Search results for: public attitudes security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9056

Search results for: public attitudes security

8816 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 165
8815 Jordanian Men’s and Women’s Attitudes toward Intimate Partner Violence and Its Correlates with Family Functioning and Demographics

Authors: Fatmeh Alzoubi, Reem Ali

Abstract:

Jordan is a developing country in the Middle East and, much like other countries in the world, has high rates of intimate partner violence (IPV). Little information is available on Jordanian men’s and women’s attitudes toward IPV. The purpose of this study is to examine men’s and women’s attitudes toward IPV in Jordan and its relationship with some demographics and family functioning. A descriptive cross-sectional correlational design with a sample of 401 men and women was used. Descriptive statistics (M, SD), Pearson r, t test, and ANOVA were used. The results indicated that Jordanian men and women have a lower score of IPVAS, 40.06 (SD = 8.20), indicating lower acceptance of IPV compared with the literature. Family functioning was 3.12 (SD = 0.46), indicating more healthy families. Family functioning was negatively correlated with IPVAS scores (r = –.22, p = .00). All demographic variables showed small to moderate correlations with IPVAS. Education for both study participants and their spouses had a negative correlation with IPVAS (r = –.27, p = .00) and (r = –.20, p = .00), respectively. Male participants, individuals who were living with extended family, and those living in rural areas had significantly high IPVAS scores, indicating more accepting attitudes toward IPV. Practitioners should provide families with education on the methods of conflict resolution, effective communication within the family, problem-solving approaches, equal role distribution, and appropriate styles of establishing a family.

Keywords: intimate partner violence, Jordanian men and women’s health, attitudes, family functioning

Procedia PDF Downloads 102
8814 The Effect of Unconscious Exposure to Religious Concepts on Mutual Stereotypes of Jews and Muslims in Israel

Authors: Lipaz Shamoa-Nir, Irene Razpurker-Apfeld

Abstract:

This research examined the impact of subliminal exposure to religious content on the mutual attitudes of majority group members (Jews) and minority group members (Muslims). Participants were subliminally exposed to religious concepts (e.g., Mezuzah, yarmulke or veil) and then they filled questionnaires assessing their stereotypes towards the out-group members. Each participant was primed with either in-group religious concepts, out-group concepts or neutral ones. The findings show that the Muslim participants were not influenced by the religious content to which they were exposed while the Jewish participants perceived the Muslims as less 'hostile' when subliminally exposed to religious concepts, regardless of concept type (out-group/in-group). This research highlights the influence of evoked religious content on out-group attitudes even when the perceiver is unaware of prime content. The power that exposure to content in a non-native language has in activating attitudes towards the out-group is also discussed.

Keywords: intergroup attitudes, stereotypes, majority-minority, religious out-group, implicit content, native language

Procedia PDF Downloads 221
8813 The Sustainability of Public Debt in Taiwan

Authors: Chiung-Ju Huang

Abstract:

This study examines whether the Taiwan’s public debt is sustainable utilizing an unrestricted two-regime threshold autoregressive (TAR) model with an autoregressive unit root. The empirical results show that Taiwan’s public debt appears as a nonlinear series and is stationary in regime 1 but not in regime 2. This result implies that while Taiwan’s public debt was mostly sustainable over the 1996 to 2013 period examined in the study, it may no longer be sustainable in the most recent two years as the public debt ratio has increased cumulatively to 3.618%.

Keywords: nonlinearity, public debt, sustainability, threshold autoregressive model

Procedia PDF Downloads 425
8812 Urban Citizenship in a Sensor Rich Society

Authors: Mike Dee

Abstract:

Urban public spaces are sutured with a range of surveillance and sensor technologies that claim to enable new forms of ‘data based citizen participation’, but also increase the tendency for ‘function-creep’, whereby vast amounts of data are gathered, stored and analysed in a broad application of urban surveillance. This kind of monitoring and capacity for surveillance connects with attempts by civic authorities to regulate, restrict, rebrand and reframe urban public spaces. A direct consequence of the increasingly security driven, policed, privatised and surveilled nature of public space is the exclusion or ‘unfavourable inclusion’ of those considered flawed and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, programs of securitisation, ‘gentrification’ and ‘creative’ and ‘smart’ city initiatives refashion public space as sites of selective inclusion and exclusion. In this context of monitoring and control procedures, in particular, children and young people’s use of space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to the social order, requiring various forms of remedial action. This paper suggests that cities, places and spaces and those who seek to use them, can be resilient in working to maintain and extend democratic freedoms and processes enshrined in Marshall’s concept of citizenship, calling sensor and surveillance systems to account. Such accountability could better inform the implementation of public policy around the design, build and governance of public space and also understandings of urban citizenship in the sensor saturated urban environment.

Keywords: citizenship, public space, surveillance, young people

Procedia PDF Downloads 422
8811 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 238
8810 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.

Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security

Procedia PDF Downloads 139
8809 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel

Abstract:

The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.

Keywords: security, cooperation, asymmetrical, area denial

Procedia PDF Downloads 780
8808 The Antecedents That Effect on Organizational Commitment of the Public Enterprises in Thailand

Authors: Mananya Meenakorn

Abstract:

The purpose of this study is to examine the impact of public enterprise reform policy on the attributes of organizational commitments in the public energy enterprises in Thailand. It compares three structural types of public energy enterprises: totally state-owned public enterprises, partially transformed public enterprises and totally transformed public enterprises, based on the degree of state ownership and the level of management control that exist in the public reformed organizations, by analyzing the presence of the desirable attributes of organizational commitment as perceived by employees. Findings indicate that there are statistically significant differences in the level of some dimensions of organizational commitment between the three types of public energy enterprises. The results also indicate empirical evidence concerning the causal relationship between the antecedents and organizational commitment. Whereas change-related behaviors show a direct negative influence on organizational commitment, both HRM practices and work-related values indicate direct positive influences on them also.

Keywords: affective commitment, organizational commitment, public enterprise reform organizations, public energy enterprises in Thailand

Procedia PDF Downloads 263
8807 Housing Harmony: Social Integration in Singapore Public Housing

Authors: Yingjie Feng, Lei Xu, Zhenyu Cao

Abstract:

In the process of urbanization, public housing is often a powerful means to deal with large floating population. In the developed countries like the U.S, France, Singapore, and Japan, the experience on how to make use of public housing to realize social integration in aspects of race, class, religion, income is gained through years of practice. Take the example of Singapore, the article first introduces the ethnic composition background and public housing development in Singapore, and then gives a detailed explanation and analysis on social integration in public housing from the views of Ethnic quotas policy, community organization construction and design of public space. Finally, combined with the Chinese situation, the article points out that the solution for social integration in China is the organic mix of different income groups in public housing.

Keywords: floating population, public housing, Singapore, social integration, urbanization

Procedia PDF Downloads 245
8806 Accessibility of Social Justice through Social Security in Indian Organisations: Analysis Based on Workforce

Authors: Neelima Rashmi Lakra

Abstract:

India was among one of the highly developed economy up to 1850 due to its cottage industries. During the end of the 18th century, modern industrial enterprises began with the first cotton mill in Bombay, the jute mill near Calcutta and the coal mine in Raniganj. This was counted as the real beginning of industry in 1854 in India. Prior to this period people concentrated only to agriculture, menial service or handicraft, and the introduction of industries exposed them to the disciplines of factory which was very tedious for them. With increasing number of factories been setup adding on to mining and introduction of railway, World War Period (1914-19), Second World War Period (1939-45) and the Great Depression (1929-33) there were visible change in the nature of work for the people, which resulted in outburst of strike for various reasons in these factories. Here, with India’s independence there was emergence of public sector industries and labour legislations were introduced. Meanwhile, trade unions came to notice to the rescue of the oppressed but failed to continue till long. Soon after, with the New Economic Policy organisations came across to face challenges to perform their best, where social justice for the workmen was in question. On these backdrops, studies were found discussing the central human capabilities which could be addressed through Social Security schemes. Therefore, this study was taken up to look at the reforms and legislations mainly meant for the welfare of the labour. This paper will contribute to the large number of Indian population who are serving in public sectors in India since the introduction of industries and will complement the issue of social justice through social security measures among this huge crowd serving the nation. The objectives of the study include; to find out what labour Legislations have already been existing in India, the role of Trade Union Movement, to look at the effects of New Economic Policy on these reforms and its effects and measures taken for the workforce employed in the public sectors and finally, if these measures fulfil the social justice aspects for the larger society on whole. The methodology followed collection of data from books, journal articles, reports, company reports and manuals focusing mainly on Indian studies and the data was analysed following content analysis method. The findings showed the measures taken for Social Security, but there were also reflections of very few particular additions or amendments to these Acts and provisions with the onset of New Liberalisation Policy. Therefore, the study concluded examining the social justice aspects in the context of a developing economy and discussing the recommendations.

Keywords: public sectors, social justice, social security schemes, trade union movement

Procedia PDF Downloads 421
8805 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 478
8804 Research on the Public Governance of Urban Public Green Spaces from the Perspective of Institutional Economics

Authors: Zhang Xue

Abstract:

Urban public green spaces have evolved from classical private gardens and have expanded into multi-dimensional space value attributes such as scale and property rights. Among them, ecological, environmental value, social interaction value, and commercial, economic value have become consensual value characteristics. From the perspective of institutional economics, urban public green spaces, as a type of non-exclusive and non-competitive public good, express the social connotation of spatial "publicness" and multiple values are its important attributes. However, due to the positive externality characteristics of public green spaces, the cost-benefit functions between subjects are inconsistent, leading to issues such as the "anti-commons tragedy" of transitional management, lack of public sense of space responsibility, and weakened public nature. It is necessary to enhance the "publicness" of urban public green spaces through effective institutional arrangements, inclusive planning participation, and humane management measures, promoting urban public openness and the enhancement of multiple values.

Keywords: public green spaces, publicness, governance, institutional economics

Procedia PDF Downloads 25
8803 The Attitude and Willingness to Use Telecare for Arthritis Patients

Authors: Jui-Chen Huang

Abstract:

Nowadays, the population is aging, the number of people who need to be taken care of is increased, but the manpower and funding are insufficient. Therefore, this study aims to explore the attitudes and willingness of arthritis patients to adopt telecare and to take a large medical institution in the central area of Taiwan as a sample hospital. A structured questionnaire (using the Likert five-point scale) was used to collect chronic patients over 20 years old as sample data, and a total of 500 valid questionnaires were effectively collected. The SPSS 18.0 statistical software was used for reliability analysis and independent sample t-test to explore the differences in attitudes and willingness to use telecare for arthritis patients and non-arthritic patients. The Cronbach's alpha value of this study questionnaire was above 0.94, showing good reliability. Arthritis patients and non-arthritic patients had statistically significant differences in attitudes toward telecare, while the willingness to use did not reach statistically significant differences. In addition, the average attitude and intention of arthritis patients for telecare are 3.38 and 3.41, respectively, indicating that arthritis patients have a certain degree of attitude and willingness to adopt telecare, which is worthy of follow-up research and practical industry push.

Keywords: telecare, arthritis patients, attitudes, intention

Procedia PDF Downloads 120
8802 Attitudes Towards Homosexuality, Bisexuality and Transgenderism among Medical Students of a Sri Lankan University

Authors: Rajapaksha J. S. R. L., Rajapaksha R. G. D. T., Ranawaka A. U. R., Rangalla R. D. M. P., Ranwala R. D. E. B., Chandratilake M. N.

Abstract:

Introduction: Lesbian, gay, bisexual, and transgender (LGBT) patients experience discrimination, insensitivity, and ignorance about LGBT-specific health needs among healthcare providers. Developing the correct attitudes among medical students towards LGBT may help provide them with optimal healthcare. Objectives: This study aimed at assessing the attitudes of medical students towards the LBGT community. Methodology: A cross-sectional descriptive study was among all the medical students in the Faculty of Medicine, University of Kelaniya, Sri Lanka, using a validated online questionnaire. The questionnaire focused on eight areas. The data were descriptively analyzed, and the demographic groups were compared. Results: 358 students completed the survey. The response rate was 34.26%. Their attitudes on traditional gender roles and comfortability in interacting with LGBT people were moderate, and they disagreed with negative LGBT social beliefs. They knew less about the origin of sexuality/gender of LGBT. Although they accepted LGBT as a part of diversity, they discouraged normalizing the social practices of LGBT people. Their acceptance and association of LGBT were moderately positive. A minority has encountered LGBT in close social circles, and the majority of them were batch-mates. Although males’ knowledge about the origin of LGBT was higher, they favoured traditional gender roles more. The religious groups showed no differences. The favourability of attitudes towards LGBT reflected respondents’ political ideology. Conclusion: Although medical students’ knowledge on the sexuality/gender basis of LGBT is poor, they have moderately favourable attitudes towards them. They accept LGBT as a part of social diversity but not their social practices. Poor knowledge, lack of encounters, cultural influences, and political ideology may have influenced their attitudes.

Keywords: medical students, attitude, LGBT, diversity

Procedia PDF Downloads 142
8801 Adding Security Blocks to the DevOps Lifecycle

Authors: Andrew John Zeller, Francis Pouatcha

Abstract:

Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.

Keywords: information security, data security, cybersecurity, devOps, IT management

Procedia PDF Downloads 75
8800 The Job of Rhetoric in Public Relations Practice

Authors: Talal Alqahtani

Abstract:

For all institutions, either public or private, communication is important now more than ever. This is because the importance of communication has grown over the years, and it has the ability to either break or make an organization. With globalization, the changing technology, and other emergent issues that affect organizations, the communication given out has had to be better, sharper, and both proactive and reactive. This is the reason why the importance of public relations has been on the increase. Institutions realize the importance of having a good image and having public relations experts who can effectively manage communication in an institution easily in times of crisis. Public relations itself is not, however, effective, and this has led to the adoption of rhetoric in communication. Rhetoric use has had a long transformation because, in the past, it was only used in politics. Rhetoric in communication has come to be appreciated and adopted by many diverse fields and sectors. This study looks at the job of rhetoric in public relations practice and how it can identify with the administration of an institution's notoriety.

Keywords: communication, notoriety, rhetoric, public relation

Procedia PDF Downloads 203
8799 Understanding and Measuring Stigma, Barriers and Attitudes Associated with Seeking Psychological Help Among Young Adults in Czech Republic

Authors: Tereza Hruskova

Abstract:

200 million people globally experience serious mental health problems, and only one third seek professional help, and help-seeking is described as a last resort. Adolescents and young adults have a high prevalence of mental illness. Mental stigma is a key element in the decision to seek help and is divided into (i) self-stigma (self-stigmatization), including internal beliefs, low self-esteem, and lower quality of life, and (ii) public stigma (social stigma) containing stereotypes, beliefs and society's disapproval of help-seeking having a negative effect on help-seeking and our attitudes. Previous research has mainly focused on examining the construct of help seeking, avoidance, and delaying separately and trying to find out why people do not seek help in time and what obstacles stand in the way. Barriers are not static and may change over time and the stage of help-seeking. Attitudes are closely related to self-stigma and social stigma and predict whether a person will seek help. Barriers (stigmatization, a sense of humiliation, insufficient recognition of the problem, preferences, solving it alone, and distrust of a professional) and facilitators (previous experience with mental problems, social support, and help from others) are factors influencing help-seeking. The current research on the Czech population of young adults responds to the gap between a person with mental health problems and actually seeking professional help. The aim of the study is to describe in detail the individual constructs and factors, to understand the person seeking help, and to define possible obstacles on this path of seeking help. A sample of approximately 250 participants (age 18-35) would take part in the online questionnaire, conducted in May-June 2023, and would be administered a demographic questionnaire and four scales measuring attitudes (Attitudes Toward Seeking Professional Psychological Help – Short form), barriers (Barrier to Help Seeking Scale), self-stigma (Self Stigma of Seeking Help) and stigmatization (Perceptions of Stigmatization by Others for seeking help). Firstly, all four scales would be translated into the Czech language. The aim is (I) to determine the validity and reliability of the Czech translation of the scales, (II) to examine the factors of the scales on the Czech population and compare them retrospectively with the results of reliability and validity from the original language of the scales and (III) to examine the connections between attitudes towards seeking, avoidance or delaying the search for professional psychological help due to the demographic and individual differences of the participants, barriers, self-stigmatization and social stigmatization. We expect to carry out the first study on the given topic in the Czech Republic, to identify and better understand the factors leading to the avoidance of seeking professional help and to reveal the relationships between stigmatization, attitudes and barriers leading to the avoidance or postponement of seeking professional help. The belief is to find out whether the Czech population of young adults differs from the data found on the foreign population in individual constructs, as cultural differences in individual countries were found.

Keywords: mental health, stigma, problems, seeking psychological help

Procedia PDF Downloads 51
8798 The Effects of Cross-Border Use of Drones in Nigerian National Security

Authors: H. P. Kerry

Abstract:

Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.

Keywords: armed drones, drones, cross-border, national security

Procedia PDF Downloads 136
8797 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women

Authors: Abeer Al Kalbani

Abstract:

Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.

Keywords: food security, household food security, utilization, role of women

Procedia PDF Downloads 381
8796 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 102
8795 Renewable Energy and Energy Security in Malaysia: A Quantitative Analysis

Authors: Endang Jati Mat Sahid, Hussain Ali Bekhet

Abstract:

Robust economic growth, increasing population, and personal consumption are the main drivers for the rapid increase of energy demand in Malaysia. Increasing demand has compounded the issue of national energy security due to over-dependence on fossil fuel, depleting indigenous domestic conventional energy resources which in turns has increased the country’s energy import dependence. In order to improve its energy security, Malaysia has seriously embarked on a renewable energy journey. Many initiatives on renewable energy have been introduced in the past decade. These strategies have resulted in the exploding growth of renewable energy deployment in Malaysia. Therefore, this study investigated the impact of renewable energy deployment on energy security. Secondary data was used to calculate the energy security indicators. The study also compared the results of applying different energy security indicators namely availability, applicability, affordability and acceptability dimension of energy resources. The evaluation shows that Malaysia will experience slight improvement in availability and acceptability dimension of energy security. This study suggests that energy security level could be further enhanced by efficient utilization of energy, reducing carbon content of energy and facilitating low-carbon industries.

Keywords: energy policy, energy security, Malaysia, renewable energy

Procedia PDF Downloads 214
8794 An Investigation of Migrants' Attitudes towards Their Ethnic Languages: A Study of Angolan Migrants in Namibia

Authors: Julia Indongo - Haiduwa

Abstract:

The study looks at the attitudes of Angolan migrants in the informal sectors towards their ethnic languages. The assumption is most Angolan migrants speak Portuguese instead of their ethnic languages as they lack interest in their ethnic languages. The study was qualitative in nature, and 20 Angolan migrants who are operating in the informal sector where purposively selected for the semistructured interviews. The study revealed that many Angolan has negative attitudes towards their ethnic language because even prior to their migration to Namibia, they use Portuguese to communicate as opposed to their ethnic languages. The ethnic languages are associated with old people and the ethnic languages do not offer the migrants any economic benefits. The study recommends that there is a need for the revitalization of Angolan ethnic languages in Namibia in order to maintain the language and prevent them from dying.

Keywords: ethnic languages language attitude, language, choice, language maintenance, multilingualism

Procedia PDF Downloads 166
8793 Creating an Inclusive Classroom: Country Case Studies Analysis on Mainstream Teachers’ Teaching-Efficacy and Attitudes towards Inclusive Education in Japan and Singapore

Authors: Yei Mian Adrian Yap

Abstract:

How we idealize the regular schools to be inclusive as much as possible hinges on mainstream teachers’ attitudes and teaching-efficacy towards the inclusion of students with special needs in the regular schools. This research studies the Japanese and Singaporean mainstream teachers’ attitudes and teaching-efficacy towards the inclusion of students with special needs in the regular classrooms by investigating what key variables influence their attitudes and teaching-efficacy and how they strategize to address their challenges to include their students with special needs in their regular classrooms. In order to understand the nature of teachers’ attitudes and teaching-efficacy towards the inclusive education, a mixed-method research methodology was carried out in Japan and Singapore; it involved an explanatory sequential method of employing quantitative research first before qualitative research. In the quantitative research, 189 Japanese and 183 Singaporean teachers were invited to participate in the questionnaires and out of these participants, 38 Japanese and 15 Singaporean teachers shared their views during their semi-structured interviews. Based on the empirical findings, Japanese teachers’ attitudes and teaching-efficacy were more likely to be influenced by their experiences in teaching students with special needs, knowledge about disability legislation, presence of their disabled family members and level of confidence to teach students with special needs. On the other hand, Singaporean teachers’ attitudes and teaching-efficacy were affected by gender, educational level, received trainings in special needs education, knowledge about disability legislation and level of confidence to teach students with special needs. Both country results also demonstrated that there was a positive correlation between their teaching-efficacy and attitude. Narrative findings further expanded the reasons behind these quantitative factors that shaped teachers’ attitudes and teaching-efficacy. Also it discussed the various problems faced by Japanese and Singaporean teachers and how they identified their coping strategies to circumvent their challenges in including their students with special needs in their regular classrooms. The significance of this research manifests in necessary educational reforms in both countries especially in the context of inclusive education. These findings may not be as definitive as expected but it is believed that it could provide useful information on the current situation about teachers’ concerns towards the inclusive education. In conclusion, this research could potentially make its positive contribution to the body of literature on teachers’ attitudes and teaching-efficacy in the context of Asian developed countries and these findings could posit that regular teachers’ positive attitudes and strong sense of teaching self-efficacy could directly improve the success rate of inclusion of students with special needs in the regular classrooms.

Keywords: attitudes, inclusive education, special education, teaching-efficacy

Procedia PDF Downloads 317
8792 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 106
8791 Public Relations for the Faculty of Management Science in Suan Sunandha Rajabhat University

Authors: Narong Anurak

Abstract:

The objectives of this research were to investigate the knowledge and understanding of public relations principles for public relations officials of the office of the faculty of management science in Ratjabhat Suan Sunandha University and to determine the approach of public relations for the Office of Faculty of Management Science.  The questionnaire was utilized as a tool to collect data. Statistics utilized included frequency, percentage, mean, standard deviation, and regression analysis. The results of the research showed that the public relations officials misunderstood on public relations principles. The lack of the perception in media of the target groups both in-house and outside caused the misunderstanding on the roles, mission, and responsibilities. It would be beneficial to public relations division and other divisions of the office of the faculty of management science to be trained and obtained more knowledge and skills on the public relations to support the public relations work for the organization.

Keywords: faculty of management science, preparation in media, public relations, Suan Sunandha Rajabhat University

Procedia PDF Downloads 355
8790 Employment Discrimination on Civil Servant Recruitment

Authors: Li Lei, Jia Jidong

Abstract:

Employment right is linked to the people’s livelihood in our society. As a most important and representative part in the labor market, the employment of public servants is always taking much attention. But the discrimination in the employment of public servants has always existed and, to become a controversy in our society. The paper try to discuss this problem from four parts as follows: First, the employment of public servants has a representative status in our labor market. The second part is about the discrimination in the employment of public servants. The third part is about the right of equality and its significance. The last part is to analysis the legal predicament about discrimination in the employment of public servants in China.

Keywords: discrimination, employment of public servants, right of labor, law

Procedia PDF Downloads 380
8789 Factor Analysis Based on Semantic Differential of the Public Perception of Public Art: A Case Study of the Malaysia National Monument

Authors: Yuhanis Ibrahim, Sung-Pil Lee

Abstract:

This study attempts to address factors that contribute to outline public art factors assessment, memorial monument specifically. Memorial monuments hold significant and rich message whether the intention of the art is to mark and commemorate important event or to inform younger generation about the past. Public monument should relate to the public and raise awareness about the significant issue. Therefore, by investigating the impact of the existing public memorial art will hopefully shed some lights to the upcoming public art projects’ stakeholders to ensure the lucid memorial message is delivered to the public directly. Public is the main actor as public is the fundamental purpose that the art was created. Perception is framed as one of the reliable evaluation tools to assess the public art impact factors. The Malaysia National Monument was selected to be the case study for the investigation. The public’s perceptions were gathered using a questionnaire that involved (n-115) participants to attain keywords, and next Semantical Differential Methodology (SDM) was adopted to evaluate the perceptions about the memorial monument. These perceptions were then measured with Reliability Factor and then were factorised using Factor Analysis of Principal Component Analysis (PCA) method to acquire concise factors for the monument assessment. The result revealed that there are four factors that influence public’s perception on the monument which are aesthetic, audience, topology, and public reception. The study concludes by proposing the factors for public memorial art assessment for the next future public memorial projects especially in Malaysia.

Keywords: factor analysis, public art, public perception, semantical differential methodology

Procedia PDF Downloads 478
8788 Motivation and Attitudes toward Learning English and German as Foreign Languages among Sudanese University Students

Authors: A. Ishag, E. Witruk, C. Altmayer

Abstract:

Motivation and attitudes are considered as hypothetical psychological constructs in explaining the process of second language learning. Gardner (1985) – who first systematically investigated the motivational factors in second language acquisition – found that L2 achievement is related not only to the individual learner’s linguistic aptitude or general intelligence but also to the learner’s motivation and interest in learning the target language. Traditionally language learning motivation can be divided into two types: integrative motivation – the desire to integrate oneself with the target culture; and instrumental motivation – the desire to learn a language in order to meet a specific language requirement such as for employment. One of the Gardner’s main ideas is that the integrative motivation plays an important role in second language acquisition. It is directly and positively related to second language achievement more than instrumental motivation. However, the significance of integrative motivation reflects a rather controversial set of findings. On the other hand, Students’ attitudes towards the target language, its speakers and the learning context may all play some part in explaining their success in learning a language. Accordingly, the present study aims at exploring the significance of motivational and attitudinal factors in learning foreign languages, namely English and German among Sudanese undergraduate students from a psycholinguistic and interdisciplinary perspective. The sample composed of 221 students from the English and German language departments respectively at the University of Khartoum in Sudan. The results indicate that English language’s learners are instrumentally motivated and that German language’s learners have positive attitudes towards the German language community and culture. Furthermore, there are statistical significant differences in the attitudes toward the two languages due to gender; where female students have more positive attitudes than their male counterparts. However, there are no differences along the variables of academic grade and study level. Finally, the reasons of studying the English or German language have also been indicated.

Keywords: motivation and attitudes, foreign language learning, english language, german language

Procedia PDF Downloads 648
8787 COVID-19 Vaccine Hesitancy: The Role of Existential Concerns in Individual’s Decisions Regarding the Vaccine Uptake

Authors: Vittoria Franchina, Laura Salerno, Rubinia Celeste Bonfanti, Gianluca Lo Coco

Abstract:

This study examines the relationships between existential concerns (ECs), basic psychological needs (BPNs), vaccine hesitancy (VH), and the mediating role of negative attitudes toward COVID-19 vaccines. A cross-sectional survey was carried out on a sample of two-hundred eighty-seven adults (Mage = 36.04 (12.07); 59.9% females). Participants were recruited online through clickworker and filled in measures on existential concerns, basic psychological needs, attitudes toward COVID-19 vaccines, and vaccine hesitancy for Pfizer-BioNTech and Astrazeneca vaccines separately. Structural equation modelling showed that existential concerns were related to Pfizer-BioNTech and Astrazeneca vaccine hesitancy both directly and indirectly through negative attitudes toward possible side effects of COVID-19 vaccines. The present study has identified several predictive factors relating to the intention to uptake vaccination to protect against COVID-19 in Italy. Specifically, these findings suggest a causal link between existential concerns, attitudes, and vaccine hesitancy.

Keywords: COVID-19, existential concerns, Pfizer-BioNTech and Astrazeneca vaccines, vaccine hesitancy

Procedia PDF Downloads 72