Search results for: cybersecurity policy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3800

Search results for: cybersecurity policy

3740 Governance Question and the Participatory Policy Making: Making the Process Functional in Nigeria

Authors: Albert T. Akume, P. D. Dahida

Abstract:

This paper examines the effect of various epochs of governments on policy making in Nigeria. The character of governance and public policy making of both epochs was exclusive, non-participatory and self-centric. As a consequence the interests of citizenry were not represented, neither protected nor sought to meet fairly the needs of all groups. The introduction of the post-1999 democratic government demand that the hitherto skewed pattern of policy making cease to be a character of governance. Hence, the need for citizen participation in the policy making process. The question then is what mode is most appropriate to engender public participation so as to make the policy making process functional? Given the prevailing social, economic and political dilemmas the utilization of the direct mode of citizen participation to affect policy outcome is doubtful if not unattainable. It is due to these predicament that this paper uses the documentary research design argues for the utilization of the indirect mode of citizen participation in the policy making process so as to affect public policy outcome appropriately and with less cost, acrimony and delays.

Keywords: governance, public policy, participation, representation, civil society

Procedia PDF Downloads 346
3739 Globalization and Public Policy Analysis: A Case Study of Foreign Policy of ASEAN Member States

Authors: Nattapol Pourprasert

Abstract:

This study has an objective to analyze foreign policy of member states in globalization current, aiming to answer that the foreign policy of member states have been changed or remained the same and there are any factors affecting changing of foreign policy of the member states. From the study results, it is found that the foreign policy of Thailand is a friendly foreign policy with all states. The policy of Indonesia is more opened because of a change in leader, allowing more democratic development in the country; the government has proceeded with friendly foreign policy with the states in order to bring funds into the state. The foreign policy of Malaysia is not much changed as there is no changing in the leader; the policy of Malaysia has reconciled relations with main city of Indian and Chinese residing in the country in order to bring investments into the country and to relieve tensions in the country. The foreign policy of the Philippines has proceeded with policy under the ASEAN framework and emphasized on international Islam communities. The foreign policy of Singapore has the least changed as the Singapore's policy focuses on internal trade since the state was found. As for the foreign policy of Brunei Darussalam, Brunei has a little role in the international stage; the state having closest relationship as from the view of history is Singapore as the Singaporean has invested in retailing business in Brunei. The foreign policy of Vietnam has emphasized on an omnidirectional foreign policy in order to compete with several states in global stage. The foreign policy of Myanmar has proceeded with a friendly foreign policy with all ASEAN member states, the East-west Corridor transportation line from Myanmar through Thailand and Lao to Vietnam has been developed. As for the foreign policy of Lao, In 2001, the Thai government and Lao government held a discussion which Thailand reaffirmed the position not to support the anti-Lao group. The foreign policy of Cambodia has proceeded with more openness, having good relation with China, Russia and USA as these states has invested in the state, especially the US company.

Keywords: globalization, public policy analysis, foreign policy, ASEAN member states

Procedia PDF Downloads 492
3738 The Appropriation of Education Policy on Information and Communication Technology in South African Schools

Authors: T. Vandeyar

Abstract:

The purpose of this study is to explore how Government policy on ICT influences teaching and learning in South African schools. An instrumental case study using backward mapping principles as a strategy of inquiry was used. Utilizing a social constructivist lens and guided by a theoretical framework of a sociocultural approach to policy analysis, this exploratory qualitative research study set out to investigate how teachers appropriate government policy on ICT in South African schools. Three major findings emanated from this study. First, although teachers were ignorant of the national e-education policy their professionalism and agency were key in formulating and implementing an e-education policy in practice. Second, teachers repositioned themselves not as recipients or reactors of the e-education policy but as social and cultural actors of policy appropriation and formulation. Third, the lack of systemic support to teachers catalyzed improved school and teacher collaborations, teachers became drivers of ICT integration through collaboration, innovation, institutional practice and institutional leadership.

Keywords: ICT, teachers as change agents, practice as policy, teacher's beliefs, teacher's attitudes

Procedia PDF Downloads 449
3737 Public and Private Domains: Contradictions and Covenants in Evolution of Game Policy

Authors: Mingzhu Lyu, Runlei Ren, Xinyu Dai, Jiaxuan Pi, Kanghua Li

Abstract:

The study of video game policy in China has been divided into two branches: "pedagogy" and "game industry". The binary perspective of policy reveals the "contradictory" side of policy performance. Based on this suspicion, this paper constructs a three-dimensional sequence of time, content and institutions of game policy, and establishes the "contradictory" aspects of policy performance between 1949 and 2019. A central-level database of game policies, clarifying that our game policies follow a shift from reactive response to proactive guidance, stigmatization and de-stigmatization, the evolutionary logic. The study found that the central government has always maintained a strict requirement and prudent guidance for game policy, and the deep contradictions in game policy stem from the essential conflict between the natural amusement of games and the seriousness of the educational system, and the Chinese government's use of the understanding of the public and private domains and the Managing of the conflict.

Keywords: game industry, gaming policy, public domain, private domain

Procedia PDF Downloads 119
3736 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 51
3735 Critical Literature Survey of the Macroeconomic Effects of Fiscal Policy in Light of Recent Empirical Evidence

Authors: Walaa W. Diab

Abstract:

The present paper offers a fundamental critique of the macroeconomic effects of fiscal policy after it surveys the theoretical and empirical literature on the macroeconomic effects of fiscal policy. It emphasizes the importance of the fiscal policy after reviewing the revolution of almost all economic schools and bringing them in one summarized figure; the paper links the developmental role of the fiscal policy with the objectives and measures of the economic transformation. Thus, the importance of this study can be seen from several perspectives: First, it reviews the theoretical harvest of fiscal policy and provides a comparison between the main revolutionary Economic thoughts; the classical school, Keynesian school, and monetarist school. Then it turns to conclude the fiscal policy from the new consensus mainstream economic schools. Finally, the study presents grouped and classified empirical pieces of evidence as it divides those empirical studies into two groups; the first for developed economies and the second for developing ones. So the study is important also for the policymakers as well as scholars as it gives its recommendations upon the last analysis in the form of ‘policy implications’. The paper also presents a deeper look into the evaluation approaches of the macroeconomic effects of fiscal policy at the empirical level. Thus it is useful for both researchers and decision makers.

Keywords: economic transformation, fiscal policy, macroeconomic effects, public spending

Procedia PDF Downloads 272
3734 Beijing Xicheng District Housing Price Econometric Analysis: “Multi-School Zoning”Policy

Authors: Haoxue Cui, Sirui Zhang, Shanshan Gao, Weiyi Zhang, Lantian Wang, Xuanwen Zheng

Abstract:

The 2020 "multi-school zoning" policy makes students ineligible for direct attendance in their district. To study whether the housing price trend of the school district is affected by the policy, This paper studies housing prices based on the school district division in Xicheng District, Beijing. In this paper, we collected housing prices and the basic situation of communities from "Anjuke", which were divided into two periods of 15 months before and after the 731 policy in the Xicheng District, Beijing. Then we used DID model and time fixed effect to investigate the DIFFERENTIAL statistics, that is, the overall net impact of the policy. The results show that the coefficient is negative at a certain statistical level. It indicates that the housing prices of school districts in the Xicheng district decreased after the "multi-school zoning" policy, which shows that the policy has effectively reduced the housing price of school districts in the Xicheng District and laid a foundation for the "double reduction" policy in 2022.

Keywords: “multi-school zoning”policy, DID, time fixed effect, housing prices

Procedia PDF Downloads 115
3733 Semantic Analysis of the Change in Awareness of Korean College Admission Policy

Authors: Sujin Hwang, Hyerang Park, Hyunchul Kim

Abstract:

The purpose of this study is to find the effectiveness of the admission simplification policy. The number of online news articles about ‘high school record’ was collected and semantically analyzed to identify and analyze the social awareness during 2014 to 2015. The main results of the study are as follows: First, there was a difference in expectations that the burden of the examinees would decrease as announced by KCUE. Thus, there was still a strain on the university entrance exam after the enforcement of the policy. Second, private tutoring is expanding in different forms, rather than reducing the policy. It is different from the prediction that examinees can prepare for university admissions without the private tutoring. Thus, the college admission rules currently enforced needs to be improved. The reasonable college admission system changes are discussed.

Keywords: education policy, private tutoring, shadow education, education admission policy

Procedia PDF Downloads 197
3732 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware

Authors: Azita Ramezani, Atousa Ramezani

Abstract:

In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.

Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection

Procedia PDF Downloads 37
3731 Economic Analysis of Policy Instruments for Energy Efficiency

Authors: Etidel Labidi

Abstract:

Energy efficiency improvement is one of the means to reduce energy consumption and carbon emissions. Recently, some developed countries have implemented the tradable white certificate scheme (TWC) as a new policy instrument based on market approach to support energy efficiency improvements. The major focus of this paper is to compare the White Certificates (TWC) scheme as an innovative policy instrument for energy efficiency improvement to other policy instruments: energy taxes and regulations setting a minimum level of energy efficiency. On the basis of our theoretical discussion and numerical simulation, we show that the white certificates system is the most interesting policy instrument for saving energy because it generates the most important level of energy savings and the least increase in energy service price.

Keywords: energy savings, energy efficiency, energy policy, white certificates

Procedia PDF Downloads 305
3730 Asymmetries in Monetary Policy Response: The Role of Uncertainty in the Case of Nigeria

Authors: Elias Udeaja, Elijah Udoh

Abstract:

Exploring an extended SVAR model (SVAR-X), we use the case of Nigeria to hypothesize for the role of uncertainty as the underlying source of asymmetries in the response of monetary policy to output and inflation. Deciphered the empirical finding is the potential of monetary policy exhibiting greater sensitive to shocks due to output growth than they do to shocks due to inflation in recession periods, while the reverse appears to be the case for a contractionary monetary policy. We also find the asymmetric preference in the response of monetary policy to changes in output and inflation as relatively more pronounced when we control for uncertainty as the underlying source of asymmetries.

Keywords: asymmetry response, developing economies, monetary policy shocks, uncertainty

Procedia PDF Downloads 121
3729 Functions of Public Policy in Private International Law

Authors: Fedorova Elena

Abstract:

In this article, we draw a distinction between two important functions of public policy in private international law. The first function is widely recognized and relates to the prevention of application of foreign laws and enforcement of foreign court judgments whenever their effects are incompatible with the domestic legal system of the forum. This effectively protects sovereign rights of the forum state as it allows to resist against the undesirable effects of foreign law-making and law-enforcement policies. The second function is less obvious, but not less important. As the internal private legal relationships, international private relationships are usually governed by rules of public policy, to which the parties can not derogate by mutual agreement. Thefore, for international private law relations public policy has a different function than previously mentioned: in this case, the public policy acts as a defense against unacceptable effects of the party autonomy. Thus, this second function of public policy consists in the limitation of the party autonomy wich effects would be unacceptable for the local legal system. In the frame of this second function the author will analyse two types of public policy which can limit the party autonomy: « substantial » public policy (which regulates the substance of international legal relationship) and « conflictual » public policy (which regulates the party autonomy to choose the law applicable for the substance of relationship). The author provides an analysis of these functions of the public policy in the field of international contract law because of the important role of the principle of party autonomy for international contract relations.

Keywords: public policy, general theory of private international law, substantial public policy, conflictual public policy

Procedia PDF Downloads 547
3728 Brazilian Environmental Public Policies Analysis

Authors: Estela Macedo Alves

Abstract:

This paper is an overview on public policy analysis focused on the study of Brazilian public policy making process. The methodology is based on the review of some theories on the subject, linking them to Brazilian reality. The study presents basic policy analysis concepts, such as policy, polity and politics. It is emphasized John Kingdon's Multiple Stream Model, because of its clarifying aspects concerning public policies formulation process in democratic countries. In this path it was possible to establish interpretations on environmental public policies in Brazil and understand its methods, instead of presenting only a case study. At the end, it is possible to connect theory with Brazilian reality, identifying negative and positive points of its political processes and structure.

Keywords: Brazilian policies, environmental public policy, multiple stream model, public policy analysis

Procedia PDF Downloads 359
3727 An Exposition of Principles of Islamic Fiscal Policy

Authors: Muhammad A. Ishaq, S. U. R. Aliyu

Abstract:

This paper on an exposition of Islamic fiscal policy attempts to discuss the basic principles of Islamic fiscal policy in an Islamic economy. The paper presents a number of definitions of the subject matter, its nature and its tools of application. Government spending, taxation and public borrowings were identified as the tools of the policy. The paper identifies zakat both as a veritable source of revenue and a major instrument of economic stabilization. Furthermore, the paper presents an algebraic 2-sector and 3-sector models from the basic Keynesian model. The paper posits that in view of uniqueness of its instruments, absence of interest rate in the economy and the policy’s derive towards socioeconomic justice and redistribution, Islamic fiscal policy is capable of stabilizing Islamic economy and ushering it into the path of long term economic growth and prosperity.

Keywords: automatic built-in-stabilizers, government spending, Islamic fiscal policy, taxation, zakat

Procedia PDF Downloads 301
3726 Nigerian Foreign Policy: A Dancing Tune of the Western Powers

Authors: Nura Suleiman

Abstract:

The foreign policy of any country or nation is intended to promote and protect the country’s national interest. To achieve this interest, a country has to be guided by certain principles and influence of domestic and international conditions. The history of Nigerian foreign policy is directed to defend its sovereignty, independence, and territorial integrity, to promote and sustain the economic well-being of Nigerians, and promotion of Africa and world peace with justice. With the change of time and leadership, coupled with corruption, despite all the foreign policy determinants endowed with Nigeria as a country, sacrificed its foreign interest for the benefit of the western powers, by this it lost the opportunity to formulate policies according to its own need and desires.

Keywords: foreign policy, Nigeria, Western power

Procedia PDF Downloads 465
3725 Revisiting the Fiscal Theory of Sovereign Risk from the DSGE View

Authors: Eiji Okano, Kazuyuki Inagaki

Abstract:

We revisit Uribe's `Fiscal Theory of Sovereign Risk' advocating that there is a trade-off between stabilizing inflation and suppressing default. We develop a class of dynamic stochastic general equilibrium (DSGE) model with nominal rigidities and compare two de facto inflation stabilization policies, optimal monetary policy and optimal monetary and fiscal policy with the minimizing interest rate spread policy which completely suppress the default. Under the optimal monetary and fiscal policy, not only the nominal interest rate but also the tax rate work to minimize welfare costs through stabilizing inflation. Under the optimal monetary both inflation and output gap are completely stabilized although those are fluctuating under the optimal monetary policy. In addition, volatility in the default rate under the optimal monetary policy is considerably lower than one under the optimal monetary policy. Thus, there is not the SI-SD trade-off. In addition, while the minimizing interest rate spread policy makes inflation rate severely volatile, the optimal monetary and fiscal policy stabilize both the inflation and the default. A trade-off between stabilizing inflation and suppressing default is not so severe what pointed out by Uribe.

Keywords: sovereign risk, optimal monetary policy, fiscal theory of the price level, DSGE

Procedia PDF Downloads 293
3724 Rigorous Literature Review: Open Science Policy

Authors: E. T. Svahn

Abstract:

This article documents how open science policy is perceived in the scientific literature globally throughout the history. It also presents what policy needs are persistent to enable safe and effective dissemination of scientific knowledge. This information may be of interest to open science and science policy makers globally, especially in the view of recent adoption of supranational open science policies such as Plan S. Evaluation of open science policy landscape is in pressing need of assessment regarding its impact on the research community and society at wide as no previous literature review has been conducted on the topic. This study is a rigorous literature review based on constructivist grounded theory method on the full body of scientific open science policy publications. Selection of these articles has been conducted in 2019 and 2020 in major global knowledge databases. Through the analysis of these articles, two key themes emerged that are seen to shape the relationship between science and society. 1st is that of the policy enabling open science in a safe and effective way, and 2nd is that of the outcome of the science policy may have on the research community and the wider society. These findings accentuate that open science policies can have a major impact on not only research process and availability of knowledge but also on society itself. As an outcome of this study, a theoretical framework is constructed, and the need for further study on open science policy itself on a higher level becomes apparent.

Keywords: constructivist grounded theory, open science policy, rigorous literature review, science policy

Procedia PDF Downloads 116
3723 The Influence of Theories and Approaches to Educational Policy and Planning in Ghana’s Current Educational Developments

Authors: Ruth Donkoh, Wing On Lee, Solomon A. Boateng, Portia Oware Twerefoo, Josephine Donkor

Abstract:

In this paper we defend the value of theories and approaches to educational policy and planning in enhancing the educational developments in Ghana. This mission is achieved by enumerating the recent educational developments in Ghana and juxtaposing it with some educational theories, approaches to policy making, and policy planning to see if the educational developments conform with the theory principles as well as policy making and planning processes. Data collection for the research was made through textual analysis of policy documents as well as review of relevant literatures. The findings reveled that educational developments in Ghana are unable to attain its objectives due to the policies not conforming with the policy formation and planning principles. In addition, was that education planning in Ghana does not follow the policy-administration dichotomy theory principles and likewise the distribution of educational needs goes contrary to the equity theory. We recommend that educational policies in Ghana should be in conformity with the principles of theories as well as the approaches to educational policy making and planning to help meet the needs of learners, attain educational quality, and to help in the accomplishment of educational development objectives.

Keywords: Ghana education, equity theories, politics- administration dichotomy theory, educational policies, educational planning

Procedia PDF Downloads 118
3722 Involvement in Health Policy and Political Efficacy among Hospital Nurses in Jordan: A Descriptive Survey

Authors: Raeda F. Abualrub, Amani Abdulnabi

Abstract:

Aim: The aims of this study were to (a) examine the levels of nurses' political efficacy and involvement in health policy; and (b) explore the relationships between political efficacy, involvement in health policy, and participants’ background variables. Background: Nurses as citizens and health care providers have the right to express their opinions and beliefs in regard to issues that are concerned with the health care system or the public health domain. Methods: A descriptive, cross-sectional design using was utilized. A self-administered questionnaire (Political Efficacy Scale & Involvement in Health Policy Scale) was completed by a convenience sample of 302 nurses. Results: The results of this study showed low levels of involvement in health policy and political efficacy and a positive weak correlation between political efficacy and involvement in health policy. The perceived level of political efficacy was associated positively with nurses’ age and experience. Conclusions: Nurse administrators and managers may empower, support, and encourage nurses to enhance their involvement in health policy. Implications for Nursing Management: The findings have implications for nursing leaders and administrators to design appropriate strategies to enhance nurses’ involvement in health policy development.

Keywords: health policy, Jordan, nurses, political efficacy

Procedia PDF Downloads 64
3721 The Development of Fiscal Policy in Light of Economic Systems

Authors: Djehich Mohamed Yousri

Abstract:

This research tries to highlight the different stages and developments of financial policy which has evolved significantly in its means and mechanism, goals as well, according to the successful developments of the society, in addition to that, the role of the country has been developed from custody to intervening country, that evolution does not impact only on financial science but it was reflected on financial system concepts, that helped fr transport it from neutral financial policy to intervening policy, since each stage was characterized by a set of characteristics, financial policy considers like reflective mirror to the role of state in all times, when the state has been absent as an organized authority to society, the role of financial policy was weakened and has been limited under the impact of ideology which exists at all time, financial role has was limited until the state intervened in all aspects of life, the state role is also influential in economic, social, and political life, this study highlighting the most important developments of financial policy under successful economic systems.

Keywords: public expenditure, government spending, taxes, revenues public, economics

Procedia PDF Downloads 91
3720 Review of Research on Effectiveness Evaluation of Technology Innovation Policy

Authors: Xue Wang, Li-Wei Fan

Abstract:

The technology innovation has become the driving force of social and economic development and transformation. The guidance and support of public policies is an important condition to promote the realization of technology innovation goals. Policy effectiveness evaluation is instructive in policy learning and adjustment. This paper reviews existing studies and systematically evaluates the effectiveness of policy-driven technological innovation. We used 167 articles from WOS and CNKI databases as samples to clarify the measurement of technological innovation indicators and analyze the classification and application of policy evaluation methods. In general, technology innovation input and technological output are the two main aspects of technological innovation index design, among which technological patents are the focus of research, the number of patents reflects the scale of technological innovation, and the quality of patents reflects the value of innovation from multiple aspects. As for policy evaluation methods, statistical analysis methods are applied to the formulation, selection and evaluation of the after-effect of policies to analyze the effect of policy implementation qualitatively and quantitatively. The bibliometric methods are mainly based on the public policy texts, discriminating the inter-government relationship and the multi-dimensional value of the policy. Decision analysis focuses on the establishment and measurement of the comprehensive evaluation index system of public policy. The economic analysis methods focus on the performance and output of technological innovation to test the policy effect. Finally, this paper puts forward the prospect of the future research direction.

Keywords: technology innovation, index, policy effectiveness, evaluation of policy, bibliometric analysis

Procedia PDF Downloads 40
3719 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 184
3718 The Challenges of Decentralised Education Policy for Teachers in Indonesian Contexts

Authors: Ahmad Ardillah Rahman

Abstract:

The decentralisation policy in education has been a trend in some countries in the last two decades. In Indonesia, the implementation of the policy has been introduced since 2003 with the occurrence of School-Based Management policy. The reform has affected the way principals and teachers should involve in school practices in which more autonomies and flexibilities are given to teachers in conducting their teaching practices. Almost 13 years since the policy was firstly introduced, the government and teachers in Indonesia still face some obstacles in maximising the potential benefits of the implementation of the decentralised education system. This study, thus, critically analyses the challenges of decentralised education policy for teachers in Indonesian education context. The purposes of this study are threefold. Firstly, it will explore the history of policy transformation from a centralised to a decentralised education policy. Secondly, it points out the advantages of the decentralised policy implementation. The last, it provides a comprehensive description of challenges faced by Indonesian teachers with the new roles in designing and implementing a curriculum. By using data from existing surveys and research, this study concludes that to successfully implement the transformation in the educational reform of Indonesia, continual and gradual teachers’ training, professional career pathway, and local monitoring for teachers should be developed and strengthened.

Keywords: curriculum design, decentralisation, school-based management, teachers’ autonomy

Procedia PDF Downloads 292
3717 Actually Existing Policy Mobilities in Czechia: Comparing Creative and Smart Cities

Authors: Ondrej Slach, Jan Machacek, Jan Zenka, Lucie Hyllova, Petr Rumpel

Abstract:

The aim of the paper is to identify and asses different trajectories of two fashionable urban policies –creative and smart cities– in specific post-socialistic context. Drawing on the case of Czechia, we employ the concept of policy mobility research. More specifically, we employ a discourse analysis in order to identify the so-called 'infrastructure' of both policies (such as principal actors, journals, conferences, events), with the special focus on 'agents of transfer' in a multiscale perspective. The preliminary results indicate faster and more aggressive spatial penetration of smart cities policy compared to creative cities policy in Czechia. Further, it seems that existed translation and implementation of smart cities policy into the national and urban context resulted in deliberated fragmented policy of smart cities in Czechia (pure technocratic view), which might be a threat for the future development of social sustainability, especially in cities that are facing increasing social polarisation. Last but not least, due to the fast spatial penetration of the concept and policies of smart cities, it seems that creative cities policy has almost been crowded out of the Czech urban agenda.

Keywords: policy mobility, smart cities, creative cities, Czechia

Procedia PDF Downloads 128
3716 The Vicissitudes of Monetary Policy Rates and Macro-Economic Variables in the West African Monetary Zone

Authors: Jonathan Olusegun Famoroti, Mathew Ekundayo Rotimi, Mishelle Doorasamy

Abstract:

This study offers an empirical investigation into some selected macroeconomic drivers of the monetary policy rate in member countries of the West African Monetary Zone (WAMZ), considering both internal and external variables. We employed Autoregressive Distributed Lag (ARDL) to carry out the investigation between monetary policy and some macroeconomic variables in both the long-run and short-run relationship. The results suggest that the drivers of the policy rate in this zone, in the long run, include, among others, global oil price, exchange rate, inflation rate, and gross domestic product, while in the short run, federal fund rate, trade openness, exchange rate, inflation rate, and gross domestic product are core determinants of the policy rate. Therefore, in order to ensure long-run stability in the policy rate among the members’ states, these drivers should be given closer consideration so that the trajectory for effective structure can be designed and fused into the economic structure and policy frameworks accordingly.

Keywords: monetary policy rate, macroeconomic variables, WAMZ, ARDL

Procedia PDF Downloads 27
3715 Impacts of E-Learning on Educational Policy: Policy of Sensitization and Training in E-Learning in Saudi Arabia

Authors: Layla Albdr

Abstract:

Saudi Arabia instituted the policy of Sensitizing and Training Stakeholders for E-learning and witnessed wide adoption in many institutions. However, it is at the infancy stage and needs time to develop to mirror the US and UK. The majority of the higher education institutions in Saudi Arabia have adopted E-learning as an alternative to traditional methods to advance education. Conversely, effective implementation of the policy of sensitization and training of stakeholders for E-learning implementation has not been attained because of various challenges. The objectives included determining the challenges and opportunities of the E-learning policy of sensitization and training of stakeholders in Saudi Arabia's higher education and examining if sensitization and training of stakeholder's policy will help promote the implementation of E-learning in institutions. The study employed a descriptive research design based on qualitative analysis. The researcher recruited 295 students and 60 academic staff from four Saudi Arabian universities to participate in the study. An online questionnaire was used to collect the data. The data was then analyzed and reported both quantitatively and qualitatively. The analysis provided an in-depth understanding of the opportunities and challenges of E-learning policy in Saudi Arabian universities. The main challenges identified as internal challenges were the lack of educators’ interest in adopting the policy, and external challenges entailed lack of ICT infrastructure and Internet connectivity. The study recommends encouraging, sensitizing, and training all stakeholders to address these challenges and adopt the policy.

Keywords: e-learning, educational policy, Saudi Arabia, policy of sensitization and training

Procedia PDF Downloads 128
3714 Multi-Stakeholder Engagement in the Food Waste Ecosystem: Opportunities and Policy Initiatives in Nigeria

Authors: Victor Oyewumi Ogunbiyi

Abstract:

Food waste is a global sustainability issue that demands that multiple stakeholders participate in solving it. This article examines how different food system stakeholders are held responsible in the policy debate related to food waste reduction. The study adopts a qualitative approach, paying attention to the views of both public and private policymakers and constructing their views relating to opportunities and policy initiatives towards waste reduction. The data consists of a list of opportunities and food policy initiatives in the development process in Nigeria. The authors identify three emerging opportunities: sectoral growth, technological demands in food service, and sustainable collaborative behaviour. The findings also revealed key policy initiatives for development: law and regulations, multi-stakeholder collaboration, economic incentives, research, and new knowledge. The study extends the marketing literature on food sustainability by investigating several stakeholders’ roles beyond the practical management of the food services sector. Additionally, considering policy initiative development for food waste mitigation sheds light on how stakeholders’ policy initiatives can sustain the food service sector. Finally, the authors outline policy implications.

Keywords: multistakeholder engagement, food services, food waste, policy initiatives, Nigeria

Procedia PDF Downloads 50
3713 An Abductive Approach to Policy Analysis: Policy Analysis as Informed Guessing

Authors: Adrian W. Chew

Abstract:

This paper argues that education policy analysis tends to be steered towards empiricist oriented approaches, which place emphasis on objective and measurable data. However, this paper argues that empiricist oriented approaches are generally based on inductive and/or deductive reasoning, which are unable to generate new ideas/knowledge. This paper will outline the logical structure of induction, deduction, and abduction, and argues that only abduction provides possibilities for the creation of new ideas/knowledge. This paper proposes the neologism of ‘informed guessing’ as a reformulation of abduction, and also as an approach to education policy analysis. On one side, the signifier ‘informed’ encapsulates the idea that abductive policy analysis needs to be informed by descriptive conceptualization theory to be able to make relations and connections between, and within, observed phenomenon and unobservable general structures. On the other side, the signifier ‘guessing’ captures the cyclical and unsystematic process of abduction. This paper will end with a brief example of utilising ‘informed guessing’ for a policy analysis of school choice lotteries in the United States.

Keywords: abductive reasoning, empiricism, informed guessing, policy analysis

Procedia PDF Downloads 324
3712 Review of Electronic Voting as a Panacea for Election Malpractices in Nigerian Political System: Challenges, Benefits, and Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

The Nigerian political system has witnessed rising occurrences of election malpractice in the last decade. This has been due to election rigging and other forms of electoral fraud. In order to find a sustainable solution to this malpractice, the introduction of electronic voting (e-voting) has been suggested. This paper reviews the challenges, benefits, and issues associated with e-voting as a panacea for election malpractice in Nigeria. The review of existing literature revealed that e-voting can reduce the cost of conducting elections and reduce the opportunity for electoral fraud. The review suggests that the introduction of e-voting in the Nigerian political system would require adequate cybersecurity measures, trust-building initiatives, and proper legal frameworks to ensure its successful implementation. It is recommended that there should be an effective policy that would ensure the security of the system as well as the credibility of the results. Furthermore, a comprehensive awareness campaign needs to be conducted to ensure that voters understand the process and are comfortable using the system. In conclusion, e-voting has the potential to reduce the occurrence of election malpractice in the Nigerian political system. However, the successful implementation of e-voting will require effective policy interventions and trust-building initiatives. Additionally, the costs of acquiring the necessary infrastructure and equipment and implementing proper legal frameworks need to be considered.

Keywords: electronic voting, general election, candidate, INEC, cyberattack

Procedia PDF Downloads 56
3711 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 116