Search results for: school security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5700

Search results for: school security

5460 Future Outlook and Current Situation for Security of Gas Supply in Eastern Baltic Region

Authors: Ando Leppiman, Kati Kõrbe Kaare, Ott Koppel

Abstract:

The growing demand for gas has rekindled a debate on gas security of supply due to supply interruptions, increasing gas prices, transportation and distribution bottlenecks and a growing reliance on imports over longer distances. Security of supply is defined mostly as an infrastructure package to satisfy N-1 criteria. In case of Estonia, Finland, Latvia, and Lithuania all the gas infrastructure is built to supply natural gas only from one single supplier, Russia. In 2012, almost 100% of natural gas to the Eastern Baltic Region was supplied by Gazprom. under such circumstances infrastructure N-1 criteria does not guarantee security of supply. In the Eastern Baltic Region, the assessment of risk of gas supply disruption has been worked out by applying the method of risk scenarios. There are various risks to be tackled in Eastern Baltic States in terms of improving security of supply, such as single supplier risk, physical infrastructure risk, regulatory gap, fair price, and competition. The objective of this paper is to evaluate the energy security of the Eastern Baltic Region within the framework of the European Union’s policies and to make recommendations on how to better guarantee the energy security of the region.

Keywords: security of supply, supply routes for natural gas, energy balance, diversified supply options, common regulative package

Procedia PDF Downloads 232
5459 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 61
5458 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)

Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat

Abstract:

National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.

Keywords: NTS, risk assessment, threat factors, security, services

Procedia PDF Downloads 46
5457 Maintaining the Formal Type of West Java's Heritage Language with Sundanese Language Lesson in Senior High School

Authors: Dinda N. Lestari

Abstract:

Sundanese language is one of heritage language in Indonesia that must be maintained especially the formal type of it because teenagers nowadays do not speak Sundanese language formally in their daily lives. To maintain it, Cultural and Education Ministry of Indonesia has input Sundanese language lesson at senior high school in West Java area. The aim of this study was to observe whether the existence of Sundanese language lesson in senior high school in the big town of Karawang, West Java - Indonesia give the contribution to the formal type of Sundanese language maintenance or not. For gathering the data, the researcher interviewed the senior high school students who have learned Sundanese language to observe their acquisition of it. As a result of the interview, the data was presented in qualitative research by using the interviewing method. Then, the finding indicated that the existence of Sundanese language in Senior High School also the educational program which is related to it, for instance, Kemis Nyunda seemed to do not effective enough in maintaining the formal type of Sundanese language. Therefore, West Java government must revise the learning strategy of it, including the role of the Sundanese language teacher.

Keywords: heritage language, language maintenance and shift, senior high school, Sundanese language, Sundanese language lesson

Procedia PDF Downloads 123
5456 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 327
5455 Exploring the Dark Side of IT Security: Delphi Study on Business’ Influencing Factors

Authors: Tizian Matschak, Ilja Nastjuk, Stephan Kühnel, Simon Trang

Abstract:

We argue that besides well-known primary effects of information security controls (ISCs), namely confidentiality, integrity, and availability, ISCs can also have secondary effects. For example, while IT can add business value through impacts on business processes, ISCs can be a barrier and distort the relationship between IT and organizational value through the impact on business processes. By applying the Delphi method with 28 experts, we derived 27 business process influence dimensions of ISCs. Defining and understanding these mechanisms can change the common understanding of the cost-benefit valuation of IT security investments and support managers' effective and efficient decision-making.

Keywords: business process dimensions, dark side of information security, Delphi study, IT security controls

Procedia PDF Downloads 77
5454 The Columbine Shooting in German Media Coverage: A Point of No Return

Authors: Melanie Verhovnik

Abstract:

School shootings are a well-known phenomenon in Germany, 14 of which have occurred to date. The first case happened half a year after the April 20th, 1999 Columbine shooting in the United States, which was at the time the most serious school shooting to have occurred anywhere in the world. The German media gave only scant attention to the subject of school shootings prior to Columbine, even though there were numerous instances of it throughout the world and several serious instances in the United States during the 1990s. A mixed method design of qualitative and quantitative content analysis was employed in order to demonstrate the main features and characteristics of core German media’s coverage of Columbine.

Keywords: Columbine, media coverage, qualitative, quantitative content analysis, school shooting

Procedia PDF Downloads 285
5453 Learning Based on Computer Science Unplugged in Computer Science Education: Design, Development, and Assessment

Authors: Eiko Takaoka, Yoshiyuki Fukushima, Koichiro Hirose, Tadashi Hasegawa

Abstract:

Although all high school students in Japan are required to learn informatics, many of them do not learn this topic sufficiently. In response to this situation, we propose a support package for high school informatics classes. To examine what students learned and if they sufficiently understood the context of the lessons, a questionnaire survey was distributed to 186 students. We analyzed the results of the questionnaire and determined the weakest units, which were “basic computer configuration” and “memory and secondary storage”. We then developed a package for teaching these units. We propose that our package be applied in high school classrooms.

Keywords: computer science unplugged, computer science outreach, high school curriculum, experimental evaluation

Procedia PDF Downloads 360
5452 An Overview of Privacy and Security Issues in Social Networks

Authors: Mohamad Ibrahim Al Ladan

Abstract:

Social networks, such as Facebook, Myspace, LinkedIn, Google+, and Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They provide attractive means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The various personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. However, these practices have resulted in ample concerns with respect to privacy and security from different stakeholders. Addressing these privacy and security concerns in social networks is a must for these networks to be sustainable. Existing security and privacy tools may not be enough to address existing concerns. Some guidelines should be followed to protect users from the existing risks. In this paper, we have investigated and discussed the various privacy and security issues and concerns pertaining to social networks. Moreover, we have classified these privacy and security issues and presented a thorough discussion of the implications of these issues and concerns on the future of the social networks. In addition, we have presented a set of guidelines as precaution measures that users can consider to address these issues and concerns.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 272
5451 Predictors of School Drop out among High School Students

Authors: Osman Zorbaz, Selen Demirtas-Zorbaz, Ozlem Ulas

Abstract:

The factors that cause adolescents to drop out school were several. One of the frameworks about school dropout focuses on the contextual factors around the adolescents whereas the other one focuses on individual factors. It can be said that both factors are important equally. In this study, both adolescent’s individual factors (anti-social behaviors, academic success) and contextual factors (parent academic involvement, parent academic support, number of siblings, living with parent) were examined in the term of school dropout. The study sample consisted of 346 high school students in the public schools in Ankara who continued their education in 2015-2016 academic year. One hundred eighty-five the students (53.5%) were girls and 161 (46.5%) were boys. In addition to this 118 of them were in ninth grade, 122 of them in tenth grade and 106 of them were in eleventh grade. Multiple regression and one-way ANOVA statistical methods were used. First, it was examined if the data meet the assumptions and conditions that are required for regression analysis. After controlling the assumptions, regression analysis was conducted. Parent academic involvement, parent academic support, number of siblings, anti-social behaviors, academic success variables were taken into the regression model and it was seen that parent academic involvement (t=-3.023, p < .01), anti-social behaviors (t=7.038, p < .001), and academic success (t=-3.718, p < .001) predicted school dropout whereas parent academic support (t=-1.403, p > .05) and number of siblings (t=-1.908, p > .05) didn’t. The model explained 30% of the variance (R=.557, R2=.300, F5,345=30.626, p < .001). In addition to this the variance, results showed there was no significant difference on high school students school dropout levels according to living with parents or not (F2;345=1.183, p > .05). Results discussed in the light of the literature and suggestion were made. As a result, academic involvement, academic success and anti-social behaviors will be considered as an important factors for preventing school drop-out.

Keywords: adolescents, anti-social behavior, parent academic involvement, parent academic support, school dropout

Procedia PDF Downloads 247
5450 ICT Education: Digital History Learners

Authors: Lee Bih Ni, Elvis Fung

Abstract:

This article is to review and understand the new generation of students to understand their expectations and attitudes. There are a group of students on school projects, creative work, educational software and digital signal source, the use of social networking tools to communicate with friends and a part in the competition. Today's students have been described as the new millennium students. They use information and communication technology in a more creative and innovative at home than at school, because the information and communication technologies for different purposes, in the home, usually occur in school. They collaborate and communicate more effectively when they are at home. Most children enter school, they will bring about how to use information and communication technologies, some basic skills and some tips on how to use information and communication technology will provide a more advanced than most of the school's expectations. Many teachers can help students, however, still a lot of work, "tradition", without a computer, and did not see the "new social computing networks describe young people to learn and new ways of working life in the future", in the education system of the benefits of using a computer.

Keywords: ICT education, digital history, new generation of students, benefits of using a computer

Procedia PDF Downloads 375
5449 Study on Principals Using Change Leadership to Promote School Innovation: A Case Study of a Primary School in Taiwan

Authors: Chih-Wen Fan

Abstract:

Backgrounds/ Research goals : School improvement requires change leadership, which often means discomfort. Principals are the key people that determine the effectiveness of schools. In an era of organization’s pursuit of speed and effectiveness, school administration has to be accountable and innovative. Effective principals work to improve achievement by focusing on the administrative and teaching quality of improvement. However, there is a lack of literature addressing the relevant case studies on school change leadership. This article explores how principals can use change leadership to drive school change. It analyze the driving factors of principal changes in the case school, the beliefs of change leadership, specific methods, and what impact they have. Methods: This study applies the case study research method to the selected primary school located in an urban area for case study, which has achieved excellent performance after reform and innovation. The researchers selected an older primary school located in an urban area that was transformed into a high-performance primary school after changes were enacted by the principal. The selected case was recommended by three supervisors of the Education Department. The case school underwent leadership change by the new principal during his term, and won an award from the Ministry of Education. Total of 8 teachers are interviewed. The data encoding includes interviews and documents. Expected results/ conclusions: The conclusions of the study are, as follows: (1) The influence for Principal Lin's change leadership is from internal and external environmental development and change pressures. (2) The principal's belief in change leadership is to recognize the sense of crisis, and to create a climate of change and demand for change. (3) The principal's specific actions are intended to identify key members, resolve resistance, use innovative thinking, and promote organizational learning. (4) Principal Lin's change leadership can enhance the professional functions of all employees through appropriate authorization. (5) The effectiveness of change leadership lies in teachers' participation in decision-making; the school's reputation has been enhanced through featured courses.

Keywords: change leadership, empowerment, crisis awareness, case study

Procedia PDF Downloads 105
5448 Cyber Victimization: School Experience of Malaysian Cyberbullied Teenagers

Authors: Shireen Simon

Abstract:

Cyberbullying among schoolchildren and teenagers became a hot issue discussed by Malaysian society. Cyberbullying is a new age of bullying because it uses the modern digital technology intentionally to hurt and degrade someone in the cyber world. Cyberbullying is a problem affecting many teenagers as they embrace online communication and interaction whereby virtual world with no borders. By adopting a qualitative approach, this study has captured 8 cyberbullied victims’ school experience. Even years after leaving school, these 8 cyberbullied victims remember how it feels to be bullied in the cyber world. The principal investigator also tries to identify the possibility factors that contribute to cyberbullying among these 8 victims. The result shows that these victims were bullied differently in cyber world. This study not just primarily focuses on cyberbullying issues among schoolchildren and teenagers; it also addresses the motives and causes of cyberbullying. Lastly, this article will be served as guidance for school teachers, parents and teenagers to prepare to tackle cyberbullying together. Cyberbullying is no laughing matter in our community, and it is time to spread the seeds of peace inspires others to do the same.

Keywords: cyberbullying, cyber victimization, internet, school experience, teenagers

Procedia PDF Downloads 265
5447 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 181
5446 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 69
5445 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 304
5444 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies

Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk

Abstract:

Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.

Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)

Procedia PDF Downloads 44
5443 The Impact of Perception of Transformational Leadership and Factors of Innovation Culture on Innovative Work Behavior in Junior High School's Teacher

Authors: Galih Mediana

Abstract:

Boarding school can helps students to turn all good qualities into habits. The process of forming one's personality can be done in various ways. In addition to gaining general knowledge at school during learning hours, teachers can instill values in students which can be done while in the dormitory when the learning process has ended. This shows the important role that must be played by boarding school’s teachers. Transformational leadership and a culture of innovation are things that can instill innovative behavior in teachers. This study aims to determine the effect of perceptions of transformational leadership and a culture of innovation on innovative work behavior among Islamic boarding school teachers. Respondents in this study amounted to 70 teachers. To measure transformational leadership, a modified measuring tool is used, namely the Multifactor Leadership Questionnaire (MLQ) by Bass (1985). To measure innovative work behavior, a measurement tool based on dimensions from Janssen (2000) is used. The innovation culture in this study will be measured using the innovation culture factor from Dobni (2008). This study uses multiple regression analysis to test the hypothesis. The results of this study indicate that there is an influence of perceptions of transformational leadership and innovation culture factors on innovative work behavior in Islamic boarding school’s teachers by 57.7%.

Keywords: transformational leadership, innovative work behavior, innovation culture, boarding school, teacher

Procedia PDF Downloads 68
5442 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 378
5441 Environmental Refugees in Africa: A Case Study of Sahel Region

Authors: Ahlem Setrallah

Abstract:

Environment has become a phenomenon directly linked to security in recent decades. This security aspect of environment is justified by the challenges that environment problems can have on human life and thus security especially within the scope of human security that is based mainly on the individual rather than on the state. Because Africa is not safe from the global warming and all its consequences on environment, this continent has witnessed many crises related to environment and that have had direct impact on security in Africa. One of those crises is environmental displacement or immigration which was caused by natural disasters like draught, desertification and food shortage to name but a few. This paper aims at shedding light at some important cases in the Africa focusing mainly on the Sahel region. The main research questions that we are trying to answer are the following: 1-What is the relationship between environment and forced immigration in the Sahel region? 2-What is the impact of environmental immigration on Security in the region? 3-How have the states in this region reacted to this crisis? 4-Is the measures taken by those states adequate or not? 5- How to remedy for the limitations of those measures? The paper is based on case study methodology as a way to better understand the relationship between security and environment using library research for data collection and analysis. This paper aims also at presenting some suggesting regarding possible ways of reducing the negative impact of environmental immigration.

Keywords: environment, refugees, Sahel region, security

Procedia PDF Downloads 435
5440 School Belongingness and Coping with Bullying: Greek Adolescent Students' Experiences

Authors: E. Didaskalou, C. Roussi-Vergou, E. Andreou, G. Skrzypiec, P. Slee

Abstract:

There has been growing interest lately, in the study of victimization among adolescent students in Greece and elsewhere with a view to improve school policies concerning anti-bullying practices. Researchers have recently focused on investigating the relationships between the extent of students’ victimization and the distinct mechanisms that they employ for coping with this particular problem. In particular, the emphasis has been placed on exploring the relationship between the coping strategies students use to counteract bullying, their sense of belonging at school, and extent of their victimization. Methods: Within the research framework outlined above, we set out to: a) examine the frequency of self-reported victimization among secondary school students, b) investigate the coping strategies employed by students when confronted with school bullying and c) explore any differences between bullied and non-bullied students with regard to coping strategies and school belongingness. The sample consisted of 860 from fifteen secondary public schools in central Greece. The schools were typical Greek secondary schools and the principals volunteered to participate in this study. Participants’ age ranged from 12 to 16 years. Measures: a) Exposure to Victimization: The frequency of victimization was directly located by asking students the question: ‘Over the last term, how often have you been bullied or harassed by a student or students at this high school?’ b) Coping Strategies: The ‘Living and Learning at School: Bullying at School’ was administered to students, c) School belongingness was assessed by the Psychological Sense of School Membership Scale, that students completed. Results: Regarding the frequency of self-reported victimization, 1.5% of the students reported being victimized every day, 2.8% most days of the week, 2.1% one or more days a week, 2.9% about once a week, 22.6% less than once a week and 68.1% never. The coping strategies that the participants employed for terminating their victimization included: a) adult support seeking, b) emotional coping/keep away from school, c) keeping healthy and fit, d) demonstrating a positive attitude towards the bully, d) peer support seeking, e) emotional out bursting, f) wishful thinking and self-blaming, g) pretending as if it is not happening, h) displaying assertive behaviors and i) getting away from the bullies. Bullied from non-bullied children did not differ as much in coping, as in feelings of being rejected in school. Discussion: The findings are in accordance with accumulated research evidence which points to a strong relationship between student perceptions of school belongingness and their involvement in bullying behaviors. We agree with the view that a positive school climate is likely to serve as a buffer that mitigates wider adverse societal influences and institutional attitudes which favor violence and harassment among peers.

Keywords: school bullying, school belonging, student coping strategies, victimization

Procedia PDF Downloads 221
5439 Intensive Intercultural English Language for Enhanced School Community Engagement: An Exploratory Study Applied to Parents from Language Backgrounds Other Than English in a Regional Australian Primary School

Authors: Ann Dashwood

Abstract:

Using standard Australian English with confidence is a cultural expectation of parents of primary school aged children who want to engage effectively with their children’s teachers and school administration. That confidence in support of their children’s learning at school is seldom experienced by parents whose first language is not English. Sharing language with competence in an intercultural environment is the common denominator for meaningful communication and engagement to occur in a school community. Experience in relevant interactive sessions is known to enhance engagement and participation. The purpose of this paper is to identify interactional settings for which parents who are isolated from the daily use of functional Australian cultural language learned to engage more effectively in their children’s learning at school. The outcomes measured parents’ intercultural engagement with classroom teachers and attention to the school’s administrative procedures. The study used quantitative and qualitative methods. The principles of communicative task-based language learning combined with intercultural communication principles provided the theoretical base for intensive English task-based learning and engagement. The quantitative analysis examined data samples collected by classroom teachers and administrators and parents’ writing samples. Interviews and observations qualitatively informed the study. Currently significant numbers of projects are active in community centres and schools to enhance English language knowledge of parents from Language Backgrounds Other Than English (LBOTE). The study was significant to explore the effects of conducting intensive English with parents of varied English language backgrounds by targeting language use for social interactions in the community, specific engagement in school activities, cultural interaction with teachers and responsiveness to complying with school procedures.

Keywords: engagement, intercultural communication, LBOTE, school community

Procedia PDF Downloads 86
5438 Applying Bowen’s Theory to Intern Supervision

Authors: Jeff A. Tysinger, Dawn P. Tysinger

Abstract:

The aim of this paper is to theoretically apply Bowen’s understanding of triangulation and triads to school psychology intern supervision so that it can assist in the conceptualization of the dynamics of intern supervision and provide some key methods to address common issues. The school psychology internship is the capstone experience for the school psychologist in training. It involves three key participants whose relationships will determine the success of the internship.  To understand the potential effect, Bowen’s family systems theory can be applied to the supervision relationship. He describes a way to resolve stress between two people by triangulating or binging in a third person. He applies this to a nuclear family, but school psychology intern supervision requires the marriage of an intern, field supervisor, and university supervisor; thus, setting all up for possible triangulation. The consequences of triangulation can apply to standards and requirements, direct supervision, and intern evaluation. Strategies from family systems theory to decrease the negative impact of supervision triangulation.

Keywords: family systems theory, intern supervision, school psychology training, triangulation

Procedia PDF Downloads 103
5437 SHARK FINS Rising: Awesome Power Beneath the Surface

Authors: David Parrish

Abstract:

A critical challenge for a new school is creating an inclusive, meaningful culture. While a new school offers a “shiny’ exterior, its culture has yet to be created. In 2016, Charles J. Colgan, Sr. High School in Prince William County, opened its door. In its inaugural year, the FIN Friends club was created to start the process of building connections between general education and special education students. In eight years, the club has become a relentless contributor to the most inclusive, welcoming school culture possible. Through a commitment to consistent, year-round activities, the FINS accepts students from all schools and all grades. All schools strive for inclusion and a positive culture. Our model takes explicit action toward these elements. What we have created works; it is replicable and supports any school to build a more inclusive culture. Connections and belonging are directly related to every educational goal, including academic progress, equity, social-emotional health, etc. We want to share our story and collaborate with schools to create their own inclusion movement.

Keywords: inclusion, culture, connections, belonging

Procedia PDF Downloads 38
5436 Developmental Differences of Elementary School Children in Knowledge Acquisition Following a Sexual Abuse Prevention Program

Authors: Chrysanthi Nega, Fotini-Sonia Apergi

Abstract:

Child sexual abuse (CSA) in Greece is a highly prevalent phenomenon and yet remains largely underreported. CSA can negatively impact cognitive, emotional and psychosocial development, as well as personality formation and capacity for initiation and maintenance of healthy interpersonal relationships. It is particularly important for school-based prevention programs to be implemented early in elementary school, as they are reportedly effective in lowering abuse incidences and providing knowledge for coping in threatening environments. The purpose of the current study was to test the effectiveness of a school-based CSA prevention program (Safe-Touches) on Greek elementary school students (grades 1-3, N=272) and explore the effect of age and time of testing (academic term). There was a significant effect of age in the knowledge of Inappropriate Touch, when comparing pre and post-intervention assessments, with third graders showing greatest gains in knowledge, followed by second and first graders. Time of testing during the academic year also had a significant effect, as first graders tested later in the school year, scored higher on knowledge of Inappropriate Touch. The findings of the current study provide insight into the optimal timing to implement CSA prevention programs. Exposure to such programs and incorporation in the school curricula could largely benefit children of the Greek community in terms of safety and awareness.

Keywords: child sexual abuse, Safe-Touches, school-based prevention, schooling

Procedia PDF Downloads 297
5435 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 435
5434 Engaging with Security and State from a Gendered Lens in the South Asian Context: Indian State’s Construction of Internal Security and State Responses

Authors: Pooja Bakshi

Abstract:

In the following paper, an attempt would be made to engage with the relationship between the state and the imperatives of security from a gendered lens. This will be juxtaposed with the feminist engagement with International Law. Theorizations from the literature on South Asian politics and Global politics would be applied to the manner in which the Indian state has defined and proposed to deal with concerns of internal security pertaining to the ‘Left Wing Extremism’ in 2010-2011. It would be argued that the state needs to be disaggregated into the legislature, executive and the judiciary; since there are times when some institutional parts of the state provide space for progressive democratic engagement whilst other institutions don’t. The specific contours of violence faced by women and children at the hands of the state, in the above-mentioned discourse would also be examined. In the end, implications of the security state discourse on debates in International Law would be elaborated.

Keywords: feminist engagement, human rights, state response to left extremism, security studies in South Asia

Procedia PDF Downloads 470
5433 An Exploration of Anti-Terrorism Laws in Nigeria

Authors: Sani Mohammed Adam

Abstract:

This work seeks to review the security challenges facing Nigeria and explore the relevance of laws and policies in tackling the menace. The work looks at the adequacy of available legislations and the functionality of relevant institutions such as the Armed Forces, the Nigeria Police Force, the State Security Service, the Defence Intelligence Agency and the Nigerian Intelligence Agency etc. Comparisons would be made with other jurisdictions, such as inter alia, the Homeland Security in the USA and Counter Terrorism Laws of the United Kingdom. Recommendations would be made on how to strengthen both institutions and laws to curtail the growth of Terrorism in Nigeria.

Keywords: legislations, Nigeria, security, terrorism

Procedia PDF Downloads 641
5432 School Curriculum Incorporating Rights to Live in Clean and Healthy Environment: Assessing Its Effectiveness

Authors: Sitaram Dahal

Abstract:

Among many strategic and practical needs in overcoming the threats and challenges being experienced in the global environment, constitutional provision for Rights to live in clean and healthy environment is one and so is the school curriculum incorporating information on such rights. Government of Nepal has also introduced information on rights to live in clean and healthy environment, as provisioned in its interim constitution of 2007, in the secondary level curriculum of formal education. As the predetermined specific objective of such curriculum is to prepare students who are conscious of citizens’ rights and responsibilities and are able to adopt functions, duties and rights of the rights holders and duty bearers; the study was designed to assess the effectiveness of such curriculum. The study was conducted in one private school and a community school to assess the effectiveness of such curriculum. The study shows that such curriculum has been able to make students responsible duty bearers as they were aware of their habits towards environment. Whereas only very few students are aware enough as being rights holders. Students of community schools were aware rights holders as they complain if they are not satisfied with the environment of the school itself. But private school is far behind in this case. It can be said that only curriculum with very few portion of information on such rights might not be capable enough to meet its objective.

Keywords: curriculum, environmental rights, constitution, effectiveness

Procedia PDF Downloads 300
5431 Leadership Dynamics and Teacher Engagement in Greek Education

Authors: Vasileios Floros

Abstract:

This article delves into the intricate interplay between leadership styles and teacher satisfaction within the Greek educational framework, underscoring the pivotal role of school leadership in shaping educational success and fostering a conducive school culture. Through a comprehensive analysis, the study explores various leadership theories, the psychological contract between teachers and leaders, and the impact of leadership on teacher job satisfaction and group dynamics within educational institutions. It highlights how leadership efficacy can significantly influence the organizational climate, teacher motivation, and, ultimately, educational outcomes. The findings suggest that effective leadership, characterized by a deep understanding of teacher psychology, thoughtful engagement with the school culture, and strategic application of leadership styles, can lead to heightened teacher satisfaction and enhanced educational performance. This research offers valuable insights for educational policymakers, school leaders, and the broader academic community interested in optimizing leadership practices to foster an enriching educational environment in Greece.

Keywords: educational leadership, teacher satisfaction, school culture, leadership styles, Greek education

Procedia PDF Downloads 14