Search results for: public attitudes security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9046

Search results for: public attitudes security

8926 Tenure Security, Agricultural Diversity and Food Security

Authors: Amanuel Hadera Gebreyesus

Abstract:

In the literature, the study of tenure and food security has largely involved separate lines of inquiry. In effect, the nexus among these has received little attention; and the underinvestment in research related to the relationship between tenure and food security deters generation of tenure-related knowledge and policy guidance for improving food and nutrition security. Drawing from this motivation, we study the relationship among tenure security, agricultural diversity and food security and dietary diversity. We employ IV approaches to examine the effect of tenure security and agricultural diversity on food security and dietary diversity. We find tenure security is inversely related with food insecurity as shown by its negative association with hunger scale, hunger index and hunger category. On the other hand, results suggest that tenure security improves minimum dietary diversity of women while we find no association with child dietary diversity. Moreover, agricultural diversity is positively related with minimum dietary diversity of women, which may point to higher accessibility and consumption of dietary food groups by women. Also, findings suggest that farmers use their human (knowledge and skills) and resource (land) endowments to improve food security and dietary diversity. An implication from this is the importance of not only improving access to land but also long-term tenure security to promote agricultural diversity, food security and dietary diversity.

Keywords: tenure security, food security, agricultural diversity, dietary diversity, women

Procedia PDF Downloads 165
8925 Emotional Intelligence and Gender Role Attitudes of Married Individuals: Moderating Role of Gender and Work Status

Authors: Saima Kalsoom, Sobia Masood, Muhammad Faran

Abstract:

This study aimed to examine the association between emotional intelligence and gender role attitudes of married individuals. Another aim of this study was to test the moderating role of gender work status of married individuals for predicting gender role attitudes from emotional intelligence. A sample of (N = 500) married working men and women (both working & housewives) was approached through purposive convenience sampling technique. The data was collected employing cross-sectional research design. The indigenous versions of the Gender Role Attitudes Scale and perceived Emotional Intelligence Scale were used. The results of alpha coefficients for both the scales and subscales used in this study designated satisfactory evidence for internal consistency and reliability. Assessment of correlation coefficients showed significant positive correlation between gender role attitudes and emotional intelligence, subfactors of emotional intelligence i.e., emotional self-regulation, emotional self-awareness, and interpersonal skills with gender role attitudes. Results of model testing revealed that gender (the effect was significant for women) and work status (the effect was more significant for married working women than married working men and housewives) of the married individuals significantly moderated the relationship between emotional intelligence and gender role attitudes into the positive direction. Further, it was also found that gender and work status also moderated the relationship between emotional self-regulation (as sub factor of emotional intelligence) and gender role attitudes in a positive direction. In conclusion, this empirical evidence is vital contribution derived from the traditional and collectivistic socio-cultural background of Pakistan.

Keywords: gender role attitudes, emotional intelligence, emotional self-regulation, gender, work status, married working women

Procedia PDF Downloads 79
8924 Simple Ways to Enhance the Security of Web Services

Authors: Majid Azarniush, Soroush Mokallaei

Abstract:

Although robust security software, including anti-viruses, anti spy wares, anti-spam and firewalls, are amalgamated with new technologies such as Safe Zone, Hybrid Cloud, Sand Box etc., and it can be said that they have managed to prepare highest level of security against viruses, spy wares and other malwares in 2012, but in fact hackers' attacks to websites are increasingly becoming more and more complicated. Because of security matters and developments, it can be said that it was expected to happen so. Here in this work, we try to point out to some functional and vital notes to enhance security on the web enabling the user to browse safely in no limit web world and to use virtual space securely.

Keywords: firewalls, security, web services, software

Procedia PDF Downloads 457
8923 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 550
8922 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 403
8921 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 401
8920 The Use of Authentic Videos to Change Learners’ Negative Attitudes and Perceptions toward Grammar Learning

Authors: Khaldi Youcef

Abstract:

This investigation seeks to inquire into the effectiveness of using authentic videos for grammar teaching purposes. In this investigation, an English animated situation, Hercules, was used as a type of authentic multimedia to teach a particular grammatical structure, namely conditional sentences. This study also aims at investigating the EFL learners’ attitudes toward grammar learning after being exposed to such an authentic video. To reach that purpose, 56 EFL learners were required ultimately to respond to a questionnaire with an aim to reveal their attitudes towards grammar as a language entity and as a subject for being learned. Then, as a second stage of the investigation, the EFL learners were divided into a control group and an experimental group with 28 learners in each. The first group was taught grammar -conditional sentences- using a deductive-inductive approach, while the second group was exposed to an authentic video to learn conditional sentences. There was a post-lesson stage that included a questionnaire to be answered by learners of each group. The aim of this stage is to capture any change in learners' attitudes shown in the pre-lesson questionnaire. The findings of the first stage revealed learners' negative attitudes towards grammar learning. And the third stage results showed the effectiveness of authentic videos in entirely turning learners' attitudes toward grammar learning to be significantly positive. Also, the utility of authentic videos in highly motivating EFL learners can be deduced. The findings of this survey asserted the need for incorporation and integration of authentic videos in EFL classrooms as they resulted in rising effectively learners’ awareness of grammar and looking at it from a communicative perspective.

Keywords: multimedia, authentic videos, negative attitudes, grammar learning, EFL learners

Procedia PDF Downloads 64
8919 An Empirical Assessment of the Effect of War Exposure on the Attitudes towards Violence

Authors: Anastasiia Kuptsevych, Robert J. Johnson, Olena Antonaccio, Ekaterina V. Botchkovar

Abstract:

Ukraine has recently experienced one of the bloodiest conflicts taking place on the European continent. Many active duty personnel and civilians have died, and millions of people have been displaced. This situation can lead to disorder in the country characterized by acceptance of violence and crime. There is a gap in the literature addressing the issues related to attitudes towards violence resulting from war, as well as focusing on the world’s more vulnerable civilian populations – those that live in lower and middle-income countries, such as Ukraine. Using a random sample of 1200 adults from two major Ukrainian cities, this study explores the relationship between different types of war exposure (direct and vicarious) and attitudes to violence. Multivariate models reveal that multiple types of war exposure (e.g., being injured, being a witness of death, watching war events on TV) are significantly associated with the attitudes to political and interpersonal violence. In addition, the KHB decomposition procedure showed that experiencing certain mental illnesses serve as important mediating mechanisms between war exposure and attitudes towards violence. Finally, in order to prevent society from disorder and high levels of violence, future studies need to pay more attention to exploring how vital and traumatic life events can lead a population to find violent acts acceptable.

Keywords: attitudes, Ukraine, violence, war

Procedia PDF Downloads 238
8918 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 670
8917 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations

Authors: Pratyush Vatsala, Sanjay Ahuja

Abstract:

The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.

Keywords: Kashmir, Mizoram, security, value, human right

Procedia PDF Downloads 251
8916 The Research of Weights Identify of Harbin Ecological Security Evaluation Index Based on AHP

Authors: Rong Guo, Mengshi Huang, Yujing Bai

Abstract:

With the rapid development of urbanization, the urban population increases and urban sprawl appeared. And these issues led to a sharp deterioration of the ecological environment. So, the urban ecological security evaluation was imminent. The weights identify of index was a key step of the research of ecological security evaluation. The AHP was widely used in the extensive research of weights identify of ecological security index. The characteristics of authority and quantitative can fully reflect the views of relevant experts. On the basis of building the ecological security evaluation index of Harbin, the paper combed and used the basic principle of the AHP, and calculated the weights of Harbin ecological security evaluation index through the process of the expert opinions “summary-feedback-summary”. And lay a foundation of future study of Harbin ecological security index, and guide the quantitative evaluation of Harbin ecological security.

Keywords: AHP, ecological security, evaluation Index, weights identify, harbin

Procedia PDF Downloads 469
8915 Attitudes of Faculty Members Towards Inclusion of Students with Disability at Prince Sattam Bin Abdulaziz University

Authors: Khalid Alasim

Abstract:

This study investigates the attitudes of faculty members at Prince Sattam bin Abdulaziz University toward integrating students with disabilities. Additionally, this research examines the possible factors that might affect faculty members’ attitudes about the inclusion of students with disability; the factors include occupation, gender, college, the country in which the certificate was obtained, years of experience, previous experience in teaching students with disabilities, the presence of a family member with a disability, attending a program on teaching students with disabilities. The researcher used a survey to collect data and the study sample consisted of 102 faculty members at the university. The findings indicated an increase in the attitudes of faculty members at Prince Sattam bin Abdulaziz University towards the inclusion of students with disabilities in the university, while there is no effect for all study independents variables on the attitudes of faculty members, and there is no interaction between the variables as well. The study concluded with the importance of training and preparing faculty members to teach and deal with students with disabilities at the university level.

Keywords: attitutes, inclusion, disability, faculty members

Procedia PDF Downloads 54
8914 Evaluating Accessibility to Bangkok Mass Transit System: Case Study of Saphan Taksin BTS Station

Authors: Rungpansa Noichan, Bart Julien Dewancker

Abstract:

Access to the mass transit system, including rapid elevated and underground transport has become an outstanding issue for many cities. The mass transit access development should focus on behavioral responses of the different passenger groups. Moreover, it should consider about the appearance of intent-oriented action related accessibility that was explored from user’s satisfaction and attitudes related to services quality. This study aims to evaluate mass transit accessibility from passenger’s satisfaction, therefore, understanding the passenger’s attitudes about mass transit accessibility. The study area of this research is Bangkok Mass Transit system (BTS Skytrain) at Saphan Taksin station. 200 passengers at Saphan Taksin station were asked to rate the questionnaires survey that considers accessibility aspects of convenience, safety, feeder connectivity, and other dimensions. The survey was to find out the passenger attitudes and satisfaction for access to the BTS station, and the result shows several factors that influence the passenger choice of using the BTS as a public transportation mode and passenger’s opinion that needs to concern for the development mass transit system and accessibility performance.

Keywords: urban transportation, user satisfaction, accessibility, Bangkok mass transit

Procedia PDF Downloads 239
8913 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 615
8912 Role of Social Capital on Consumer Attitudes, Peer Influence and Behavioral Intentions: A Social Media Perspective

Authors: Qazi Mohammed Ahmed, Osman Sadiq Paracha, Iftikhar Hussain

Abstract:

The study aims to explore the unaddressed relationship between social capital and consumers’ underlying behavioral intentions. The study postulates that this association is mediated by the role of attitudes and peer influence. The research attains evidence from a usable sample of 673 responses. The majority consists of the young and energetic social media users of Pakistan that utilize virtual communities as a way of life. A variance based structural equation modeling has been applied through SmartPLS 3. The results reveal that social capital exerts a statistically supportive association with both attitudes and peer influence. Contrastingly, this predictor variable shows an insignificant linkage with behavioral intentions but this relationship is fully mediated by consumer attitudes and peer influence. The paper enhances marketing literature with respect to an unexplored society of Pakistan. It also provides a lens for the contemporary advertisers, in terms of supporting their social media campaigns with affiliative and cohesive elements. The study also identifies a series of predictor variables that could further be tested with attitudes, subjective norms and behavioral responses.

Keywords: social capital, consumer attitudes, peer influence, behavioral intentions

Procedia PDF Downloads 102
8911 Hotel Customers’ Attitudes towards Service Marketing Mix, Service Behavior, and Perceived Brand Value

Authors: Trikhun Rotkasem

Abstract:

This research paper aimed to investigate hotel customers’ attitudes towards the service marketing, service behavior and perceived brand value. The focus of the study was on the Suan Sunandha Rajabhat University’s hotel. It is a small hotel which aims to provide service to mainly university’s guests. A simple random sampling technique was conducted to obtain a sample group that included 200 respondents. The research question was established as follows: What are customers’ attitudes towards the service marketing mix of hotel customers? The findings revealed the respondents’ attitudes towards the service marketing mix indicated high level in the area of product, place or distribution channel, people, and physical evidence, whereas, the respondents’ attitude towards the service marketing mix indicated medium level in the area of price, promotion, and process.

Keywords: marketing mix, perceived brand value, service behavior, hotel customers

Procedia PDF Downloads 413
8910 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 491
8909 Self-Serving or Self-Effacing: An Analysis of the Zimbabwe-United Kingdom Diaspora`S Role in Human Rights Advocacy

Authors: J.T. Chivanga

Abstract:

This paper conceptualizes the significance of human rights activism by the Zimbabwean diaspora in the United Kingdom by analyzing how the diaspora advocates for the promotion of the rights of the people in Zimbabwe. It critiques the strategic essentialism theory that is used by the government of Zimbabwe as a basis to discredit the work of transnational advocacy groups. The research advances this position by articulating that the diaspora does not falsify nor simplify them to garner external support on the human rights situation in Zimbabwe. It establishes and shows the significance of transnational advocacy by articulating how the Zimbabwean diaspora addresses and brings to the attention of the international community human rights violations in Zimbabwe that would otherwise not have seen the light of day due to the absence of a conducive environment in that country that stifles the organization of protests under repressive laws such as the public order and security act of 2009.

Keywords: strategic essentialism, transnational advocacy, public order and security act, Zimbabwe diaspora

Procedia PDF Downloads 213
8908 Blockchain: Institutional and Technological Disruptions in the Public Sector

Authors: Maria Florencia Ferrer, Saulo Fabiano Amancio-Vieira

Abstract:

The use of the blockchain in the public sector is present today and no longer the future of disruptive institutional and technological models. There are still some cultural barriers and resistance to the proper use of its potential. This research aims to present the strengths and weaknesses of using a public-permitted and distributed network in the context of the public sector. Therefore, bibliographical/documentary research was conducted to raise the main aspects of the studied platform, focused on the use of the main demands of the public sector. The platform analyzed was LACChain, which is a global alliance composed of different actors in the blockchain environment, led by the Innovation Laboratory of the Inter-American Development Bank Group (IDB Lab) for the development of the blockchain ecosystem in Latin America and the Caribbean. LACChain provides blockchain infrastructure, which is a distributed ratio technology (DLT). The platform focuses on two main pillars: community and infrastructure. It is organized as a consortium for the management and administration of an infrastructure classified as public, following the ISO typologies (ISO / TC 307). It is, therefore, a network open to any participant who agrees with the established rules, which are limited to being identified and complying with the regulations. As benefits can be listed: public network (open to all), decentralized, low transaction cost, greater publicity of transactions, reduction of corruption in contracts / public acts, in addition to improving transparency for the population in general. It is also noteworthy that the platform is not based on cryptocurrency and is not anonymous; that is, it is possible to be regulated. It is concluded that the use of record platforms, such as LACChain, can contribute to greater security on the part of the public agent in the migration process of their informational applications.

Keywords: blockchain, LACChain, public sector, technological disruptions

Procedia PDF Downloads 147
8907 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 394
8906 Concerns, Attitudes and Perceptions of Mothers about Child Vulnerability for Sexual Abuse

Authors: Rukhsana Kausar, Khadija Rasheed

Abstract:

This research explored general concerns, attitudes and perceptions of Pakistani mothers about their children’s vulnerability for sexual abuse and it also examined the effect of education and work status of mothers on their concerns and attitudes about the safety of their children. The sample consisted of 166 mothers comprising of 4 groups i.e. educated-working mothers, uneducated working mothers, educated non-working mothers and uneducated non-working mothers. This research comprised of two studies. Study 1 was carried out to construct two separate scales namely Maternal Concerns and Attitudes Scale for safety of Daughters (MCA-SD) and Maternal Concerns and Attitudes Scale for safety of Sons (MCA-SS) for assessing maternal concerns and attitudes about safety and protection of daughters and sons. These scales were used in study 2 with the objective to explore mothers’ general concerns, attitudes and perceptions of about child vulnerability for sexual abuse. Data were analyzed using two-way analysis of variance and independent-samples t-test. Educated mothers had more sense of responsibility, ensured more safety and provide more information about self-protection to their children as compared to uneducated mothers. Similarly non-working mothers showed more sense of responsibility and provided more information on self-protection to their children as compared to working mothers. Moreover, mothers living in nuclear family system trusted more on their relatives and other people for the protection of their children and ensured more safety of children than those living in joint family system. Findings have very important implications for protecting children from likely sexual abuse.

Keywords: mothers’ concerns, attitudes, perceptions, child vulnerability, child sexual abuse

Procedia PDF Downloads 411
8905 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 96
8904 EFL Learners' Attitudes towards the Proper Pronunciation of English and towards Podcasts as a Facilitator for Proper Pronunciation

Authors: Riam Almaqrn, Abdulrahman Alshabeb

Abstract:

The study aims to examine the attitudes of Saudi students of English towards proper pronunciation and towards podcasts as a facilitator for proper pronunciation. In order to fulfill the purpose of the study, twenty-three students participated in this study. The study used a questionnaire as the main data collection instrument. The questionnaire included two parts, one or proper pronunciation and the other for podcasts. Data analysis showed that the participants, in spite of the low rate of improvement in their pronunciation, had positive attitudes towards proper pronunciation of English. This outcome is compatible with previous studies` results that assert the fact that having a positive attitude towards a particular language and its speakers can improve pronunciation. As for podcasts, students received a total of five podcasts related to their listening and speaking textbook. At the end of the project, students showed high rate of acceptance for podcasts and positive attitudes towards them. The findings proved the usefulness of examining learners` attitudes towards new CALL applications before using them in a practical way. In the light of the findings, pedagogical implications and suggestions were presented for language instructors and academics.

Keywords: CALL, MALL, podcast, learning English

Procedia PDF Downloads 239
8903 The Sexual Knowledge, Attitudes and Behaviors of College Students from Only-Child Families: A National Survey in China

Authors: Jiashu Shen

Abstract:

This study aims at exploring the characteristics of sexual knowledge, attitudes, and behaviors of Chinese college students from the 'one-child' families compared with those with siblings. This study utilized the data from the 'National College Student Survey on Sexual and Reproductive Health 2019'. Multiple logistic regression analyses were used to assess the association between the 'only-child' and their sexual knowledge, sexual attitudes, sexual behaviors, and risky sexual behaviors (RSB) stratified by sex and home regions, respectively. Compared with students with siblings, the 'only-child' students scored higher in sex-related knowledge (only-child students: 4.49 ± 2.28, students with siblings: 3.60 ± 2.27). Stronger associations between only-child and more liberal sexual attitudes were found in urban areas, including the approval of premarital sexual intercourse (OR: 1.51, 95% CI: 1.50-1.65) and multiple sexual partners (OR: 1.85, 95% CI: 1.72-1.99). For risky sexual behaviors, being only-child is more likely to use condoms in first sexual intercourse, especially among male students (OR: 0.68, 95% CI: 0.58-0.80). Only-child students are more likely to have more sexual knowledge, more liberal sexual attitude, and less risky sexual behavior. Further health policy and sex education should focus more on students with siblings.

Keywords: attitudes and behaviors, only-child students, sexual knowledge, students with siblings

Procedia PDF Downloads 158
8902 Knowledge, Attitudes, and Practices regarding Anthrax among Community Members, Health and Veterinary Workers in Maragua, Kenya

Authors: Isaiah Chacha, Samuel Arimi, Andrew Thaiya

Abstract:

Background: This study was conducted to assess knowledge, attitudes and practices regarding anthrax in Maragua, Kenya to provide baseline information to design interventions. Methods: A cross sectional survey was conducted among head of households, health and veterinary workers in Maragua Sub-county in August and September 2014. Administered questionnaires were used to collect data from household members and a key informant interview held with health and veterinary workers. Multi stage sampling was used to obtain participants’ knowledge, attitudes and practices. Questions were scored and descriptively analyzed using Excel spreadsheet then exported to GenStat Discovery Edition 4. Results: A total of 293 community members were recruited in this study. The overall level of knowledge was 77.9% of all community members regarding cause, transmission, symptoms and prevention of the disease in both humans and animals. Majority of the participants (96.3%) had heard about anthrax. A total of 99 (33.8%) correspondents had seen a person with anthrax and 75.1% think that anthrax is a very serious disease in the area. Of the interviewed correspondents, 14.3% of them have had their animals (mostly cattle) suffer from anthrax while 15.7% had either suffered from anthrax or have had their family member who suffered from anthrax. Conclusion: The study findings indicate above average knowledge on cause, symptoms, transmission and prevention of anthrax among community members in humans and animals. Practices in this study were still risk among community members. Veterinary and Medical health planners should design anthrax awareness interventions as a team targeting to reach these communities and the public through barazas, radio, CHW and other communication channel on a regular basis.

Keywords: anthrax, attitudes, Kenya, knowledge, Maragua, practices

Procedia PDF Downloads 285
8901 Non-Communicable Diseases: Knowledge, Attitudes and Practices of Risk Factors among Secondary School Students in Sharjah, UAE

Authors: A. Al-Wandi, A. Al-Ali, R. Dali, Y. Al-Karaghouli

Abstract:

Background: Non-communicable diseases (NCDs) have become an alarming health problem across the globe. The risk of developing those diseases begins in childhood and develops gradually under the influence of risk factors including obesity, hypertension, dyslipidemia, cigarette smoking and decreased physical activity. Therefore, this study aims to determine the level of knowledge, attitudes, and practices of the risk factors of lifestyle induced chronic diseases (non-communicable diseases) among secondary school students in Sharjah city. Methods: Five hundred and ninety-one school children, from grades 10 to 12, formed the study sample, using the multistage stratified cluster sampling method. Four governmental schools were chosen, for each gender. Data was collected through a pretested, close-ended questionnaire consisting of five sections; demographics, physical activity, diet, smoking and sleeping patterns. Frequencies and descriptive statistics were used to analyze data through SPSS 23. Results: The data showed 64.6% of students had low knowledge of risk factors of non-communicable diseases. Concerning physical activity, 58.2 % were physically inactive and females being less active than males. More than 2/3 of students didn’t fulfill the recommended daily intake of fruits and vegetables (75.9%). 8% reported to be smokers with cigarettes being the most encountered tobacco product. Conclusion: Our study has demonstrated a low level of knowledge and practices yet, positive attitudes towards risk factors of chronic diseases. We recommend implementation of thorough awareness campaigns through public health education about the risk factors of non-communicable diseases.

Keywords: non-communicable diseases, physical activity, diet, knowledge, attitudes, practices, smoking

Procedia PDF Downloads 200
8900 An Investigation on Interactions between Social Security with Police Operation and Economics in the Field of Tourism

Authors: Mohammad Mahdi Namdari, Hosein Torki

Abstract:

Security as an abstract concept, has involved human being from the beginning of creation to the present, and certainly to the future. Accordingly, battles, conflicts, challenges, legal proceedings, crimes and all issues related to human kind are associated with this concept. Today by interviewing people about their life, the security of societies and Social crimes are interviewed too. Along with the security as an infrastructure and vital concept, the economy and related issues e.g. welfare, per capita income, total government revenue, export, import and etc. is considered another infrastructure and vital concept. These two vital concepts (Security and Economic) have linked together complexly and significantly. The present study employs analytical-descriptive research method using documents and Statistics of official sources. Discovery and explanation of this mutual connection are comprising a profound and extensive research; so management, development and reform in system and relationships of the scope of this two concepts are complex and difficult. Tourism and its position in today's economy is one of the main pillars of the economy of the 21st century that maybe associate with the security and social crimes more than other pillars. Like all human activities, economy of societies and partially tourism dependent on security especially in the public and social security. On the other hand, the true economic development (generally) and the growth of the tourism industry (dedicated) are a security generating and supporting for it, because a dynamic economic infrastructure prevents the formation of centers of crime and illegal activities by providing a context for socio-economic development for all segments of society in a fair and humane. This relationship is a formula of the complexity between the two concept of economy and security. Police as a revealed or people-oriented organization in the field of security directly has linked with the economy of a community and is very effective In the face of the tourism industry. The relationship between security and national crime index, and economic indicators especially ones related to tourism is confirming above discussion that is notable. According to understanding processes about security and economic as two key and vital concepts are necessary and significant for sovereignty of governments.

Keywords: economic, police, tourism, social security

Procedia PDF Downloads 299
8899 Cryptocurrencies: Business Students’ Awareness and Universities’ Adoption Readiness and Compatibility of Use Considering the Mediation of Attitudes

Authors: Eric S. Parilla, Marc Edward Abadilla

Abstract:

The study aims to determine the effect of awareness of business students towards cryptocurrencies and the readiness of universities and colleges to accept cryptocurrencies as a medium of exchange, considering the mediation of business students’ attitudes. The research used partial least squares structural equation modeling (PLS-SEM) and deployed a questionnaire attuned to the awareness and attitudes of business students towards cryptocurrencies and readiness and compatibility of use in universities and colleges in Ilocos Norte. The output of the investigation revealed that awareness of business students is not correlated to the readiness of universities and colleges, which means that even though students understand cryptocurrencies, it is not an assurance that universities and colleges are ready to accept them as the medium of exchange. The study proposes that training and seminars for business students and professionals should be conducted to expand understanding and acceptance of cryptocurrencies.

Keywords: cryptocurrencies, awareness, readiness, attitudes

Procedia PDF Downloads 185
8898 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 519
8897 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 407