Search results for: school security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5700

Search results for: school security

5430 Order vs. Justice: The Cases of Libya and Syria from the Perspective of the English School Theory

Authors: A. Gün Güneş

Abstract:

This study aims to explicate the functionality of the responsibility to protect (R2P) in terms of order and justice within the context of the main traditions of the English School theory. The conflicts in Libya and Syria and the response of the international society to these crises are analyzed in the pluralism-solidarism dichotomy of the English School. In this regard, the intervention under R2P in Libya exemplifies the solidaristic side emphasizing justice, while the non-intervention in Syria exemplifies the pluralistic side emphasizing order. This study discusses the cases of Libya and Syria on the basis of Great Powers.

Keywords: English school theory, international society, order, justice, responsibility to protect

Procedia PDF Downloads 399
5429 A Study on Classic Literature Education in Primary School Using Out-of-School Literature Appreciation Program: An Practice Study Applied to Primary School in Korea

Authors: Hyo Jung Lee

Abstract:

The purpose of this study is to develop a literature appreciation education program for classic literatures and apply them to the field, and to derive the achievements and improvement points. Classic literature is a work of value recognized in the context of literature history and culture history, and learners can develop interest in literature and inherit tradition through appreciation of classic literature. However, in Korean educational environment, classic literature is a means for college entrance examination, and many learners analyze contents and language in textbooks and concentrate on memorizing the whole plot. This study is one of the reasons that classic literature appreciation education is not done properly and it is not able to give an opportunity to appreciate the whole work in the early learning stage. In Korean primary education, classic literature is used as a means to achieve the goals of reading, writing, speaking and listening, rather than being used as a material for its own appreciation. It is problematic to make the piece appreciation experience fragmentary. This study proposes a program to experience classic literatures by linking school education and school library with primary school students in grades 4-6. We work with local primary schools (siheung-si, gyeonggi-do, Korea) to provide appropriate activities and rewards to learners, observe their participation, and introduce student learning outcomes. Through this, we are able to systematically improve the learner 's ability to appreciate the literature and to diversify primary education.

Keywords: classic literature education, primary education, out-of-school program, learning by appreciation experience

Procedia PDF Downloads 120
5428 A Tutorial on Network Security: Attacks and Controls

Authors: Belbahi Ahlam

Abstract:

With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.

Keywords: network security, attacks and controls, computer and information, solutions

Procedia PDF Downloads 420
5427 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: interoperability, threats, attacks, medical devices

Procedia PDF Downloads 304
5426 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 21
5425 School Emergency Drills Evaluation through E-PreS Monitoring System

Authors: A. Kourou, A. Ioakeimidou, V. Avramea

Abstract:

Planning for natural disasters and emergencies is something every school or educational institution must consider, regardless of its size or location. Preparedness is the key to save lives if a disaster strikes. School disaster management mirrors individual and family disaster prevention, and wider community disaster prevention efforts. This paper presents the usage of E-PreS System as a helpful, managerial tool during the school earthquake drill, in order to support schools in developing effective disaster and emergency plans specific to their local needs. The project comes up with a holistic methodology using real-time evaluation involving different categories of actors, districts, steps and metrics. The main outcomes of E-PreS project are the development of E-PreS web platform that host the needed data of school emergency planning; the development of E-PreS System; the implementation of disaster drills using E-PreS System in educational premises and local schools; and the evaluation of E-PreS System. Taking into consideration that every disaster drill aims to test and valid school plan and procedures; clarify and train personnel in roles and responsibilities; improve interagency coordination; identify gaps in resources; improve individual performance; and identify opportunities for improvement, E-PreS Project was submitted and approved by the European Commission (EC).

Keywords: disaster drills, earthquake preparedness, E-PreS System, school emergency plans

Procedia PDF Downloads 207
5424 The Role of Digital Text in School and Vernacular Literacies: Students Digital Practices at Cybercafés in Mexico

Authors: Guadalupe López-Bonilla

Abstract:

Students of all educational levels participate in literacy practices that may involve print or digital media. Scholars from the New Literacy Studies distinguish practices that fulfill institutional purposes such as those established at schools from literate practices aimed at doing other kinds of activities, such as reading instructions in order to play a video game; the first are known as institutional practices while the latter are considered vernacular literacies. When students perform these kinds of activities they engage with print and digital media according to the demands of the task. In this paper, it is aimed to discuss the results of a research project focusing on literacy practices of high school students at 10 urban cybercafés in Mexico. The main objective was to analyze the literacy practices of students performing both school tasks and vernacular literacies. The methodology included a focused ethnography with online and face to face observations of 10 high school students (5 male and 5 female) and interviews after performing each task. In the results, it is presented how students treat texts as open, dynamic and relational artifacts when engaging in vernacular literacies; while texts are conceived as closed, authoritarian and fixed documents when performing school activities. Samples of each type of activity are shown followed by a discussion of the pedagogical implications for improving school literacy.

Keywords: digital literacy, text, school literacy, vernacular practices

Procedia PDF Downloads 242
5423 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 148
5422 A Study of Mental Health of Higher Secondary School Going Children in Rural Area

Authors: Tanmay L. Joshi

Abstract:

The Mental health allows children and young people to develop the resilience to cope with whatever life throws at them and grow into well-rounded, healthy adults. In urban area, many health professionals are working for the well being for younger population. There is so much of potential in rural area. However, the rural population is somehow neglected. Apart from lack of availability of basic needs like transport, electricity, telecommunication etc; the Psychological health is also overlooked in such area. There are no mental health professionals like Psychologists, counselors etc. So the researcher tries to throw some light on the mental health of Higher Secondary School going children in rural area. The current research tries to study the Mental Health (Confidence, Sociability and Neurotic Tendency) of Higher Secondary School going children. Researchers have used the tool Vyaktitva Shodhika (a personality inventory) by Dr. U. Khire (JPIP,Pune). The Sample size is 45 (N= 40, 24 boys/21 girls). The present study may provide a good support to inculcate emotional-management programs for higher secondary school going children in rural areas.

Keywords: mental health, neurotic tendency, rural area, school going children

Procedia PDF Downloads 564
5421 Foreign Policy and National Security Dilemma: Examining Nigerian Experience

Authors: Shuaibu Umar Abdul

Abstract:

The essence of any state as well as government is to ensure and advance the security of lives and property of its citizens. As a result, providing security in all spheres ranging from safeguarding the territorial integrity, security of lives and property of the citizens as well as economic emancipation have constitute the core objectives cum national interest of virtually all country’s foreign policy in the world. In view of this imperative above, Nigeria has enshrined in the early part of her 1999 constitution as amended, as its duty and responsibility as a state, to ensure security of lives and property of its citizens. Yet, it does not make any significant shift as it relates to the country’s fundamental security needs as exemplified by the current enormous security challenges that reduced the country’s fortune to the background in all ramifications. The study chooses realist paradigm as theoretical underpinning which emphasizes that exigency of the moment should always take priority in the pursuit of foreign policy. The study is historical, descriptive and narrative in method and character. Data for the study was sourced from secondary sources and analysed via content analysis. The study found out that it is lack of political will on the side of the government to guarantee a just and egalitarian society that will be of benefit to all citizens. This could be more appreciated when looking at the gaps between the theory in Nigerian foreign policy and the practice as exemplified by the action or inaction of the government to ensure security in the state. On this account, the study recommends that until the leaderships in Nigerian foreign policy recognized the need for political will and respect for constitutionalism to ensure security of its citizens and territory, otherwise achieving great Nigeria will remain an illusion.

Keywords: foreign policy, nation, national security, Nigeria, security

Procedia PDF Downloads 483
5420 Food Security of Migrants in a Regional Area of Australia: A Qualitative Study

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Rosa McManamey

Abstract:

Food security indicates the ability of individuals, households and communities to acquire food that is healthy, sustainable, affordable, appropriate and accessible. Despite Australia’s current ability to produce enough food to feed a population larger than its current population, there has been substantial evidence over the last decades to demonstrate many Australians struggle to feed themselves, including those from a cultural and linguistically diverse (CALD) background. The study aimed to investigate migrants’ perceptions and experiences on food security in Tasmania. Semi-structured interviews were conducted with 33 migrants residing in North, South and North West Tasmania, who were recruited through purposive sampling. Thematic analysis was employed to analyse the interview data. Four main themes were identified from the interview data: (1) Understanding of food security; (2) Experiences with the food security in Tasmania; (3) Factors that influence migrants’ food security in Tasmania; and (4) Acculturation strategies. Various sub-themes have emerged under each of these four major themes. Though the findings indicate participants are satisfied with their current food security in Tasmania, they still encounter some challenges in food availability, accessibility, and affordability in Tasmania. Factors that influence migrants’ food security were educational background, language barrier, socioeconomic status, geographical isolation, and cultural background. By using different acculturation strategies, migrants managed to adapt to the new food culture. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. The findings indicate migrants residing in Tasmania face different challenges on food security. They use different strategies for food security while acculturating into a new environment. The findings may provide useful information for migrants in Australia and various private organisations or relevant government departments that address food security for migrants.

Keywords: experiences, food security, migrants, perceptions

Procedia PDF Downloads 396
5419 Can Empowering Women Farmers Reduce Household Food Insecurity? Evidence from Malawi

Authors: Christopher Manyamba

Abstract:

Women in Malawi produce perform between 50-70 percent of all agricultural tasks and yet the majority remain food insecure. The aim of his paper is to build on existing mixed evidence that indicates that empowering women in agriculture is conducive to improving food security. The WEAI is used to provide evidence on the relationship between women’s empowerment in agriculture and household food security. A multinomial logistic regression is applied to the Women Empowerment in Agriculture Index (WEAI) components and the Household Hunger Scale. The overall results show that the WEAI can be used to determine household food insecurity; however it has to be contextually adapted. Assets ownership, credit, group membership and leisure time are positively associated with food security. Contrary to other literature, empowerment in having control and decisions on income indicate negative association with household food security. These results could potentially better inform public, private and civil society stakeholders’ dialogues in creating the most effective and sustainable interventions to help women attain long-term food security.

Keywords: food security, gender, empowerment, agriculture index, framework for African food security, household hunger scale

Procedia PDF Downloads 339
5418 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 323
5417 Indoor Air Assessment and Health Risk of Volatile Organic Compounds in Secondary School Classrooms in Benin City, Edo State, Nigeria

Authors: Osayomwanbor E. Oghama, John O. Olomukoro

Abstract:

The school environment, apart from home, is probably the most important indoor environment for children. Children spend as much as 80-90% of their indoor time either at school or at home; an average of 35 - 40 hours per week in schools, hence are at the risk of indoor air pollutants such as volatile organic compounds (VOCs). Concentrations of VOCs vary widely but are generally higher indoors than outdoors. This research was, therefore, carried out to evaluate the levels of VOCs in secondary school classrooms in Benin City, Edo State. Samples were obtained from a total of 18 classrooms in 6 secondary schools. Samples were collected 3 times from each school and from 3 different classrooms in each school using Draeger ORSA 5 tubes. Samplers were left to stay for a school-week (5 days). The VOCs detected and analyzed were benzene, ethlybenzene, isopropylbenzene, naphthalene, n-butylbenzene, n-propylbenzene, toluene, m-xylene, p-xylene, o-xylene, styrene, chlorobenzene, chloroform, 1,2-dichloropropane, 2,2-dichloropropane, tetrachloroethane, tetrahydrofuran, isopropyl acetate, α-pinene, and camphene. The results showed that chloroform, o-xylene, and styrene were the most abundant while α-pinene and camphene were the least abundant. The health risk assessment was done in terms of carcinogenic (CRI) and non-carcinogenic risks (THR). The CRI values of the schools ranged from 1.03 × 10-5 to 1.36 × 10-5 μg/m³ (a mean of 1.16 × 10-5 μg/m³) with School 6 and School 3 having the highest and lowest values respectively. The THR values of the study schools ranged from 0.071-0.086 μg/m³ (a mean of 0.078 μg/m³) with School 3 and School 2 having the highest and lowest values respectively. The results show that all the schools pose a potential carcinogenic risks having CRI values greater than the recommended limit of 1 × 10-6 µg/m³ and no non-carcinogenic risk having THR values less than the USEPA hazard quotient of 1 µg/m³. It is recommended that school authorities should ensure adequate ventilation in their schools, supplementing natural ventilation with mechanical sources, where necessary. In addition, indoor air quality should be taken into consideration in the design and construction of classrooms.

Keywords: carcinogenic risk indicator, health risk, indoor air, non-carcinogenic risk indicator, secondary schools, volatile organic compounds

Procedia PDF Downloads 163
5416 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 277
5415 School Based Assessment Issues in Selected Malaysian Primary Schools

Authors: Nur Amalina Dayana Abd Aziz

Abstract:

Assessment is an integral part of teaching and learning in any syllabus in the world. Recently, a new assessment system, School-Based Assessment (SBA) was introduced and implemented in the Malaysian education system to promote a more holistic, integrated and balanced assessment system. This effort is part of the reformation made in the Government Transformation Plan (GTP) to produce a world-class human capital as we are reaching and achieving the Vision 2020 in the near future. However, this new change has raised awareness and concerns from teachers, students, parents and non-profit organizations on how the new assessment is to be implemented and how it is affecting the students and teachers particularly. Therefore, this paper aims to investigate the issues that teachers face in implementing SBA in primary schools, the measures taken to address the issues and to propose ways of managing school-based assessment. Five national primary schools focusing in the urban areas in the Selangor state are chosen for this study to carry out. Data for the study will be gathered from interviews with teachers from each school, surveys and classrooms observation will be conducted in each school, and relevant documents are collected from the selected schools. The findings of this study will present the current issues that teachers from various types of national primary schools are facing and what actions they took to overcome the problems in carrying out SBA. Suggestions on how to better manage school-based assessment for teachers are also provided in this paper.

Keywords: community of practice, curriculum, managing change, school-based assessment

Procedia PDF Downloads 399
5414 Towards a Security Model against Denial of Service Attacks for SIP Traffic

Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla

Abstract:

Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.

Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities

Procedia PDF Downloads 170
5413 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations

Authors: Ramon Santana

Abstract:

The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.

Keywords: fingerprint, template protection, bio-cryptography, minutiae protection

Procedia PDF Downloads 142
5412 Human Development as an Integral Part of Human Security within the Responsibility to Rebuild

Authors: Themistoklis Tzimas

Abstract:

The proposed paper focuses on a triangular relationship, between human security, human development and responsibility to rebuild. This relationship constitutes the innovative contribution to the debate about human security. Human security constitutes a generic and legally binding notion, which orientates from an integrated approach the UN Charter principles and of the collective security system. Such an approach brings at the forefront of international law and of international relations not only states but non- state actors as well. Several doctrines attempt to implement the fore-mentioned approach among which the Responsibility to Protect- hereinafter R2P- doctrine and its aspect of Responsibility to Rebuild- hereinafter R2R. In this sense, R2P in general and R2R are supposed to be guided by human security imperatives. Human security because of its human- centered approach encompasses as an integral part of it, human development. Human development constitutes part of the backbone of human security, since it deals with the social and economic root- causes of the threats, which human security attempts to confront. In this sense, doctrines which orientate from human security, such as R2P and its R2R aspect should also take into account human development imperatives, in order to improve their efficiency. On the contrary though, R2R is more often linked with market- orientated policies, which are often imposed under transitional authorities, regardless of local needs. The implementation of such policies can be identified as a cause for striking failures in the framework of R2R. In addition it is a misinterpretation of the essence of human security and subsequently of R2P as well. The findings of the article, on the basis of the fore-mentioned argument is that a change must take place from a market- orientated misinterpretation of R2R to an approach attempting to implement human development doctrines, since the latter lie at the heart of human security and can be proven more effective in dealing with the root- causes of conflicts. Methodologically, the article begins with an examination of human security and of its binding nature on the basis of its orientation from the UN Charter. It also examines its significance in the framework of the collective security system. Then, follows the analysis of why and how human development constitutes an integral part of human security. At the next part it is proven that R2P in general and R2R more specifically constitute or should constitute an attempt to implement human security doctrines within the collective security system. Having built this triangular relationship it is argued that human development is proven to be the most suitable notion, so that the spirit of human security and the scopes of R2P are successfully implemented.

Keywords: human security, un charter, responsibility to protect, responsibility to rebuild, human development

Procedia PDF Downloads 254
5411 Human Security and Human Trafficking Related Corruption

Authors: Ekin D. Horzum

Abstract:

The aim of the proposal is to examine the relationship between human trafficking related corruption and human security. The proposal suggests that the human trafficking related corruption is about willingness of the states to turn a blind eye to the human trafficking cases. Therefore, it is important to approach human trafficking related corruption in terms of human security and human rights violation to find an effective way to fight against human trafficking. In this context, the purpose of this proposal is to examine the human trafficking related corruption as a safe haven in which trafficking thrives for perpetrators.

Keywords: human trafficking, human security, human rights, corruption, organized crime

Procedia PDF Downloads 440
5410 Micropolitical Leadership in a Taiwanese Primary School

Authors: Hsin-Jen Chen

Abstract:

Primary schooling in Taiwan is in a process of radical restructuring during the decade. At the center of these restructuring is the position of the principal and questions to do with how principals, as school leaders, respond to radical change. Adopting a case-study approach, the study chose a middle Taiwanese primary school to investigate how the principal learned to be political. Using micropolitical leadership, the principal at the researched site successfully coped with internal change and external demands. On the whole, judging from the principal’s leadership style on the mediation between parents and teachers, as well as school-based curriculum development, it could be argued that the principal was on the stance of being a leader of the cultural transformation instead of cultural reproduction. In doing so, the qualitative evidence has indicated that the principal seemed to be successful in coping with the demands of rapid change. Continuing learning for leadership is the core of working as a principal.

Keywords: micropolitics, leadership, micropolitical leadership, learning for leadership

Procedia PDF Downloads 193
5409 Impact of Mid-Day Meal on Nutritional Status of Primary School Children in Haryana, India

Authors: Vinti Davar

Abstract:

India is one among the many countries where child malnutrition is severe and also a major underlying cause of child mortality. The Mid Day Meal (MDM) program was launched to improve the nutritional status of children, attendance, and retention in schools. It was based on one meal provided to the children, who are attending elementary school (primary school). The objective of present study was to evaluate the impact of mid-day meal on the nutritional status of primary school children in Haryana, India. The present work was carried out on 1200 children between 6-11years of age, studying in primary schools in Haryana, India. Out of these 960 students as, the experimental group was selected from schools where mid-day meal is supplied by the government, and 240 students as control group where mid-day meal is not supplied. The mean height, weight, and BMI of children of both the groups were found to be significantly low as compared to NCHS standards. Stunting was found in 56.40% MDMB (Mid-day meal beneficiaries) and 62.50 % NMDMC (non- mid-day meal children).The weight of almost all subjects were low according to age indicating thinness. Anemia was more prevalent in MDMB as compared to NMDMC may be because school meals did not include vegetables. The consumption of energy, proteins, fat, calcium, iron, vitamins was significantly low (P ≤ .01) in both groups especially in girls of NMDM. The consumption of various food groups except vegetables was better in MDMB compared to NMDMC. It is concluded that with certain improvements, mid-meal can be beneficial in meeting everyday requirements of school going children.

Keywords: foods, meals, nutritional status, school going children

Procedia PDF Downloads 280
5408 Exploration of Perceived Value of a Special Education Laws and Ethics’ Course Impact on Administrator Capacity

Authors: Megan Chaney

Abstract:

In the United States, research continues to show school administrators do not view themselves as adequately prepared in the area of special education. Often, special education is an omitted topic of study for school administrator preparation programs. The majority of special education teachers do not view their principals as well-prepared to support them in the educational context. Administrator preparation in the area of special education may begin at the foundational levels of understanding but is fundamentally an equity issue when serving individuals from marginalized populations with an urgent need to increase inclusionary practices. Special education and building-level administrators have a direct impact on teacher quality, instructional practices, inclusion, and equity with the opportunity to shape positive school culture. The current study was situated within an innovative IHE/LEA partnership pathway implemented with current K-12 administrators earning a Mild/Moderate Education Specialist Credential or coursework equivalent. Specifically, the study examined administrator’s perception of the Special Education Laws and Ethics’ course value and impact on the capacity to serve children with exceptionalities within the comprehensive school site context.

Keywords: special education laws and ethics, school adminstrator perspectives, school administrator training, inclusive practices

Procedia PDF Downloads 84
5407 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 113
5406 A Critical-Quantitative Approach to Examine the Effects of Systemic Factors on Education Outcomes

Authors: Sireen Irsheid

Abstract:

Despite concerted efforts to improve education attainment with progress in recent years, student achievement and attainment remain among the most significant challenges for school districts across the United States. Many scholars have argued that students who do not complete high school do not drop out of school voluntarily but are ‘pushed out’ of schools through multiple mechanisms related to structural and socioeconomic barriers, behavioral health challenges, pedagogical practices, and administrative procedures. Extant literature has shown that living in historically disadvantaged neighborhoods or attending under-resourced schools exacerbates student-level risk factors for grade retention and school pushout. Most efforts to respond to the school pushout phenomenon have focused on individual characteristics of students, with relatively little attention to addressing these multiple system-level characteristics related to perpetuating inequities. This study is built on a growing body of social justice-oriented research concerned with the systemic influences that shape the experiences and mental health challenges of young people. Specifically, this study examined how young people who have been experiencing education inequities make meaning and navigate the structural factors related to neighborhood and school disinvestment and access to resources and supports, and their risk for school pushout. Furthermore, schools as political, cultural, and ideologically reproductive spaces often serve as sites of resistance and can support students who are impacted by educational inequity. Study findings provide education, neighborhood, school psychology, social work practice, and policy considerations.

Keywords: education policy, mental health, school prison nexus, school pushout, structural trauma

Procedia PDF Downloads 21
5405 Perception of Inclusion in Higher Education

Authors: Hoi Nga Ng, Kam Weng Boey, Chi Wai Kwan

Abstract:

Supporters of Inclusive education proclaim that all students, regardless of disabilities or special educational needs (SEN), have the right to study in the normal school setting. It is asserted that students with SEN would benefit in academic performance and psychosocial adjustment via participation in common learning activities within the ordinary school system. When more and more students of SEN completed their early schooling, institute of higher education become the setting where students of SEN continue their learning. This study aimed to investigate the school well-being, social relationship, and academic self-concept of students of SEN in higher education. The Perception of Inclusion Questionnaire (PIQ) was used as the measuring instruments. PIQ was validated and incorporated in a questionnaire designed for online survey. Participation was voluntary and anonymous. A total of 90 students with SEN and 457 students without SEN responded to the online survey. Results showed no significant differences in school well-being and social relationship between students with and without SEN, but students with SEN, particularly those with learning and development impairment and those with mental illness and emotional problems, were significantly poorer in academic self-concept. Implications of the findings were discussed.

Keywords: ccademic self-concept, school well-being, social relationship, special educational needs

Procedia PDF Downloads 149
5404 Optimizing the Passenger Throughput at an Airport Security Checkpoint

Authors: Kun Li, Yuzheng Liu, Xiuqi Fan

Abstract:

High-security standard and high efficiency of screening seem to be contradictory to each other in the airport security check process. Improving the efficiency as far as possible while maintaining the same security standard is significantly meaningful. This paper utilizes the knowledge of Operation Research and Stochastic Process to establish mathematical models to explore this problem. We analyze the current process of airport security check and use the M/G/1 and M/G/k models in queuing theory to describe the process. Then we find the least efficient part is the pre-check lane, the bottleneck of the queuing system. To improve passenger throughput and reduce the variance of passengers’ waiting time, we adjust our models and use Monte Carlo method, then put forward three modifications: adjust the ratio of Pre-Check lane to regular lane flexibly, determine the optimal number of security check screening lines based on cost analysis and adjust the distribution of arrival and service time based on Monte Carlo simulation results. We also analyze the impact of cultural differences as the sensitivity analysis. Finally, we give the recommendations for the current process of airport security check process.

Keywords: queue theory, security check, stochatic process, Monte Carlo simulation

Procedia PDF Downloads 169
5403 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 295
5402 Experimental Study on the Effectiveness of Extracurricular Football Training for Improving Primary Students Physical Fitness

Authors: Yizhi Zhang, Xiaozan Wang, Mingming Guo, Pengpeng Li

Abstract:

Introduction: The purpose of this study is to examine the effectiveness of after-school football training in improving the physical fitness of primary school students, so as to provide corresponding suggestions for carrying out after-school football training in primary schools. Methods: A total of 72 students from the experimental primary school of Mouping district, Yantai city, Shandong province, participated in this experiment. The experiment was conducted for two semesters. During the experiment period, the experimental group conducted one-hour football training after school from Monday to Thursday afternoon every week, and two hours of football training on Saturday morning every week. The control group conducted sports teaching and extracurricular activities as usual without other intervention. Before and after the experiment, both the experimental group and the control group underwent physical fitness tests according to the physical fitness test standards of Chinese students, including lung capacity, 50-meter run, one-minute skipping rope, sitting forward flexor, and one-minute sit-ups. The test results were all converted to the 100-point system according to the scoring standards. Results: (1) Before the experiment, there was no significant difference between the experimental group and the control group in various physical fitness indicators (p > 0.05). (2) After the experiment, the lung capacity score (T = 3.108, p < 0.05), the 50-meter run score (T = 6.593, p < 0.05), the skipping score (T = 9.227, p < 0.05), the sitting forward flexor score (T = 3.742, p < 0.05), and the sit-up score (T = 5.210, p < 0.05) of the experimental group were significantly higher than that of the control group. Conclusion: This study shows that the physical fitness of primary school students can be improved by football training in their spare time. It is suggested to carry out after-school football training activities in primary schools so as to effectively improve the physical fitness of pupils.

Keywords: after-school football training, physical fitness, primary school students, school sports

Procedia PDF Downloads 108
5401 Assessing the Efficacy of Network Mapping, Vulnerability Scanning, and Penetration Testing in Enhancing Security for Academic Networks

Authors: Kenny Onayemi

Abstract:

In an era where academic institutions increasingly rely on information technology, the security of academic networks has emerged as a paramount concern. This comprehensive study delves into the effectiveness of security practices, including network mapping, vulnerability scanning, and penetration testing, within academic networks. Leveraging data from surveys administered to faculty, staff, IT professionals and IT students in the university, the study assesses their familiarity with these practices, perceived effectiveness, and frequency of implementation. The findings reveal that a significant portion of respondents exhibit a strong understanding of network mapping, vulnerability scanning, and penetration testing, highlighting the presence of knowledgeable professionals within academic institutions. Additionally, active scanning using network scanning tools and automated vulnerability scanning tools emerge as highly effective methods. However, concerns arise as the respondents show that the academic institutions conduct these practices rarely or never. Notably, many respondents have reported significant vulnerabilities or security incidents through these security measures within their institution. This study concludes with recommendations to enhance network security awareness and practices among faculty, staff, IT personnel, and students, ultimately fortifying the security posture of academic networks in the digital age.

Keywords: network security, academic networks, vulnerability scanning, penetration testing, information security

Procedia PDF Downloads 22