Search results for: security program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6250

Search results for: security program

5830 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 70
5829 The Audience’s Satisfaction through Radio Channel Broadcasting of Suan Sunandha Rajabhat University

Authors: Piyakarn Apichaikul, Thep Muanfoo

Abstract:

This research study aimed to survey the audience’s satisfaction of the radio channel broadcasting of Suan Sunandha Rajabhat University and to investigate the relationship between the satisfaction and the usage of the listeners to the news program. The study was a quantitative research using a survey research method and a cross-sectional description study to examine the satisfaction and the usage of the listeners. The instrument of the research was questionnaires which were delivered to 300 respondents by simple random sampling. For the analytical part, descriptive statistics and inferential statistic were used in this research. The result found that respondents agreed that they were satisfied with the news program (mean = 3.60). Moreover, respondents agreed that they used information from the news program in their daily life (mean = 3.47). However, the relationship between the satisfaction and the usage of the respondents were contrary.

Keywords: news program, radio channel broadcasting, Suan Sunandha Rajabhat University, audience satisfaction

Procedia PDF Downloads 225
5828 Saving Lives: Alternative Approaches to Reducing Gun Violence

Authors: Angie M. Wolf, DeVone Boggan

Abstract:

This paper highlights an innovative and nontraditional violence prevention program that is making a noticeable impact in what was once one of the country’s most violent communities. With unique and tailored strategies, the Operation Peacemaker Fellowship, established in Richmond, California, combines components of evidence-based practices with a community-oriented focus on relationships and mentoring to fill a gap in services and increase community safety. In an effort to highlight these unique strategies and provide a blueprint for other communities with violent crime problems, the authors of this paper hope to clearly delineate how one community is moving forward with vanguard approaches to invest in the lives of young men who once were labeled the communities’ most violent, even the most deadly, youth. The impact of this program is evidenced through the fellows’ own voices as they illuminate the experience of being in the Fellowship. In interviews, fellows’ describe how participating in this program has transformed their lives, and the lives of those they love. The authors of this article spent more than two years researching this Fellowship program in order to conduct an evaluation of it and, ultimately, to demonstrate how this program is a testament to the power of relationship and love combined with evidence-based practices, consequently enriching the lives of youth and the community that embraces them.

Keywords: gun violence prevention, high risk youth, law, policing justice

Procedia PDF Downloads 392
5827 The Effects of Eight Weeks of Interval Endurance Training on hs-CRP Levels and Anthropometric Parameters in Overweight Men

Authors: S. Khoshemehry, M. J. Pourvaghar

Abstract:

Inflammatory markers are known as the main predictors of cardiovascular diseases. This study aimed at determining the effect of 8 weeks of interval endurance training on hs-CRP level and some anthropometric parameters in overweight men. Following the call for participation in research project in Kashan, 73 volunteers participated in it and constituted the statistical population of the study. Then, 28 overweight young men from the age of 22 to 25 years old were randomly assigned into two groups of experimental and control group (n=14). Anthropometric and the blood sample was collected before and after the termination of the program for measuring hs-CRP. The interval endurance program was performed at 60 to 75% of maximum heart rate in 2 sessions per week for 8 weeks. Kolmogorov-Smirnov test was used to test whether two samples come from the same distribution and T-test was used to assess the difference of two groups which were statistically significant at the level of 0.05. The result indicated that there was a significant difference between the hs-RP, weight, BMI and W/H ratio of overweight men in posttest in the exercise group (P≤0.05) but not in the control group. Interval endurance training program causes decrease in hs-CRP level and anthropometric parameters.

Keywords: interval endurance training program, HS-CRP, overweight, anthropometric

Procedia PDF Downloads 281
5826 Reasons to Redesign: Teacher Education for a Brighter Tomorrow

Authors: Deborah L. Smith

Abstract:

To review our program and determine the best redesign options, department members gathered feedback and input through focus groups, analysis of data, and a review of the current research to ensure that the changes proposed were not based solely on the state’s new professional standards. In designing course assignments and assessments, we listened to a variety of constituents, including students, other institutions of higher learning, MDE webinars, host teachers, literacy clinic personnel, and other disciplinary experts. As a result, we are designing a program that is more inclusive of a variety of field experiences for growth. We have determined ways to improve our program by connecting academic disciplinary knowledge, educational psychology, and community building both inside and outside the classroom for professional learning communities. The state’s release of new professional standards led my department members to question what is working and what needs improvement in our program. One aspect of our program that continues to be supported by research and data analysis is the function of supervised field experiences with meaningful feedback. We seek to expand in this area. Other data indicate that we have strengths in modeling a variety of approaches such as cooperative learning, discussions, literacy strategies, and workshops. In the new program, field assignments will be connected to multiple courses, and efforts to scaffold student learning to guide them toward best evidence-based practices will be continuous. Despite running a program that meets multiple sets of standards, there are areas of need that we directly address in our redesign proposal. Technology is ever-changing, so it’s inevitable that improving digital skills is a focus. In addition, scaffolding procedures for English Language Learners (ELL) or other students who struggle is imperative. Diversity, equity, and inclusion (DEI) has been an integral part of our curriculum, but the research indicates that more self-reflection and a deeper understanding of culturally relevant practices would help the program improve. Connections with professional learning communities will be expanded, as will leadership components, so that teacher candidates understand their role in changing the face of education. A pilot program will run in academic year 22/23, and additional data will be collected each semester through evaluations and continued program review.

Keywords: DEI, field experiences, program redesign, teacher preparation

Procedia PDF Downloads 136
5825 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 535
5824 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 451
5823 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 48
5822 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 354
5821 Improving Rural Access to Specialist Emergency Mental Health Care: Using a Time and Motion Study in the Evaluation of a Telepsychiatry Program

Authors: Emily Saurman, David Lyle

Abstract:

In Australia, a well serviced rural town might have a psychiatrist visit once-a-month with more frequent visits from a psychiatric nurse, but many have no resident access to mental health specialists. Access to specialist care, would not only reduce patient distress and benefit outcomes, but facilitate the effective use of limited resources. The Mental Health Emergency Care-Rural Access Program (MHEC-RAP) was developed to improve access to specialist emergency mental health care in rural and remote communities using telehealth technologies. However, there has been no current benchmark to gauge program efficiency or capacity; to determine whether the program activity is justifiably sufficient. The evaluation of MHEC-RAP used multiple methods and applied a modified theory of access to assess the program and its aim of improved access to emergency mental health care. This was the first evaluation of a telepsychiatry service to include a time and motion study design examining program time expenditure, efficiency, and capacity. The time and motion study analysis was combined with an observational study of the program structure and function to assess the balance between program responsiveness and efficiency. Previous program studies have demonstrated that MHEC-RAP has improved access and is used and effective. The findings from the time and motion study suggest that MHEC-RAP has the capacity to manage increased activity within the current model structure without loss to responsiveness or efficiency in the provision of care. Enhancing program responsiveness and efficiency will also support a claim of the program’s value for money. MHEC-RAP is a practical telehealth solution for improving access to specialist emergency mental health care. The findings from this evaluation have already attracted the attention of other regions in Australia interested in implementing emergency telepsychiatry programs and are now informing the progressive establishment of mental health resource centres in rural New South Wales. Like MHEC-RAP, these centres will provide rapid, safe, and contextually relevant assessments and advice to support local health professionals to manage mental health emergencies in the smaller rural emergency departments. Sharing the application of this methodology and research activity may help to improve access to and future evaluations of telehealth and telepsychiatry services for others around the globe.

Keywords: access, emergency, mental health, rural, time and motion

Procedia PDF Downloads 207
5820 Management and Evaluation of Developing Medical Device Software in Compliance with Rules

Authors: Arash Sepehri bonab

Abstract:

One of the regions of critical development in medical devices has been the part of the software - as an indispensable component of a therapeutic device, as a standalone device, and more as of late, as applications on portable gadgets. The chance related to a breakdown of the standalone computer program utilized inside healthcare is in itself not a model for its capability or not as a medical device. It is, subsequently, fundamental to clarify a few criteria for the capability of a stand-alone computer program as a medical device. The number of computer program items and therapeutic apps is persistently expanding and so as well is used in wellbeing education (e. g., in clinics and doctors' surgeries) for determination and treatment. Within the last decade, the use of information innovation in healthcare has taken a developing part. In reality, the appropriation of an expanding number of computer devices has driven several benefits related to the method of quiet care and permitted simpler get to social and health care assets. At the same time, this drift gave rise to modern challenges related to the usage of these modern innovations. The program utilized in healthcare can be classified as therapeutic gadgets depending on the way they are utilized and on their useful characteristics. In the event that they are classified as therapeutic gadgets, they must fulfill particular directions. The point of this work is to show a computer program improvement system that can permit the generation of secure and tall, quality restorative gadget computer programs and to highlight the correspondence between each program advancement stage and the fitting standard and/or regulation.

Keywords: medical devices, regulation, software, development, healthcare

Procedia PDF Downloads 82
5819 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 301
5818 Study of Performance Based Parameters on Sprint Interval Training and Steady State Run: Trained Young Female

Authors: Abdul Latif Shaikh, Osama Kattos

Abstract:

Purpose: The study compared the effects of intra and inter group short duration intensity training and long duration steady state-run training on the cardiovascular performance on female athletes. Method: Twenty trained young female athletes age between 17 to 20 years were randomly selected to participate in the test. The sprint interval training (n-10) program consisted of 5 min sprints and steady state run (n-10) conducted for 30 min. Both groups completed eight sessions of training within four weeks. Result: In intragroup distribution of mean % change in all the variables from week 4 to week 1 did not differ significantly (p-value > 0.05). The inter-group means value of post resting heart rate, max oxygen consumption (VO2max), and calorie expenditure in sprint interval training was higher with compared with steady state run. Conclusion: The comparative mean value of the intergroups program concludes that the SIT program is superior to SSR in performance-based variables in trained young females. The SIT program can be applied as a time-efficient program for improving performance.

Keywords: calorie expenditure, maximum rate of oxygen consumption, post recovery HR (1-4-7 min), time domain

Procedia PDF Downloads 147
5817 Study of Village Scale Community Based Water Supply and Sanitation Program (Pamsimas) in Indonesia

Authors: Reza Eka Putra

Abstract:

Pamsimas is a community based drinking water supply and sanitation program which is contributed by local community, local government, central government, and World Bank with the aim of achieving Water Supply and Sanitation - the Millennium Development Goals (WSS-MDGs) target. This program is supported by the Ministry of Public Works as the executing agency with the cooperation of Ministry of Interior and the Ministry of Health. Field observations were conducted in two rural samples of 2009 beneficiaries Pamsimas West Java, which is in Ponggang Village, Subang District. The study was evaluated through several parameters, including technical, health, and empowerment aspect. Evaluation was done by comparing the parameters of success that has been set by Pamsimas through Pamsimas book manuals with the parameters from Sanitation & Infrastructure course regarding the appropriate application of technology in society. The result of the study is that the potency of the community before the program is implemented in the village is the determining factor. Stronger cooperation pattern in Ponggang Vilage results in a successful program. Both villages showed a pattern of behavior changes from indiscriminate defecation to sanitary latrine use. Besides, there is a decline in the number of cases of diarrheal disease since the year of Pamsimas implementation.

Keywords: millenium development goals, community develpoment, water supply, sanitation

Procedia PDF Downloads 229
5816 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 345
5815 A Proposed Training Program for the Development of the Kindergarten Teacher According To Her Contemporary Professionàĺ Needs

Authors: Abdulhakim Ali Mosleh Alzubidy

Abstract:

The study's aim was to establish a proposed training program for kindergarten teachers according to their modern professional demands so that they could effectively teach children through movement education and play. The sample, which consisted of (46) teachers and administrators selected at random from the Ibb governorate, represented the study population of kindergarten teachers and administrators. The researcher developed three survey forms as a tool for data collection, and the forms were used with the research sample. The researcher used the descriptive method due to its applicability and the nature of the study, and he also used the appropriate statistical treatment of the data, which is to extract the percentage and the percentage of agreement. The study came to the following conclusions: ● The proposed program is of great importance in preparing the kindergarten teacher in an appropriate manner that keeps pace with modern developments in this field. ● The field of movement education is a necessity for the kindergarten teacher, through which she will be able to prepare the child physically and kinetically and teach him effectively the principles of reading, writing, and numerical and arithmetic concepts.

Keywords: training program, professional needs, kindergarten, kindergarten teacher

Procedia PDF Downloads 41
5814 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 324
5813 Digital Image Steganography with Multilayer Security

Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal

Abstract:

In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.

Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix

Procedia PDF Downloads 311
5812 A Drawing Software for Designers: AutoCAD

Authors: Mayar Almasri, Rosa Helmi, Rayana Enany

Abstract:

This report describes the features of AutoCAD software released by Adobe. It explains how the program makes it easier for engineers and designers and reduces their time and effort spent using AutoCAD. Moreover, it highlights how AutoCAD works, how some of the commands used in it, such as Shortcut, make it easy to use, and features that make it accurate in measurements. The results of the report show that most users of this program are designers and engineers, but few people know about it and find it easy to use. They prefer to use it because it is easy to use, and the shortcut commands shorten a lot of time for them. The feature got a high rate and some suggestions for improving AutoCAD in Aperture, but it was a small percentage, and the highest percentage was that they didn't need to improve the program, and it was good.

Keywords: artificial intelligence, design, planning, commands, autodesk, dimensions

Procedia PDF Downloads 93
5811 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective

Authors: Obinna Emmanuel Nkomadu

Abstract:

A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.

Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea

Procedia PDF Downloads 117
5810 Project Management Tools within SAP S/4 Hana Program Environment

Authors: Jagoda Bruni, Jan Müller-Lucanus, Gernot Stöger-Knes

Abstract:

The purpose of this article is to demonstrate modern project management approaches in the SAP S/R Hana surrounding a programming environment composed of multiple focus-diversified projects. We would like to propose innovative and goal-oriented management standards based on the specificity of the SAP transformations and customer-driven expectations. Due to the regular sprint-based controlling and management tools' application, it has been data-proven that extensive analysis of productive hours of the employees as much as a thorough review of the project progress (per GAP, per business process, and per Lot) within the whole program, can have a positive impact on customer satisfaction and improvement for projects' budget. This has been a collaborative study based on real-life experience and measurements in collaboration with our customers.

Keywords: project management, program management, SAP, controlling

Procedia PDF Downloads 55
5809 Transmission Loss Analysis for Panels Laminated with Felt and Film

Authors: Yoshio Kurosawa

Abstract:

To reduce the interior noise of cars in high-frequency region, sound proof materials are laminated with the body panels and the interior trims. Therefore, sound proof properties of the laminates play an important role for the efficient acoustical design. A program code which predicts both sound absorption properties and sound insulation properties of the laminates are developed. This program code is used for transfer matrix method by Biot theory. This report described the outline of this program code, and the calculation results almost agreed with the experimental results.

Keywords: porous media, transmission loss, Biot theory, transfer matrix method

Procedia PDF Downloads 249
5808 The Effect of Group Counseling Program on 9th Grade Students' Assertiveness Levels

Authors: Ismail Seçer, Kerime Meryem Dereli̇oğlu

Abstract:

This study is conducted to determine the effects of group counseling program on secondary school 9th grade students’ assertiveness skills. The study group was formed of 100 students who have received education in Erzurum Kültür Elementary School in 2015-2016 education years. RAE-Rathus Assertiveness Schedule developed by Voltan Acar was applied on this group to gather data. 40 students who got lower grades from the inventory were divided randomly into experimental and control groups. Each group is formed of 20 students. Group counseling program was carried out on the experimental group to improve the students’ assertiveness skills for 8 weeks. Single-way and two-way analysis of covariance (ANCOVA) were used in the analysis of the data. The data was analyzed by using the SPSS 19.00. The results of the study show that assertiveness skills of the students who participate in the group counseling program increased meaningfully compared to the control group and pre-experiment. Besides, it was determined that the change observed in the experimental group occurred separately from the age and socio-economic level variables, and it was determined with the monitoring test applied after four months that this affect was continued. According to this result, it can be said that the applied group counseling program is an effective means to improve the assertiveness skills of secondary school students.

Keywords: high school, assertiveness, assertiveness inventory, assertiveness education

Procedia PDF Downloads 220
5807 Characterising Stable Model by Extended Labelled Dependency Graph

Authors: Asraful Islam

Abstract:

Extended dependency graph (EDG) is a state-of-the-art isomorphic graph to represent normal logic programs (NLPs) that can characterize the consistency of NLPs by graph analysis. To construct the vertices and arcs of an EDG, additional renaming atoms and rules besides those the given program provides are used, resulting in higher space complexity compared to the corresponding traditional dependency graph (TDG). In this article, we propose an extended labeled dependency graph (ELDG) to represent an NLP that shares an equal number of nodes and arcs with TDG and prove that it is isomorphic to the domain program. The number of nodes and arcs used in the underlying dependency graphs are formulated to compare the space complexity. Results show that ELDG uses less memory to store nodes, arcs, and cycles compared to EDG. To exhibit the desirability of ELDG, firstly, the stable models of the kernel form of NLP are characterized by the admissible coloring of ELDG; secondly, a relation of the stable models of a kernel program with the handles of the minimal, odd cycles appearing in the corresponding ELDG has been established; thirdly, to our best knowledge, for the first time an inverse transformation from a dependency graph to the representing NLP w.r.t. ELDG has been defined that enables transferring analytical results from the graph to the program straightforwardly.

Keywords: normal logic program, isomorphism of graph, extended labelled dependency graph, inverse graph transforma-tion, graph colouring

Procedia PDF Downloads 184
5806 Kinematic Behavior of Geogrid Reinforcements during Earthquakes

Authors: Ahmed Hosny Abdel-Rahman, Mohamed Abdel-Moneim

Abstract:

Reinforced earth structures are generally subjected to cyclic loading generated from earthquakes. This paper presents a summary of the results and analyses of a testing program carried out in a large-scale multi-function geosynthetic testing apparatus that accommodates soil samples up to 1.0 m3. This apparatus performs different shear and pullout tests under both static and cyclic loading. The testing program was carried out to investigate the controlling factors affecting soil/geogrid interaction under cyclic loading. The extensibility of the geogrids, the applied normal stresses, the characteristics of the cyclic loading (frequency, and amplitude), and initial static load within the geogrid sheet were considered in the testing program. Based on the findings of the testing program, the effect of these parameters on the pullout resistance of geogrids, as well as the displacement mobility under cyclic loading were evaluated. Conclusions and recommendations for the design of reinforced earth walls under cyclic loading are presented.

Keywords: geogrid, soil, interface, cyclic loading, pullout, large scale testing

Procedia PDF Downloads 593
5805 Positive Psychology and Parenting: A Case Study

Authors: Victor William Harris

Abstract:

Objective. This study examined the impact of the Positive Behavioral Management Skills (PBMS) online educational program on participants (n = 624) in a Southeastern region of the United States. The PBMS program incorporates established positive psychology behavioral management principles with new research-based practices designed to promote healthy and satisfying relationships between adults and children while constructively managing and preventing problematic behavior. Additionally, the PBMS program assists parents and teachers in recognizing the motivations behind a wide range of misbehaviors. The program also offers to forewarn some of the most common mistakes (or “parent traps”) in child behavioral management and describes how they can be avoided. It also describes how to recognize and capitalize on “teachable moments,” which are indispensable in the developmental process. Design. A retrospective-pre-test-then-post-test design was used to reduce response shift bias when assessing knowledge and skill intervention outcomes for twenty-two behavioral management variables. Results. The PBMS program was shown to be effective for increasing knowledge and skills related to managing misbehavior while reinforcing interpersonal relationships and fostering a sense of responsibility and capability within the child. Large standardized mean effect size changes from before to after program intervention was documented for PBMS participants on all twenty-two variables studied. Conclusion. The PBMS program showed initial positive outcomes to assist participants in the sample studied to increase their knowledge and skills in managing child behavior successfully. Implications for parents, educators and practitioners are discussed.

Keywords: behavioral management, discipline, parent education, positive parenting, positive psychology-parenting

Procedia PDF Downloads 196
5804 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 88
5803 Making Waves: Preparing the Next Generation of Bilingual Medical Doctors

Authors: Edith Esparza-Young, Ángel M. Matos, Yaritza Gonzalez, Kirthana Sugunathevan

Abstract:

Introduction: This research describes the existing medical school program which supports a multicultural setting and bilingualism. The rise of Spanish speakers in the United States has led to the recruitment of bilingual medical students who can serve the evolving demographics. This paper includes anecdotal evidence, narratives and the latest research on the outcomes of supporting a multilingual academic experience in medical school and beyond. People in the United States will continue to need health care from physicians who have experience with multicultural competence. Physicians who are bilingual and possess effective communication skills will be in high demand. Methodologies: This research is descriptive. Through this descriptive research, the researcher will describe the qualities and characteristics of the existing medical school programs, curriculum, and student services. Additionally, the researcher will shed light on the existing curriculum in the medical school and also describe specific programs which help to serve as safety nets to support diverse populations. The method included observations of the existing program and the implementation of the medical school program, specifically the Accelerated Review Program, the Language Education and Professional Communication Program, student organizations and the Global Health Institute. Concluding Statement: This research identified and described characteristics of the medical school’s program. The research explained and described the current and present phenomenon of this medical program, which has focused on increasing the graduation of bilingual and minority physicians. The findings are based on observations of the curriculum, programs and student organizations which evolves and remains innovative to stay current with student enrollment.

Keywords: bilingual, English, medicine, doctor

Procedia PDF Downloads 118
5802 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 94
5801 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 338