.23). In total, 215 different character strengths were identified, each with varying terms and definitions used, which differed greatly between participants and demonstrated the value in soliciting personal constructs. Using the participants’ definitions, 98% of characteristics were categorized deductively into the VIA framework. Bravery, perseverance, and hope were the character strengths that featured most, whilst temperance and courage received the highest discrepancy scores. Discrepancy scores were negatively correlated with well-being, self-worth, and resilience, and meaningful improvements were recorded following the intervention. These findings support the use of strengths profiling as a theoretically-driven and novel way to engage disadvantaged youth in identifying and monitoring character strengths. When young people are given the freedom to express their own characteristics, the resulting terminologies extend beyond the language used in existing frameworks. This added freedom and control over the process of strengths identification encouraged youth to take ownership over their profiles and apply their strengths. In addition, the ability to transform characteristics post hoc into the VIA framework means that strengths profiling can be used to explore aggregated/nomothetic hypotheses, whilst still benefiting from its ideographic roots.

Keywords: ideographic, nomothetic, positive youth development, VIA-IS, assessment, homeless youth

Procedia PDF Downloads 169
193 How Trust Functions in Fostering Innovation and Technology Development

Authors: Obidimma Ezezika

Abstract:

In light of the increasing importance of trust in development programs, the purpose of this study, was to identify how trust functions as an essential key determinant in successful innovation and technology development programs. Using projects in the agricultural sector as case studies, we determined how the concept of trust is understood. Our data collection relied on semi-structured, face-to-face interviews conducted as part of a larger study investigating the role of trust in development programs. Interview transcripts were analyzed to create a narrative on how trust is understood by the study’s participants and how trust functions in fostering innovation. We identified six themes and showed how trust plays an important factor in innovation. These themes included the practice of integrity and honesty; delivery of results in an accountable manner; capability and competency; sharing of the same objectives and interests; transparency about actions and intentions through clear communication; and the targeting of services toward the interests of the public. The results of this study can provide guidance on how to enhance implementation mechanisms and provide impetus for organizations to implement trust building activities in fostering effective innovation.

Keywords: trust, research, innovation, technology

Procedia PDF Downloads 455
192 Content Based Instruction: An Interdisciplinary Approach in Promoting English Language Competence

Authors: Sanjeeb Kumar Mohanty

Abstract:

Content Based Instruction (CBI) in English Language Teaching (ELT) basically helps English as Second Language (ESL) learners of English. At the same time, it fosters multidisciplinary style of learning by promoting collaborative learning style. It is an approach to teaching ESL that attempts to combine language with interdisciplinary learning for bettering language proficiency and facilitating content learning. Hence, the basic purpose of CBI is that language should be taught in conjunction with academic subject matter. It helps in establishing the content as well as developing language competency. This study aims at supporting the potential values of interdisciplinary approach in promoting English Language Learning (ELL) by teaching writing skills to a small group of learners and discussing the findings with the teachers from various disciplines in a workshop. The teachers who are oriented, they use the same approach in their classes collaboratively. The inputs from the learners as well as the teachers hopefully raise positive consciousness with regard to the vast benefits that Content Based Instruction can offer in advancing the language competence of the learners.

Keywords: content based instruction, interdisciplinary approach, writing skills, collaborative approach

Procedia PDF Downloads 244
191 Barriers to Competitive Tenders in Building Conservation Works

Authors: Yoke-Mui Lim, Yahaya Ahmad

Abstract:

Conservation works in Malaysia that is procured by public organisation usually follow the traditional approach where the works are tendered based on Bills of Quantities (BQ). One of the purposes of tendering is to enable the selection of a competent contractor that offers a competitive price. While competency of the contractors are assessed by their technical knowledge, experience and track records, the assessment of pricing will be dependent on the tender amount. However, the issue currently faced by the conservation works sector is the difficulty in assessing the competitiveness and reasonableness of the tender amount due to the high variance between the tenders amount. Thus, this paper discusses the factors that cause difficulty to the tenderers in pricing competitively in a bidding exercise for conservation tenders. Data on tendering is collected from interviews with conservation works contractors to gain in-depth understanding of the barriers faced in pricing tenders of conservation works. Findings from the study lent support to the contention that the variance of tender amount is very high amongst tenderers. The factors identified in the survey are the format of BQ, hidden works, experience and labour and material costs.

Keywords: building conservation, Malaysia, bill of quantities, tender

Procedia PDF Downloads 345
190 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 128
189 Literature Review: Adversarial Machine Learning Defense in Malware Detection

Authors: Leidy M. Aldana, Jorge E. Camargo

Abstract:

Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.

Keywords: Malware, adversarial, machine learning, defense, attack

Procedia PDF Downloads 28
188 Monitoring System for Electronic Procurement Systems

Authors: Abdulah Fajar

Abstract:

Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP.

Keywords: procurement system, SNMP, LKPP, LPSE

Procedia PDF Downloads 383
187 Effects of Directivity and Fling Step on Buildings Equipped with J-Hook Sandwich Composite Walls and Reinforced Concrete Shear Walls

Authors: Majid Saaly, Shahriar Tavousi Tafreshi, Mehdi Nazari Afshar

Abstract:

The structural systems with the sandwich composite wall (SCSSC) are of very popular due to their ductileness and competency to swallow more energy and power than standard reinforced concrete shear walls. The purpose of this enhanced system is in high-rise building, Nuclear power plant facilities, and bridge slabs are much more. SCSSCs showed acceptable seismic performance under experimental tests and cyclic loading from the points of view of in-plane and out-of-plane shear and flexural interaction, in-plane punching shear, and compressive behavior. The use of sandwich composite walls with J-hook connectors has a significant effect on energy dissipation and reduction of dynamic responses of mid-rise and high-rise structural models. By changing the systems of the building from SW to SCWJ, the maximum inter-story drift values of ten- and fifteen-story models are reduced by up to 25% and 35%, respectively.

Keywords: J-Hook sandwich composite walls, fling step, directivity, IDA analyses, fractile curves

Procedia PDF Downloads 114
186 Reading Out of Curiosity: Making Undergraduates Competent in English

Authors: Ruwan Gunawardane

Abstract:

Second language teaching and learning is a complex process in which various factors are identified as having a negative impact on the competency in English among undergraduates of Sri Lanka. One such issue is the lack of intrinsic motivation among them to learn English despite the fact that they all know the importance of English. This study attempted to ascertain how the intrinsic motivation of undergraduates to learn English can be improved through reading out of curiosity. Humans are curious by nature, and cognitive psychology says that curiosity facilitates learning, memory, and motivation. The researcher carried out this study during the closure of universities due to the outbreak of the coronavirus through ‘Online Reading Café’, an online reading programme introduced by himself. He invited 1166 students of the Faculty of Science, University of Ruhuna, to read 50 articles taken from CNN and the BBC and posted at least two to three articles on the LMS of the faculty almost every day over a period of 23 days. The themes of the articles were based on the universe, exploration of planets, scientific experiments, evolution, etc., and the students were encouraged to collect as many words, phrases, and sentence structures as possible while reading and to form meaningful sentences using them. The data obtained through the students’ feedback was qualitatively analyzed. It was found that these undergraduates were interested in reading something out of curiosity, due to which intrinsic motivation is enhanced, and it facilitates competence in L2.

Keywords: English, competence, reading, curiosity

Procedia PDF Downloads 116
185 Application of Natural Language Processing in Education

Authors: Khaled M. Alhawiti

Abstract:

Reading capability is a major segment of language competency. On the other hand, discovering topical writings at a fitting level for outside and second language learners is a test for educators. We address this issue utilizing natural language preparing innovation to survey reading level and streamline content. In the connection of outside and second-language learning, existing measures of reading level are not appropriate to this errand. Related work has demonstrated the profit of utilizing measurable language preparing procedures; we expand these thoughts and incorporate other potential peculiarities to measure intelligibility. In the first piece of this examination, we join characteristics from measurable language models, customary reading level measures and other language preparing apparatuses to deliver a finer technique for recognizing reading level. We examine the execution of human annotators and assess results for our finders concerning human appraisals. A key commitment is that our identifiers are trainable; with preparing and test information from the same space, our finders beat more general reading level instruments (Flesch-Kincaid and Lexile). Trainability will permit execution to be tuned to address the needs of specific gatherings or understudies.

Keywords: natural language processing, trainability, syntactic simplification tools, education

Procedia PDF Downloads 459
184 Efficiency Measurement of Turkish via the Stochastic Frontier Model

Authors: Yeliz Mert Kantar, İsmail Yeni̇lmez, Ibrahim Arik

Abstract:

In this study, the efficiency measurement of the top fifty Turkish Universities has been conducted. The top fifty Turkish Universities are listed by The Scientific and Technological Research Council of Turkey (TÜBITAK) according to the Entrepreneur and Innovative University Index every year. The index is calculated based on four components since 2018. Four components are scientific and technological research competency, intellectual property pool, cooperation and interaction, and economic and social contribution. The four components consist of twenty-three sub-components. The 2021 list announced in January 2022 is discussed in this study. Efficiency analysis have been carried out using the Stochastic Frontier Model. Statistical significance of the sub-components that make up the index with certain weights has been examined in terms of the efficiency measurement calculated through the Stochastic Frontier Model. The relationship between the efficiency ranking estimated based on the Stochastic Frontier Model and the Entrepreneur and Innovative University Index ranking is discussed in detail.

Keywords: efficiency, entrepreneur and innovative universities, turkish universities, stochastic frontier model, tübi̇tak

Procedia PDF Downloads 63
183 Use of Oral Communication Strategies: A Study of Bangladeshi EFL Learners at the Graduate Level

Authors: Afroza Akhter Tina

Abstract:

This paper reports on an investigation into the use of specific types of oral communication strategies, namely ‘topic avoidance’, ‘message abandonment’, ‘code-switching’, ‘paraphrasing’, ‘restructuring’, and ‘stalling’ by Bangladeshi EFL learners at the graduate level. It chiefly considers the frequency of using these strategies as well as the students and teachers attitudes toward such uses. The participants of this study are 66 EFL students and 12 EFL teachers of Jahangirnagar University. Data was collected through questionnaire, oral interview, and classroom observation form. The findings reveal that the EFL students tried to employ all the strategies to various extents due to the language difficulties they encountered in their oral English performance. Among them, the mostly used strategy was ‘stalling’ or the use of fillers, followed by ‘code-switching’. The least used strategies were ‘topic avoidance’, ‘restructuring’, and ‘paraphrasing’. The findings indicate that the use of such strategies was related to the contexts of situation and data-elicitation tasks. It also reveals that the students were not formally trained to use the strategies though the majority of the teachers and students acknowledge them as helpful in communication. Finally the study suggests that an awareness of the nature and functions of these strategies can contribute to the overall improvement of the learners’ communicative competence in spoken English.

Keywords: communicative strategies, competency, attitude, frequency

Procedia PDF Downloads 382
182 Impact of Audit Committee on Earning Quality of Listed Consumer Goods Companies in Nigeria

Authors: Usman Yakubu, Muktar Haruna

Abstract:

The paper examines the impact of the audit committee on the earning quality of the listed consumer goods sector in Nigeria. The study used data collected from annual reports and accounts of the 13 sampled companies for the periods 2007 to 2018. Data were analyzed by means of descriptive statistics to provide summary statistics for the variables; also, correlation analysis was carried out using the Pearson correlation technique for the correlation between the dependent and independent variables. Regression was employed using the Generalized Least Square technique since the data has both time series and cross sectional attributes (panel data). It was found out that the audit committee had a positive and significant influence on the earning quality in the listed consumer goods companies in Nigeria. Thus, the study recommends that competency and personal integrity should be the worthwhile attributes to be considered while constituting the committee; this could enhance the quality of accounting information. In addition to that majority of the committee members should be independent directors in order to allow a high level of independency to be exercised.

Keywords: earning quality, corporate governance, audit committee, financial reporting

Procedia PDF Downloads 140
181 The Way Digitized Lectures and Film Presence Coaching Impact Academic Identity: An Expert Facilitated Participatory Action Research Case Study

Authors: Amanda Burrell, Tonia Gary, David Wright, Kumara Ward

Abstract:

This paper explores the concept of academic identity as it relates to the lecture, in particular, the digitized lecture delivered to a camera, in the absence of a student audience. Many academics have the performance aspect of the role thrust upon them with little or no training. For the purpose of this study, we look at the performance of the academic identity and examine tailored film presence coaching for its contributions toward academic identity, specifically in relation to feelings of self-confidence and diminishment of discomfort or stage fright. The case is articulated through the lens of scholar-practitioners, using expert facilitated participatory action research. It demonstrates in our sample of experienced academics, all reported some feelings of uncertainty about presenting lectures to camera prior to coaching. We share how power poses and reframing fear, produced improvements in the ease and competency of all participants. We share exactly how this insight could be adapted for self-coaching by any academic when called to present to a camera and consider the relationship between this and academic identity.

Keywords: academic identity, digitized lecture, embodied learning, performance coaching

Procedia PDF Downloads 312
180 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 58
179 Digital Learning Repositories for Vocational Teaching and Knowledge Sharing

Authors: Prachyanun Nilsook, Panita Wannapiroon

Abstract:

The purpose of this research is to study a Digital Learning Repository System (DLRS) on vocational teachers and teaching in Thailand. The innobpcd.net is a DLRS being utilized by the Office of Vocational Education Commission and operationalized by the Bureau of Personnel Competency Development for vocational education teachers. The aim of the system is to support and enhance the process of vocational teaching and to improve staff development by providing teachers with a variety of network connections and information. The system provides centralized hosting and access to content, and the ability to share digital objects or files, to set permissions and controls for access to content that can be used vocational education teachers for their teaching and for their own development. The elements of DLRS include; Digital learning system, Media Library, Knowledge-based system and Mobile Application. The system aims to link vocational teachers to the most effective emerging technologies available for learning, so they are better resourced to support their vocational students. The initial results from this evaluation indicate that there is a range of services provided by the system being used by vocational teachers and this paper indicates which facilities have the greatest usage and impact on vocational teaching in Thailand.

Keywords: digital learning repositories, vocational education, knowledge sharing, learning objects

Procedia PDF Downloads 439
178 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails

Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith

Abstract:

Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.

Keywords: cybersecurity, human-centric, phishing, psychology

Procedia PDF Downloads 48
177 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 294
176 Benchmarking of Pentesting Tools

Authors: Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

The benchmarking of tools for dynamic analysis of vulnerabilities in web applications is something that is done periodically, because these tools from time to time update their knowledge base and search algorithms, in order to improve their accuracy. Unfortunately, the vast majority of these evaluations are made by software enthusiasts who publish their results on blogs or on non-academic websites and always with the same evaluation methodology. Similarly, academics who have carried out this type of analysis from a scientific approach, the majority, make their analysis within the same methodology as well the empirical authors. This paper is based on the interest of finding answers to questions that many users of this type of tools have been asking over the years, such as, to know if the tool truly test and evaluate every vulnerability that it ensures do, or if the tool, really, deliver a real report of all the vulnerabilities tested and exploited. This kind of questions have also motivated previous work but without real answers. The aim of this paper is to show results that truly answer, at least on the tested tools, all those unanswered questions. All the results have been obtained by changing the common model of benchmarking used for all those previous works.

Keywords: cybersecurity, IDS, security, web scanners, web vulnerabilities

Procedia PDF Downloads 286
175 Teachers' Gender-Counts a Lot: Impact of Teachers’ Gender on Students’ Score Achievement at Primary Level

Authors: Aqleem Fatimah

Abstract:

The purpose of study was to find out the impact of teachers’ gender on students’ score achievement. Focusing on primary level’s teachers & students, a survey research was conducted by using convenient sampling technique. All the students of grade four (1500) and fifty-six teachers (equally divided by gender) from the 50 randomly selected coeducational schools from Lahore were taken as sample. The academic performance was operationalized using a t-test on standardized achievement tests of the students in language, science mathematics and social studies. In addition, all those gender based characteristics of teachers that count a lot in classroom interactions (taking Multi-grade classes, classroom strategies, feedback strategies and evaluation method) that influence students’ achievement were also analyzed by using a questionnaire and an observation schedule. The results of the study showed better academic achievement of students (girl &boy) of female teachers comparatively to the students of male teachers. Therefore, as the female teachers’ number lacks in Pakistan, the study suggests policy makers to seek guidelines to induct more specialized and professionally competent female teachers because their induction will prove highly beneficial for the betterment of students’ score achievement.

Keywords: gender, teacher, competency, score achievement

Procedia PDF Downloads 287
174 Moving Images and Re-Articulations of Self-Identity: Young People's Experiences of Viewing Representations Disability in Films

Authors: Alison Wilde, Stephen Millett

Abstract:

The cultural value of disabled people has largely been overlooked within forms of media and cultural analysis until the 1980s, when disabled people and disability studies highlighted the cultural misrecognition of disabled people and called for improved forms of cultural recognition and representation. Despite an increase in cultural analysis of representations of disabled people, much has been assumed about how images are read, and little work has been done on the value attributed to disabled people by media audiences and the viewing interests and encounters of film audiences. In particular, there has been little work on film reception, or on the way that young people interpret images of disability. We set out to understand some of the ways that young people read disability imagery, by showing small groups of young people different types of film featuring impairments, chosen from three different eras in film. These were Freaks, Rear Window (remake), and Finding Nemo. The discussions after these films allowed them to explore their own experiences of disability alongside the evolution of cultural representations; in so doing they discussed significant themes of cultural value and reflected on their own identities, e.g. in/dependency, autonomy, and competency and the ways these intersected with self-identity, and attitudes to disabled people.

Keywords: film, audience, identity, disability

Procedia PDF Downloads 387
173 Management Competency in Logistical Function: The Skills That Will Master a Logistical Manager

Authors: Fatima Ibnchahid

Abstract:

Competence approach is considered, since the early 80's as one of the major development of HR policies. Many approaches to manage the professional skills were declined. Some processes are mature whereas the others have been abandoned. Competence can be defined as the set of knowledge (theoretical and practical), know-how (experience) and life skills (personality traits) mobilized by a person in the company. The skills must master a logistics manager are divided into two main categories: depending on whether technical skills, or managerial skills and human. The firsts are broken down into skills on logistical techniques and on general skills in business, seconds in social skills (self with others) and personal (with oneself). Logisticians are faced with new challenges and new constraints that are revolutionizing the way to treat the physical movement of goods and operations related to information flows that trigger, they control and guide the physical movements of these major changes, we can mention the development of information technology and communication, the emergence of strong environmental and security constraints. These changes have important effects on the skills needs of the members of the logistical function and sensitive development for training requested by logistical managers to perform better in their job changes. In this article, we will address two main points, first, a brief overview of the management skills and secondly answer the question asked in the title of the article to know what are the skills that will master a logistical manager.

Keywords: skills, competence, management, logistical function

Procedia PDF Downloads 245
172 Communicative Language Teaching in English as a Foreign Language Classrooms: An Overview of Secondary Schools in Bangladesh

Authors: Saifunnahar

Abstract:

As a former English colony, the relationship of Bangladesh with the English language goes a long way back. English is taught as a compulsory subject in Bangladesh from an early age starting from grade 1 and continuing through the 12th, yet, students are not competent enough to communicate in English proficiently. To improve students’ English language competency, the Bangladesh Ministry of Education introduced communicative language teaching (CLT) methods in English classrooms in the 1990s. It has been decades since this effort was taken, but the students’ level of proficiency is still not satisfactory. The main reason behind this failure is that CLT-based teaching-learning methods have not been effectively implemented. Very little research has been conducted to address the issues English as a foreign language (EFL) classrooms are facing to carry out CLT methodologies in secondary schools (grades 6 to 10) in Bangladesh. Though the secondary level is crucial for students’ language learning and retention, EFL classrooms are marked with various issues that make teaching-learning harder for teachers and students. This study provides an overview of the status of CLT in EFL classrooms and the reasons behind failing to implement CLT in secondary schools in Bangladesh through an analysis of the qualitative data collected from different literature. Based on the findings, effective approaches have been recommended to employ CLT in EFL classrooms.

Keywords: Bangladesh, communicative language teaching, English as a foreign language, secondary schools, pedagogy

Procedia PDF Downloads 124
171 Canadian Undergraduate and Graduate Nursing Students: Interest in Education in Medical and Recreational Cannabis for Practice and Career Development

Authors: Margareth S. Zanchetta, Kateryna Metersky, Valerie Tan, Charissa Cordon, Stephanie Lucchese, Yana Siganevich, Prasha Sivasundaram, Truong Binh Nguyen, Imran Qureshi

Abstract:

Due to a new area of practice, Canadian nurses possess knowledge gaps regarding the use of cannabis-based therapies by clients/patients. Education related to medical cannabis (MC) and recreational cannabis (RC) is required to promote nurses’ competency and confidence in supporting clients/patients using MC/RC toward the improvement of health outcomes. A team composed of nursing researchers and undergraduate/graduate students implemented a national survey to explore this theme with the population of undergraduate, graduate (MN and NP), and Post-Diploma (RN Bridging) nursing students enrolled in Canadian Universities Nursing Programs. Upon Research Ethics Board approval, survey recruitment was supported by major nursing stakeholders. The research questions were : (a) Which are the most preferred sources of information on MC/RC for nursing students? (b) Which are the factors and preferred learning modalities that could increase interest in learning about MC/RC, and (c) What are the future career plans among nursing students, and how would they consider the prospective use of cannabis in their practice? The survey was available from Sept. 2022 to Feb. 2023, hosted by a remote platform. An original questionnaire (English-French) was composed of 18 multiple choice questions and 2 open-ended questions. Sociodemographic information and closed-ended responses were compiled as descriptive statistics, while narrative accounts will be analysed through thematic analysis. Respondents (n=153) were from 7 Canadian provinces, national (99%) and international students (1%); the majority of respondents (61%) were in the age range of 21-30 years old. Results indicated that respondents perceive a gap in the undergraduate curriculum on the topics of MC/RC (91%) and that their learning needs include regulations (90%), data on effectiveness (88%), dosing best practices (86%), contraindications (83%), and clinical and medical indications (76%). Respondents reported motivation to learn more about MC/RC through online lectures/videos (65%), e-learning modules or online interactive training (61%), workshops (51%), webinars (36%), and social media (35%). Their primary career-related motivations regarding MC/RC knowledge include enhancing nursing practice (76%), learning about this growing scope of practice (61%), keeping up-to-date responding to scientific curiosity (59%), learning about evidence-based practice (59%), and utilizing alternative forms of medical treatment (37%). Respondents indicated that the integration of topics on cannabis in any course in the undergraduate and/or graduate curriculum would increase their desire to learn about MC/RC as equally as exposure within a clinical setting (75%). The emerging trend in the set of narrative responses (n=130) suggests that respondents believe educational MC/RC content should be integrated into core nursing courses. Respondents also urged educators to be well-informed about evidence-based practice related to MC/RC and to reflect upon stigma and biases surrounding its use. Future knowledge dissemination and translation activities include scholarly products and presentations to stimulate discussion amongst nursing faculty and students, as well as nurses in clinical settings. The goal is to mobilise talents and build collaboration for the development of a socially responsive curriculum on MC/RC competency to address the education-related expectations of all these social actors.

Keywords: Canada, medical cannabis, nursing education, nursing graduate student, nursing undergraduate student, online survey, recreational cannabis

Procedia PDF Downloads 60
170 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique

Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam

Abstract:

With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.

Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services

Procedia PDF Downloads 83
169 The Causes and Recommended Solutions of Burnout in Teaching Careers from the Perspective of University Professors

Authors: Narjes Tahmasbi

Abstract:

Burnout is considered a work-related syndrome made from a person’s recognition of a gap between expecting success in professional performance and less satisfying reality. Teaching, as one of the most stressful jobs in the world, creates a sense of burnout that disturbs the competency of teachers’ personal and professional features, and it can be dangerous for themselves as well as their students. Recently, there has been growing research on the different effects of burnout; however, it is necessary to investigate the causes of this issue, especially in universities. This study aims to investigate the causes and recommended solutions to burnout in the teaching careers of university professors. The participants of the study were 5 EFL university professors from an institution of higher education in Shiraz, Iran. The current study used a qualitative design. Data were obtained from an interview with all participants. The participants were asked to answer 8 questions that were made through a semi-instructional interview. The results of the interview with the participants indicated that there were 4 main reasons that cause burnout in teachers: lack of student motivation, environmental factors, interpersonal problems, and financial problems. Recommended solutions were different according to the different personalities, creativity, and experiences of participants. The discussion of each of the causes of burnout represents how these categories cause burnout, and the discussion of each of the solutions shows how a teacher can handle burnout.

Keywords: burnout, EFL teachers, reasons, solutions, work-related syndrome

Procedia PDF Downloads 49
168 The Impact of Information and Communication Technologies on Teaching Performance at an Iranian University

Authors: Yusef Hedjazi, Saeedeh Nazari Nooghabi

Abstract:

New information and communication technologies (ICT) as one of the main needs of Faculty members in the process of teaching and learning has used in Irans higher education system since 2000.The main purpose of this study is to investigate the role of information and communication technologies (ICT) in teaching performance of Agricultural and Natural Resources Faculties at University of Tehran. The statistical population of the study consisted of all 250 faculties in Agriculture and Natural Resources Colleges and a questionnaire was used to collect data. The reliability of the questionnaire was confirmed by computing of Cronbachs Alpha coefficient at greater than .72. The study showed a significant relationship between agricultural Faculty members teaching performance and competency in using ICT. The results of the regression analysis also explained 51.7% of the variance, teaching performance. The six independent variables that accounted for the explained variance were experience in using educational websites or software, use of educational multimedia (e.g. film and CD, etc), making a presentation using PowerPoint, familiarity with online education websites, using News group to discuss on educational subjects with colleagues and students, and using Electronic communication (messengers) to solve studentsproblems.

Keywords: information and communication technologies, agricultural and natural resources, faculties, teaching performance

Procedia PDF Downloads 300
167 A Genetic Algorithm Based Ensemble Method with Pairwise Consensus Score on Malware Cacophonous Labels

Authors: Shih-Yu Wang, Shun-Wen Hsiao

Abstract:

In the field of cybersecurity, there exists many vendors giving malware samples classified results, namely naming after the label that contains some important information which is also called AV label. Lots of researchers relay on AV labels for research. Unfortunately, AV labels are too cluttered. They do not have a fixed format and fixed naming rules because the naming results were based on each classifiers' viewpoints. A way to fix the problem is taking a majority vote. However, voting can sometimes create problems of bias. Thus, we create a novel ensemble approach which does not rely on the cacophonous naming result but depend on group identification to aggregate everyone's opinion. To achieve this purpose, we develop an scoring system called Pairwise Consensus Score (PCS) to calculate result similarity. The entire method architecture combine Genetic Algorithm and PCS to find maximum consensus in the group. Experimental results revealed that our method outperformed the majority voting by 10% in term of the score.

Keywords: genetic algorithm, ensemble learning, malware family, malware labeling, AV labels

Procedia PDF Downloads 59