Search results for: information security competencies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12802

Search results for: information security competencies

12772 Disaster Nursing Competency of Nurses in Surattani Province, Thailand: A Factor Analysis

Authors: Rungnapa Chantra

Abstract:

As health care rapidly changes, the nursing profession is also evolving to improve quality of care while maintaining competency in their practice. The purpose of this study was to investigate the factors of disaster nurse competencies and investigate the predictable variables in disaster nurse competencies in Suratthani Province, Thailand. The sample consisted of 305 nurses who were recruited by simple random sampling. The development questionnaires from ICN Framework and research contains Pre/Mitigation, Preparedness, Response and Recovery/Rehabilitation Competencies (α=0.87). The data were analyzed using Principle Components Extraction and Orthogonal Rotation with Varimax Method. The findings were as follows; four significant factors of disaster nurse competencies in Suratthani Province, Thailand were identified. These factors were described by 62 variables that accounted for 50.01% of the total variance. The results of this study could be for agencies that are responsible for the development of nursing competencies and should be aware of the development of knowledge and skills in disaster management.

Keywords: disaster nursing competency of nurses, nursing informatics, health science, medical

Procedia PDF Downloads 329
12771 Important Management Competencies: University of Technology Perspective

Authors: Courtley Pharaoh, D. J. Visser

Abstract:

University management is often caught between competing interests from stakeholders like students, trustees, donors, government and the community it serves. This study aimed to identify what management competencies are required by executive management members of universities of technology to effectively manage a university of technology in South Africa from the perspective of the executive management members. This exploratory study will make use of a qualitative methodology to establish what management competencies are deemed as important to manage a university of technology in South Africa from the executive management perspective. Due to the consequences of the COVID-19 Pandemic, the study made use of online face-to-face interviews to ascertain from executive management members of universities of technology what the required management competencies needed by executive management members of universities of technology to effectively manage a University of Technology in South Africa. Qualitative Content Analysis was used to analyse the data collected. The findings of the study identified a total of 26 management competencies which were categorised into three groupings or themes. This study identified a list of required management competencies needed by executive management members of universities of technology to effectively manage a university of technology in South Africa, as per the lived experience of executive management members. The researcher recommends further studies at traditional and comprehensive universities and compares the results of those future studies with the results of this study. A comprehensive list of management competencies could then be identified, which could assist with the compilation of job descriptions of executive management members of universities in South Africa.

Keywords: university of technology, management competencies, executive management, executive management members, important

Procedia PDF Downloads 60
12770 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 272
12769 Teaching Professional Competences through Projects: Experiencing Curriculum Development through Active Learning

Authors: Flavio Campos, Patricia Masmo, Fernanda Yamamoto

Abstract:

The report presents a research about teaching professional competencies through projects, considering the student as an active learner and curriculum development. Considering project based-learning, the report articulate the result of research about curriculum development for professional competencies and teaching-learning strategies to help the development of professional competencies in learning environments in the courses of National Learning Service in São Paulo, Brazil. There so, intend to demonstrate fundamentals to elaborate curriculum to learning environment, specific about teaching methodologies to enrich student-learning process, using projects. The practice that has been taking place since 2013 indicates the needs of rethinking knowledge and practice in courses that prepared students to labor.

Keywords: curriculum design, active learning, professional competencies, project based-learning

Procedia PDF Downloads 393
12768 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment

Authors: Ritsuko Kawasaki, Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 349
12767 Exploring Manufacturing Competency and Strategic Success: A Review

Authors: Chandan Deep Singh, Jaimal Singh Khamba, Harleen Kaur

Abstract:

Eminence, charge, deliverance, modernism, and awareness underlie most manufacturing strategic plan today. Firms have traditionally pursued the above tasks through the implementation of advanced technologies and manufacturing practices, such as Reverse Engineering, Value Engineering, worker empowerment, etc. Recent developments in industry suggest the materialization of another route to manufacturing brilliance, that is, there is an increasing focus by industry regulators and professional bodies on the need to stimulate innovation in a broad range of manufacturing competencies. By ‘competencies’ we mean the methods, equipment and expertise that can be developed as a leading capability in one market sector or application and have real potential to be applied successfully across other sectors or applications as well. Further, competencies are the ability to apply or use a set of related knowledge, skills, and abilities to perform 'critical work functions' or tasks in a defined work setting. Competencies often serve as the basis for skill standards that specify the level of knowledge, skills, and abilities required for success in the workplace as well as potential measurement criteria for assessing competency attainment. The present research is so designed to come up to the level of the expectations of the industrialists, policy makers, designers of the competencies, specially, the manufacturing competencies upon which the whole strategic success of the industry depends.

Keywords: manufacturing competency, strategic success, manufacturing excellence, competitive strategy

Procedia PDF Downloads 545
12766 Motivational Interviewing as a Framework for Coaching Physicians through ACGME Milestones

Authors: Michael Olson

Abstract:

The Accreditation Council for Graduate Medical Education (ACGME) in the U.S. has established core competencies and milestones for family physicians in residency training programs. These competencies are intended to guide preceptors as they work with physician trainees toward independent practice. This conceptual paper describes a framework for coaching trainees toward these milestones using motivational interviewing as an evidence-based approach. The main objective of applying the motivational interviewing framework to the residency training setting is to facilitate clinical behavior change that meets higher level competencies/rubric. This is a work in progress and there is no manuscript/paper prepared to date. A conceptual paper/framework will be completed by the conference deadline. This is based on a separate but related development of work we have completed and published elsewhere.

Keywords: coaching, motivational interviewing, physicians, competencies

Procedia PDF Downloads 149
12765 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 28
12764 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 53
12763 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 376
12762 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 470
12761 Intelligent Recognition Tools for Industrial Automation

Authors: Amin Nazerzadeh, Afsaneh Nouri Houshyar , Azadeh Noori Hoshyar

Abstract:

With the rapid growing of information technology, the industry and manufacturing systems are becoming more automated. Therefore, achieving the highly accurate automatic systems with reliable security is becoming more critical. Biometrics that refers to identifying individual based on physiological or behavioral traits are unique identifiers provide high reliability and security in different industrial systems. As biometric cannot easily be transferred between individuals or copied, it has been receiving extensive attention. Due to the importance of security applications, this paper provides an overview on biometrics and discuss about background, types and applications of biometric as an effective tool for the industrial applications.

Keywords: Industial and manufacturing applications, intelligence and security, information technology, recognition; security technology; biometrics

Procedia PDF Downloads 126
12760 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 95
12759 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 55
12758 Impact of Pan Pacific's Training Program to Hotel and Restaurant Management (HRM) Practicum Trainees

Authors: Bandojo Paula Maria Noella, Bernardo Bea Samantha B., Del Rosario Hanassa Mae S., Gomez Marian Louise D., Gomez Rome Voltaire M., Reyes Alessa Anne Therese A.

Abstract:

The purpose of this study is to determine if there is a significant difference between the training program of Pan Pacific Hotel to other Five Star Hotels in terms of the technical, professional and personal competencies before and after their training. The theoretical framework of this study is the practicum manual of the University of Santo Tomas College of Tourism and Hospitality Management, Hotel and Restaurant Management Program Practicum Manual. This study was conducted using survey questionnaires that were distributed to 50 respondents. The results showed that there is a significant difference with the level of competencies of the practicum trainee before and after the training regardless if the training is structured or unstructured. Results also showed that the structured training program of Pan Pacific Hotel significantly improved the Technical Competencies in the different departments of the hotel industry. On the other hand, the findings also showed that there is no difference between the structured and unstructured training program in terms of Professional Competencies and Personal Competencies. The proponents concluded the study by providing recommendations to the partner hotels of the University of Santo Tomas College of Tourism and Hospitality Management that there should be a structured training program for the practicum trainees.

Keywords: structured and structured training program, practicum trainees, competencies, tourism

Procedia PDF Downloads 329
12757 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 163
12756 Exploring the Dark Side of IT Security: Delphi Study on Business’ Influencing Factors

Authors: Tizian Matschak, Ilja Nastjuk, Stephan Kühnel, Simon Trang

Abstract:

We argue that besides well-known primary effects of information security controls (ISCs), namely confidentiality, integrity, and availability, ISCs can also have secondary effects. For example, while IT can add business value through impacts on business processes, ISCs can be a barrier and distort the relationship between IT and organizational value through the impact on business processes. By applying the Delphi method with 28 experts, we derived 27 business process influence dimensions of ISCs. Defining and understanding these mechanisms can change the common understanding of the cost-benefit valuation of IT security investments and support managers' effective and efficient decision-making.

Keywords: business process dimensions, dark side of information security, Delphi study, IT security controls

Procedia PDF Downloads 76
12755 Higher Education Teachers' Perceptions of Core Competencies and Innovation: The Case of Mohamed V University Abu Dhabi

Authors: Khalid Soussi

Abstract:

Implementing innovative teaching and learning methods is of pivotal importance for student motivation and teaching quality. At the center of such quality are teaching competencies. The present paper investigates three teachers’ core competencies related to their innovative teaching performance: educational/pedagogical competency, teaching competency, and social competency. The paper also attempts to describe the influence of social factors on innovation in higher education. Many recent studies highlight the technological competency as an independent one, but it is believed in this study that the latter makes part of the pedagogical competency. A Likert scale questionnaire was used to measure teachers’ judgements of core competencies role in innovative teaching performance. The study also attempted to demarcate the social variables that may affect innovative teaching in higher education. The findings indicate that teachers’ educational competency and teaching competency were generally confirmed to be either important or very important for innovation in teaching performance. Regarding social competency, the study also shows that satisfaction from job, daily working hours, amount of workload, flexibility in the functioning and the quality of students are the main factors that have a large effect on teachers’ innovative teaching performance.

Keywords: higher education, innovative teaching, teaching competencies, teaching performance

Procedia PDF Downloads 113
12754 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry

Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht

Abstract:

Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.

Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628

Procedia PDF Downloads 136
12753 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 353
12752 Competencies of a Commercial Grain Farmer: A Classic Grounded Theory Approach

Authors: Thapelo Jacob Moloi

Abstract:

This paper purports to present the findings in relation to the competencies of commercial grain farmers using a classic grounded theory method. A total of about eighteen semi-structured interviews with farmers, former farmers, farm workers, and agriculture experts were conducted. Findings explored competencies in the form of skills, knowledge and personal attributes that commercial grain farmers possess. Skills range from production skills, financial management skill, time management skill, human resource management skill, planning skill to mechanical skill. Knowledge ranges from soil preparation, locality, and technology to weather knowledge. The personal attributes that contribute to shaping a commercial grain farmer are so many, but for this study, seven stood out as a passion, work dedication, self-efficacy, humbleness, intelligence, emotional stability, and patience.

Keywords: grain farming, farming competencies, classic grounded theory, competency model

Procedia PDF Downloads 48
12751 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 420
12750 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 147
12749 The Development of Student Core Competencies through the STEM Education Opportunities in Classroom

Authors: Z. Dedovets, M. Rodionov

Abstract:

The goal of the modern education system is to prepare students to be able to adapt to ever-changing life situations. They must be able to acquire required knowledge independently; apply such knowledge in practice to solve various problems by using modern technologies; think critically and creatively; competently use information; be communicative, work in a team; and develop their own moral values, intellect and cultural awareness. As a result, the status of education significantly increases; new requirements to its quality have been formed. In recent years, the competency-based approach in education has become of significant interest. This approach is a strengthening of applied and practical characteristics of a school education and leads to the forming of the key students’ competencies which define their success in future life. In this article, the authors’ attention focuses on a range of key competencies, educational, informational and communicative and on the possibility to develop such competencies via STEM education. This research shows the change in students’ attitude towards scientific disciplines such as mathematics, general science, technology and engineering as a result of STEM education. Two-staged analyzes questionnaires completed by students of forms II to IV in the republic of Trinidad and Tobago allowed the authors to categorize students between two levels that represent students’ attitude to various disciplines. The significance of differences between selected levels was confirmed with the use of Pearsons’ chi-squared test. In summary, the analysis of obtained data makes it possible to conclude that STEM education has a great potential for development of core students’ competencies and encourages the development of positive student attitude towards the above mentioned above scientific disciplines.

Keywords: STEM, science, technology, engineering, mathematics, students’ competency, Pearson's chi-squared test

Procedia PDF Downloads 364
12748 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 20
12747 Impact of Teacher Qualifications on the Pedagogical Competencies of University Lecturers in Northwest Nigeria: A Pilot Study Report

Authors: Collins Ekpiwre Augustine

Abstract:

Taking into account the impact of teacher training on primary and secondary teachers’ classroom competencies and practices, as revealed by many empirical studies, this study investigated the impact of teacher qualifications on the pedagogical competencies of university teachers in Northwest Nigeria.Four research questions were answered while four hypotheses were tested. Both descriptive statistic of frequencies/arithmetic mean and inferential statistic oft-test were used to analyze the data collected. In order to provide a focus to the study,an observational rating scale titled “University Teachers’ Pedagogical Competency Observation Rating Scale” (UTPCORS) was used to collect data for the study. The population for the study comprised all the university teachers in the three Federal Universities in Northwest Nigeria totaling about 3,401. However, this pilot study was administered on 8 teachers - with 4 participants in each comparison group in Bayero University, Kano.The findings of the study revealed that there was no significant difference in the four hypotheses postulated for the study.

Keywords: impact, university teachers, teachers' qualifications, competencies

Procedia PDF Downloads 487
12746 Informing the Implementation of Career Conversations in Secondary Schools for the Building of Student Career Competencies: The Case of Portugal

Authors: Cristina Isabrl de Oliveira SAntos

Abstract:

The study aims to investigate how transferrable and effective career conversations could be, in the context of general track Portuguese secondary schools, with the view of improving students’ career competencies. It does so by analysing: 1) the extent to which students’ perceptions of career conversations relate with their existing career competencies, 2) the extent to which each of the parameters; perceptions of career conversations and student career competencies, relate with student situational and personal characteristics, 3) how patterns in perceptions of headteachers and of teachers at a school, regarding the implementation of career conversations, correlate to the views of students regarding career conversations and to school contextual characteristics. Data were collected from 27 secondary schools out of 32 in the same district of Aveiro, in Portugal. Interviews were performed individually, with 27 headteachers, and in groups, with a total of 10 teacher groups and 11 student groups. Survey responses were also collected from742 studentsand 310 teachers. Interview responses were coded and analysed using grounded theory principles. Data from questionnaires is currently beingscrutinised through descriptive statistics with SPSS, and Structural Equation Modelling (SEM). Triangulation during different stages of data analysis uses the principles of retroduction and abduction of the realist evaluation framework. Conclusions from the pilot-study indicate that student perceptions scores on content and relationship in career conversations change according to their career competencies and the type of school. Statistically significant differences in perceptions of career conversations were found for subgroups based on gender and parent educational level.

Keywords: career conversations, career competencies, secondary education, teachers

Procedia PDF Downloads 117
12745 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 277
12744 Conceptualization and Assessment of Key Competencies for Children in Preschools: A Case Study in Southwest China

Authors: Yumei Han, Naiqing Song, Xiaoping Yang, Yuping Han

Abstract:

This study explores the conceptualization of key competencies that children are expected to develop in three year preschools (age 3-6) and the assessment practices of such key competencies in China. Assessment of children development has been put into the central place of early childhood education quality evaluation system in China. In the context of students key competencies development centered education reform in China, defining and selecting key competencies of children in preschools are of great significance in that they would lay a solid foundation for children’s lifelong learning path, and they would lead to curriculum and instruction reform, teacher development reform as well as quality evaluation reform in the early childhood education area. Based on sense making theory and framework, this study adopted multiple stakeholders’ (early childhood educators, parents, evaluation administrators, scholars in the early childhood education field) perspectives and grass root voices to conceptualize and operationalize key competencies for children in preschools in Southwest China. On the ground of children development theories, Chinese and international literature related to children development and key competencies, and key competencies frameworks by UNESCO, OECD and other nations, the authors designed a two-phase sequential mixed method study to address three main questions: (a) How is early childhood key competency defined or labeled from literature and from different stakeholders’ views? (b) Based on the definitions explicated in the literature and the surveys on different stakeholders, what domains and components are regarded to constitute the key competency framework of children in three-year preschools in China? (c) How have early childhood key competencies been assessed and measured, and how such assessment and measurement contribute to enhancing early childhood development quality? On the first phase, a series of focus group surveys were conducted among different types of stakeholders around the research questions. Moreover, on the second phase, based on the coding of the participants’ answers, together with literature synthesis findings, a questionnaire survey was designed and conducted to select most commonly expected components of preschool children’s key competencies. Semi-structured open questions were also included in the questionnaire for the participants to add on competencies beyond the checklist. Rudimentary findings show agreeable concerns on the significance and necessity of conceptualization and assessment of key competencies for children in preschools, and a key competencies framework composed of 7 domains and 25 indicators was constructed. Meanwhile, the findings also show issues in the current assessment practices of children’s competencies, such as lack of effective assessment tools, lack of teacher capacity in applying the tools to evaluating children and advancing children development accordingly. Finally, the authors put forth suggestions and implications for China and international communities in terms of restructuring early childhood key competencies framework, and promoting child development centered reform in early childhood education quality evaluation and development.

Keywords: assessment, conceptualization, early childhood education quality in China, key competencies

Procedia PDF Downloads 223
12743 Towards A New Maturity Model for Information System

Authors: Ossama Matrane

Abstract:

Information System has become a strategic lever for enterprises. It contributes effectively to align business processes on strategies of enterprises. It is regarded as an increase in productivity and effectiveness. So, many organizations are currently involved in implementing sustainable Information System. And, a large number of studies have been conducted the last decade in order to define the success factors of information system. Thus, many studies on maturity model have been carried out. Some of this study is referred to the maturity model of Information System. In this article, we report on development of maturity models specifically designed for information system. This model is built based on three components derived from Maturity Model for Information Security Management, OPM3 for Project Management Maturity Model and processes of COBIT for IT governance. Thus, our proposed model defines three maturity stages for corporate a strong Information System to support objectives of organizations. It provides a very practical structure with which to assess and improve Information System Implementation.

Keywords: information system, maturity models, information security management, OPM3, IT governance

Procedia PDF Downloads 417