Search results for: school security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5869

Search results for: school security

5749 Teacher Professional Development –Current Practices in a Secondary School in Brunei Darussalam

Authors: Shanthi Thomas

Abstract:

This research paper presents the current practices of teacher professional development, perceived as beneficial by teachers themselves, in a private secondary school in Brunei Darussalam. This is part of the findings of a larger qualitative study on teacher empowerment, using ethnographic methods for data collection, i.e. participant observation, interviews and document analysis. The field work was carried out over a period of six months in 2013. An analysis of the field data revealed multiple pathways of teacher professional development existing in the school. The results indicate that school leaders, the teacher community in the school, students, and the teachers themselves were the agents in a school that facilitated teacher empowerment. Besides contributing to the knowledge base on teacher professional development, the results of this study provides directions for educational policy makers in their efforts to enhance professional development in secondary schools of similar characteristics. For school leaders and the teacher community, these findings offer guidelines for maximizing the opportunities for these professional development practices, by strengthening collegiality and by using the existing structures optimally for the benefit of all concerned.

Keywords: colleagues and the wider teacher community, school leaders, self-driven professional development, teacher professional development

Procedia PDF Downloads 405
5748 A Study on 5-11 Year-Old Children's Level of Knowledge about Personal Safety and Protection from Social Dangers

Authors: Özden Kuşcu, Yağmur Kuşcu, Zeynep Çetintaş, S. Sunay Yildirim Doğru

Abstract:

The purpose of this work is to evaluate the effect of the subjects “personal safety” and “protection from dangers” included in primary school curriculum on the students’ levels of knowledge about safety and protection from social dangers. The study group included 469 students between 5–11 years old with 231 preschoolers and 238 primary school students and their parents and teachers. Instruments used to collect data were “Personal Safety Interview Form” for children, “Parent Interview Form” and “Teacher Interview Form”. Forms included 15 open-ended questions about personal safety. The researchers collected the research data through one-on-one interviews with children. Results of the study revealed that preschoolers and 1st, 2nd, and 3rd graders did not know their home addresses and telephone numbers and their families were not aware of that. The study also showed that those who had this information were unsure as to who to share this information with. Accordingly, more should be done to increase the levels of knowledge of preschoolers and 1st, 2nd, and 3rd graders about personal safety and protection from dangers.

Keywords: security, social danger, elementary school, preschool

Procedia PDF Downloads 452
5747 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture

Authors: Wiriranai Brilliant Masara

Abstract:

The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.

Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund

Procedia PDF Downloads 134
5746 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 496
5745 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 162
5744 The Interpretation of World Order by Epistemic Communities in Security Studies

Authors: Gabriel A. Orozco

Abstract:

The purpose of this article is to make an approach to the Security Studies, exposing their theories and concepts to understand the role that have had in the interpretation of the changes and continuities of the world order and their impact on policies or decision-making facing the problems of the 21st century. The aim is to build a bridge between the security studies as a subfield and the meaning that has been given to the world order. The idea of epistemic communities serves as a methodological proposal about the different programs of research in security studies, showing their influence in the realities of States, intergovernmental organizations and transnational forces, moving to implement, perpetuate and project a vision of the world order.

Keywords: security studies, epistemic communities, international, relations

Procedia PDF Downloads 264
5743 Mother and Father Involvement and Students’ School Performance: A Study on Private Primary Schools in Bahir Dar City, Ethiopia

Authors: Alemayehu Belay Emagnaw

Abstract:

This study was conducted to investigate the relationship of mother and father involvement with students’ school performance and the effect of selected family demographic variables (mother and father education, family structure and sex of students) to the involvement of mothers and fathers in their children’s school performance. In addition, this study attempted to differentiate the level of involvement of mothers’ and fathers’ in their children’s school performance. The research was conducted in Bahirdar City, Ethiopia. A total of 175 students (boys were 85 and girls were 90) of grade 7th and 8th private primary schools were selected as respondents using stratified random sampling technique. The data were collected using a questionnaire. Analysis of the data showed that fathers and mothers have significant involvement in their children’s school performance. A significant difference was also found between mothers and fathers involvement in their children’s school performance. Mothers were better involved in their children school performance than fathers. The analysis of inter-correlation between variables showed that there is a statistically significant relationship between mother and father education, mother and father involvement, and school performance whereas, family structure and sex of the child had no significant relationship with school performance.

Keywords: family structure, parental education, parental involvement, school performance

Procedia PDF Downloads 152
5742 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 110
5741 Implications of Private Military Security Companies on Stewardship of the Profession of Arms

Authors: Kevin Krupski

Abstract:

Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms.

Keywords: stewardship, military profession, civil-military, security

Procedia PDF Downloads 242
5740 Patterns of Problem Behavior of Out-Of-School Adolescents and Gender Difference in South Korea

Authors: Jaeyoung Lee, Minji Je

Abstract:

Objectives: The adolescents not attending school are named out-of-school adolescents. They are more vulnerable to health management and are likely to be exposed to a number of risk factors. This study was conducted to investigate the problem behavior of out-of-school adolescents and analyze the difference caused by gender. Methods: In this study, the problem behaviors of out-of-school adolescents, the vulnerable class, were defined in 8 types and based on this definition, the survey on run away from home, drop out, prostitution, violence, internet game addiction, theft, drug addiction, and smoking was conducted. The study was conducted in a total of 507 out-of-school adolescents, including 342 males, and 165 females. The type, frequency and start time of the 8 problem behaviors were identified. The collected data were analyzed with chi-square test and t-test using SPSS statistics 22. Results: Among the problem behaviors of the subjects, violence ( =17.41, p < .001), internet game addiction ( =16.14, p < .001), theft ( =22.48, p < .001), drug addiction ( =4.17, p=.041), and smoking ( =3.90, p=.048) were more significantly high in male out-of-school adolescents than female out-of-school adolescents. In addition, the frequency of the problem behavior was higher in male out-of-school adolescents with statistical significance than in female out-of-school adolescents (t=5.08, p= < .001). In terms of the start time of the problem behavior, only internet game addiction was higher in male out-of-school adolescents with the statistical significance than in female out-of-school adolescents ( =6.22, p=.032). No statistically significant difference was found in other problem behaviors (p > .05). Conclusions: In this study, it was found that gender difference in problem behaviors of out-of-school adolescents exists, and its frequency and difference of types were identified. When the social countermeasures were provided for those adolescents, a distinguished approach is required depending on the patterns of problem behavior and gender. When preparing policy alternatives and interventions for out-of-school adolescents, it is required to reflect the results of this study.

Keywords: addictive behavior, adolescent, gender, problem behavior

Procedia PDF Downloads 201
5739 Parents’ Opinions on Compulsory Pre-school Attendance in the Czech Republic

Authors: Beata Hornickova, Sona Lorencova

Abstract:

The study deals with the presentation of the results of qualitatively oriented research, which was carried out in the scope of determining the attitudes of parents to preschool education in the Czech Republic. The research is conceived as an entry into the field of the researched issue and aimed to support the effectiveness of the items of the questionnaire, which was subsequently created based on the parents’ statements from interviews. The research method was interview with 15 parents of preschool children. The main aim of the interviews was to find out their views on the compulsory attendance of their children in kindergarten. Compulsory pre-school attendance has been introduced in the Czech Republic since 2017/18 with the aim of reducing delays in the entry of children into primary school and eliminating subsequent school failures. The findings offered a look at the differing views on compulsory kindergarten school influenced by the different socio-economic status of parents. Parents with a higher socio-economic status attached greater importance to the educational component of compulsory preschool attendance as a preparation for primary school, while parents with a lower socio-economic status emphasized the educational component. An interesting finding is also a statement from interviews of a parent who does not find benefits in compulsory preschool attendance.

Keywords: compulsory pre-school education, education of pre-school children, kindergarten, parents’ opinions on pre-school education

Procedia PDF Downloads 159
5738 The Age Difference in Social Skills Constructs for School Adaptation: A Cross-Sectional Study of Japanese Students at Elementary, Junior, and Senior High School

Authors: Hiroki Shinkawa, Tadaaki Tomiie

Abstract:

Many interventions for social skills acquisition aim to decrease the gap between social skills deficits in the individual and normative social skills; nevertheless little is known of typical social skills according to age difference in students. In this study, we developed new quintet of Hokkaido Social Skills Inventory (HSSI) in order to identify age-appropriate social skills for school adaptation. First, we selected 13 categories of social skills for school adaptation from previous studies, and created questionnaire items through discussion by 25 teachers in all three levels from elementary schools to senior high schools. Second, the factor structures of five versions of the social skills scale were investigated on 2nd grade (n = 1,864), 4th grade (n = 1,936), 6th grade (n = 2,085), 7th grade (n = 2,007), and 10th grade (n = 912) students, respectively. The exploratory factor analysis showed that a number of constructing factors of social skills increased as one’s grade in school advanced. The results in the present study can be useful to characterize the age-appropriate social skills for school adaptation.

Keywords: social skills, age difference, children, adolescents

Procedia PDF Downloads 390
5737 The Perception of ‘School’ as a Positive Support Factor

Authors: Yeliz Yazıcı, Alev Erenler

Abstract:

School is an institution designed to provide learning, teaching places and environments under guidance of selected teachers. School is not just a place or institution but it is a place where complex and living structures are alive and always changing. It is also an undeniable fact that schools have shaped the ideas, future, society as well as the students and their lives. While this is the situation, schools having academic excellence is considered as successful ones. Academic excellence is a composition of excellence in teachers, management and physical environment, also. This is the general perception of the authorities and parents when the excellence is the point but the school is a developing and supporting organism. In this concept, the main aim of this study is to compare student and teacher perceptions of school as a ‘positive support factor’. The study is designed as a quantitative and qualitative design and a questionnaire is applied to both teachers and students via online and face to face meetings. It is aimed to define the perceptions of the participants related to the school as a positive support factor. It means the role of school in establishing self-efficacy, shaping and acquiring the behavior etc. Gathered data is analyzed via SPSS program and the detailed discussion is carried in the frame of the related literature.

Keywords: positive support factor, education, school, student teacher perception

Procedia PDF Downloads 169
5736 The Impact of School Environment and Peer Relation on Anti-Social Behaviour of Students in Science Secondary Schools in Katsina State

Authors: Umar Mamman

Abstract:

The study investigated the impact of school environment and peer relations on antisocial behaviour of the students of science secondary schools in Katsina State. The study sought to achieve the following objectives: to determine whether school influences antisocial behaviour among science secondary school students, and to determine whether peer relation influences anti-social behaviour among science secondary school students. The study population composed of all the students in science secondary schools in Katsina State. The study used a sample of 378 students and 18 teachers randomly selected from eleven science secondary schools in Katsina state. Three instruments were used to collect data for the study, thus: socio-economic status background questionnaire, antisocial process screening device (APSD), and inventory of parent and peer relationship questionnaire. The study findings revealed that school environment has significant effect on antisocial behaviour of the students in science secondary school (F (7, 372) = 52.08, p ≤ .01), and there is a significant effect of peer relation on antisocial behaviour of the students in science secondary school (F (7, 372) = 14.229, p ≤ .01). Based on these findings the following major recommendations were made: School environment should be made attractive and conducive for learning and character development. Teachers, as role model, should desist from indecent acts. School environment should be made learner-centered and friendly. Functional guidance and counselling outfits need to be provided in all secondary schools in Katsina state.

Keywords: school environment, peer relation, anti-social behaviour, psychology

Procedia PDF Downloads 347
5735 Innovative Schools as Birthplaces for Promoting Educational Innovations: A Case Study of Two Hungarian Schools

Authors: Khin Khin Thant Sin

Abstract:

This study is a case study which investigates successful and ongoing bottom-up innovations for school improvement initiatives in Hungary. Two innovative schools are selected in this study due to their outstanding achievement during the past ten years in Hungary. In one school, data from the personal experiences of a school principal who initiated the bottom-up innovation are included. For the second school, three interviews were carried out with two schoolteachers and one secondary school student. In addition, desk research, including the principal’s published articles, the schoolteachers’ master thesis, the school websites, and other published articles, are analysed to explore the schools’ innovative processes. This study investigates how bottom-up innovation led to major achievements in student learning, teacher professional development, networking and collaboration with other schools, and the establishment of successful partnerships with universities. The highlight of this study is how innovative schools can be the major sources promoting educational innovations as well as improving teacher education, especially in initial teacher education and continuous professional development.

Keywords: school innovation, teacher education, hungary, educational innovation, school improvement

Procedia PDF Downloads 106
5734 Unified Theory of the Security Dilemma: Geography, MAD and Democracy

Authors: Arash Heydarian Pashakhanlou

Abstract:

The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.

Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence

Procedia PDF Downloads 231
5733 High School Students’ Seismic Risk Perception and Preparedness in Shavar, Dhaka

Authors: Mohammad Lutfur Rahman

Abstract:

School students of Dhaka are in extreme risk of natural disasters. However, the study on assessment of the real scenario of high school students about perceptions of earthquake is very little. The purpose of this cross-sectional study is to assess the seismic risk perception and preparedness levels about earthquake among high school students in Shavar, Dhaka. A questionnaire was developed, and data collection was done about a group of high school students in seven classrooms. The author uses a method of surveying high school students to identify and describe the factors that influence their knowledge and perceptions about earthquake. This study examines gender and grade differences in perceived risk and communication behavior in response to the earthquake. Female students’ preparation, participation, and communication with family are more frequent than that of male students. Female students have been found to be more likely to learn about a disaster than male students. Higher grade students have more awareness but less preparedness about earthquake than that of the younger one. This research concludes that irrespective of grades, high school students are vulnerable to earthquake due to the lack of a seismic education program.

Keywords: awareness, earthquake, risk perception, seismic

Procedia PDF Downloads 243
5732 WWSE School Development in German Christian Schools Revisited: Organizational Development Taken to a Test

Authors: Marco Sewald

Abstract:

WWSE School Development (Wahrnehmungs- und wertorientierte Schulentwicklung) contains surveys on pupils, teachers and parents and enables schools to align the development to the requirements mentioned by these three stakeholders. WWSE includes a derivative set of questions for Christian schools, meeting their specific needs. The conducted research on WWSE is reflecting contemporary questions on school development, questioning the quality of the implementation of the results of past surveys, delivered by WWSE School Development in Christian schools in Germany. The research focused on questions connected to organizational development, including leadership and change management. This is done contoured to the two other areas of WWSE: human resources development and development of school teaching methods. The chosen research methods are: (1) A quantitative triangulation on three sets of data. Data from a past evaluation taken in 2011, data from a second evaluation covering the same school conducted in 2014 and a structured survey among the teachers, headmasters and members of the school board taken within the research. (2) Interviews with teachers and headmasters have been conducted during the research as a second stage to fortify the result of the quantitative first stage. Results: WWSE is supporting modern school development. While organizational development, leadership, and change management are proofed to be important for modern school development, these areas are widespread underestimated by teachers and headmasters. Especially in comparison to the field of human resource development and to an even bigger extent in comparison to the area of development of school teaching methods. The research concluded, that additional efforts in the area of organizational development are necessary to meet modern demands and the research also shows which areas are the most important ones.

Keywords: school as a social organization, school development, school leadership, WWSE, Wahrnehmungs- und wertorientierte Schulentwicklung

Procedia PDF Downloads 218
5731 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 185
5730 Impacts of Building Design Factors on Auckland School Energy Consumptions

Authors: Bin Su

Abstract:

This study focuses on the impact of school building design factors on winter extra energy consumption which mainly includes space heating, water heating and other appliances related to winter indoor thermal conditions. A number of Auckland schools were randomly selected for the study which introduces a method of using real monthly energy consumption data for a year to calculate winter extra energy data of school buildings. The study seeks to identify the relationships between winter extra energy data related to school building design data related to the main architectural features, building envelope and elements of the sample schools. The relationships can be used to estimate the approximate saving in winter extra energy consumption which would result from a changed design datum for future school development, and identify any major energy-efficient design problems. The relationships are also valuable for developing passive design guides for school energy efficiency.

Keywords: building energy efficiency, building thermal design, building thermal performance, school building design

Procedia PDF Downloads 436
5729 Evaulation of Food Safety Management in Central Elementary School Canteens in Tuguegarao City, Philippines

Authors: Lea B. Milan

Abstract:

This descriptive study evaluated the existing Food Safety Management in Central Elementary School Canteens of Region 3. It made used of survey questionnaires, interview guide questions and validated knowledge test on food for data gathering. Results of the study revealed that school principals and canteen managers shared responsibilities in food safety management of school canteen. It also showed that the schools applied different methods of communication, monitoring and evaluation of food safety management. The study further revealed that implementation of monitoring and evaluation of food safety compliance are not being practiced in all elementary schools in the region. The study also showed that school canteens in the Region 3 do not have the thermometers and timers to use to conduct proper monitoring of foods during storage, preparation and serving. It was also found out from the study that canteen personnel lacks the basic knowledge and trainings on food safety. Potential source of physical, chemical and biological hazards that could contaminate foods were also found present in the canteen facilities of the elementary schools in the region. Moreover, evaluation showed that the existing implementation of food safety management in the Central Elementary School Canteens of Region 3 were below the expected level and the need to strengthen the appreciation and advocacy on food safety management in school canteens of Region 3 is still wanting.

Keywords: food safety management, food safety school catering, food safety, school food safety management

Procedia PDF Downloads 373
5728 Welfare State and Income Distribution to School-Age Children

Authors: Kanyarat Bussaban, Siriporn Poolsuwan

Abstract:

This study is conducted with the objective to prove how the distorted distribution of welfare affects the quality of school-age children lives differently in the case of an urban community in Bangkok. 334 samples are households from Suan Oi and Ratchapatubtim communities. The study of sample communities found the difference between two community areas that are close. The people of Suan Oi community are economically better off people than the people of the Ratchapatubtim community. They share the benefits of using most services except the welfare of a child’s education. The resulting analysis of the variability in quality of life of the school age children indicate that heads of the households are women looking for quality of life benefits when the compulsory school age is less. A study of the two communities suggests that the inequality in income distribution currently affects the quality of life of school-age children.

Keywords: inequality, income distribution, quality of school-age children lives, welfare state

Procedia PDF Downloads 367
5727 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 260
5726 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.

Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security

Procedia PDF Downloads 164
5725 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel

Abstract:

The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.

Keywords: security, cooperation, asymmetrical, area denial

Procedia PDF Downloads 799
5724 Perspectives of Saudi Students on Reasons for Seeking Private Tutors in English

Authors: Ghazi Alotaibi

Abstract:

The current study examined and described the views of secondary school students and their parents on their reasons for seeking private tutors in English. These views were obtained through two group interviews with the students and parents separately. Several causes were brought up during the two interviews. These causes included difficulty of the English language, weak teacher performance, the need to pass exams with high marks, lack of parents’ follow-up of student school performance, social pressure, variability in student comprehension levels at school, weak English foundation in previous school years, repeated student absence from school, large classes, as well as English teachers’ heavy teaching loads. The study started with a description of the EFL educational system in Saudi Arabia and concluded with recommendations for the improvement of the school learning environment.

Keywords: english, learning difficulty, private tutoring, Saudi, teaching practices, learning environment

Procedia PDF Downloads 451
5723 A Study on the Relationships among Teacher Empowerment, Professional Commitment and School Effectiveness

Authors: S. C. Lin, W. F. Hung, W. W. Cheng

Abstract:

Teacher empowerment was regarded as investing teachers with the right to participate in the determination of school goals and policies and to exercise professional judgment about what and how to teach. Professional commitment was considered as a person’s belief in and acceptance of the values of his or her chosen occupation or line of work, and a willingness to maintain membership in that occupation. An effective school has been defined as one in which students’ progress further than might be expected from consideration of its intake. An effective school thus adds extra value to its students' outcomes, in comparison with other schools serving similar intakes. A number of literature from various countries explored that teacher empowerment and professional commitment significantly influenced school effectiveness. However, there lacked more empirical studies to examine the relationships among them. Hence, this study was to explore the relationships among teacher empowerment, professional commitment and school effectiveness in junior high schools in Taiwan. Samples were seven hundred and five junior high school teachers selected from Taichung City, Changhua County and Nantou County. Questionnaire was applied to collect data. Data were analyzed by using descriptive statistics, t-test, one-way ANOVA, Pearson’s product-moment correlation, and multiple regression analysis. The findings of this study were as follows: First, the overall performances of teachers’ perceptions of teacher empowerment, teacher professional commitment and school effectiveness were above average. Second, the teachers’ perceptions of teacher empowerment were significant different in gender, designated duty, and school size. Third, the teachers’ perceptions of teacher professional commitment were significant different in gender, designated duty, and school size. Fourth, the teachers’ perceptions of school effectiveness were significant different in designated duty. Fifth, teacher empowerment was mid-positively correlation by teacher professional commitment. Sixth, there was mid-positively correlation between teacher empowerment and school effectiveness. Seventh, there was mid-positively correlation between teacher professional commitment and school effectiveness. Eighth, Teacher empowerment and professional commitment could significantly predict school effectiveness. Based on the findings of this study, the study proposed some suggestions for educational authorities, schools, teachers, and future studies as well.

Keywords: junior high school teacher, teacher empowerment, teacher professional commitment, school effectiveness

Procedia PDF Downloads 454
5722 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 496
5721 Adding Security Blocks to the DevOps Lifecycle

Authors: Andrew John Zeller, Francis Pouatcha

Abstract:

Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.

Keywords: information security, data security, cybersecurity, devOps, IT management

Procedia PDF Downloads 103
5720 Internet Use and Academic Procrastination Behavior in High School Students

Authors: Endah Mastuti, Prihastuti Sudaryono

Abstract:

The rapid development of Internet usage and technology influences the academic behavior of students in high schools. One of the consequences is the emergence of academic procrastination behavior. Academic procrastination behavior is students’ procrastinate behavior in completing assignments. This study aimed to see whether there are differences in the duration of using the internet with academic procrastinate behavior among high school students in Surabaya. The number of research subject is 498 high school students. Instruments of the research are academic procrastination scale and duration of the internet usage questionnaire. The results from One Way Anova shows F value 0.241 with a significance level of 0.868 This demonstrates that there is no difference between the duration of the use of the Internet with academic procrastination behavior in high school students.

Keywords: academic procrastination, duration of internet usage, students, senior high school

Procedia PDF Downloads 354