Search results for: security program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6219

Search results for: security program

6009 Security Issues and Primary School Participation in Kenya

Authors: Rose Mwanza

Abstract:

This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.

Keywords: ethnicity, social media, participation in school, poverty, terrorism

Procedia PDF Downloads 29
6008 Evidence from the Field: The Case Study of Golitos as an Effective Soccer Program for Autism Spectrum Disorder Children

Authors: J. O. Alvarez, L. Y. Rivera

Abstract:

Physical activity can reduce symptomatology in children with autism spectrum disorder (ASD). The sport of soccer has been widely applied as a therapeutic method for ASD children. However, empirical results from soccer programs are not widely known. This paper presents the case study of Golitos, the only dedicated soccer program for children on the island of Puerto Rico, and analyzes its results in the reduction of ASD social and emotional symptoms. The paper shows evidence that suggests that program approach, content, and community-based elements can make a notable difference in the effectiveness of using soccer or sports as therapeutic methods for children with ASD.

Keywords: autism, soccer, program, community

Procedia PDF Downloads 101
6007 Translation and Adaptation of Computer Assisted ASPIRA Smoking Prevention Program in Romania

Authors: Z. Abram, V. Nadasan, J. Balint, J. L. Ferencz

Abstract:

Introduction: Online smoking prevention programs became popular in the last time. In order to extend the use of such programs, existing applications can be adapted and translated in the native languages of the target groups. It is the first time that in Romania such a software was implemented. Our goal was to provide a computer-aided intervention with attractive content targeting high school students who are familiar with information and communication technology. Material and methods: ASPIRA is the Romanian/Hungarian adapted version of a smoking prevention program created in USA. Prior to apply the questionnaire and ASPIRA online program which contains five modules that include tests, videos and interactive games, the program was tested in some IT laboratories on a group of schoolchildren and students. The pilot study questionnaires were completed considering the opinions of young people and the functionality of the software. Results: Above 90% of participants reported a good or very good impression about the ASPIRA program. Only a small minority found that the program included some parts which were too long or reported the existence of any technical problems regarding the functionality of the software. 76% of the participants had little or very little difficulty in understanding the messages presented by the English speaking characters. Only 7.5% of the participants thought that the program included content that was not appropriate for the local culture. Conclusions: The vast majority of students reported favorite impressions about ASPIRA online program. High school students and boys were more critical. Language and cultural barriers did not have the potential to reduce in a significant manner the effectiveness of the tested program.

Keywords: smoking prevention, ASPIRA online program, youth opinions, language/cultural barriers

Procedia PDF Downloads 238
6006 Bug Localization on Single-Line Bugs of Apache Commons Math Library

Authors: Cherry Oo, Hnin Min Oo

Abstract:

Software bug localization is one of the most costly tasks in program repair technique. Therefore, there is a high claim for automated bug localization techniques that can monitor programmers to the locations of bugs, with slight human arbitration. Spectrum-based bug localization aims to help software developers to discover bugs rapidly by investigating abstractions of the program traces to make a ranking list of most possible buggy modules. Using the Apache Commons Math library project, we study the diagnostic accuracy using our spectrum-based bug localization metric. Our outcomes show that the greater performance of a specific similarity coefficient, used to inspect the program spectra, is mostly effective on localizing of single line bugs.

Keywords: software testing, bug localization, program spectra, bug

Procedia PDF Downloads 113
6005 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 52
6004 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 367
6003 The Effects of Evidence-Based Nursing Training and Consultation Program on Self-Efficacy and Outcome Expectancy of Evidence-Based Practice among Nurses

Authors: Yea-Pyng Lin

Abstract:

Evidence-based nursing (EBN) can improve quality of patient care and reduce medical expenses. Development of training and consultation program according to nurses’ needs and difficulties is essential to promote their competence and self-efficacy in EBN. However, limited research evaluated the effects of EBN program on EBN self-efficacy among nurses. This study aimed to evaluate the effects of an EBN consultation program on self-efficacy and outcome expectancy of evidence-based practice (EBP) among nurses. A two-group pretest-posttest quasi-experimental design was used. A purposive sample of full-time nurses was recruited from a hospital. Experimental group (n=28) received the EBN consultation program including 18-hour EBN training courses, hand-on practices and group discussion by faculty mentors. Control group (n=33) received regular in-service education with no EBN program. All participants received baseline and post-test assessment using Chinese version of Self-Efficacy in EBP scale (SE-EBP) and Outcome Expectancy for EBP scale (OE-EBP). After receiving EBN consultation program, experimental group’s posttest scores of SE-EBP (t=-4.98, p<0.001) and OE-SEP (t=-3.65, p=0.001) were significantly higher than those of the pretests. By controlling the age and years of nursing work experience, the experimental group‘s SE-EBP(F=10.47, p=0.002) and OE-SEP(F=9.53, p=0.003) scores were significantly improved compared to those of the control group. EBN program focus on hand-on practice and group discussion by faculty mentors in addition to EBN training courses can improve EBP self-efficacy and outcome expectancy among nurses. EBN program focus on English literature reading, database searching, and appraisal practice according to nurses’ needs and difficulties can promote implementation of EBN.

Keywords: evidence-based nursing, evidence-based practice, consultation program, self-efficacy, outcome expectancy

Procedia PDF Downloads 478
6002 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 96
6001 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 345
6000 Establishing a Strategic Agenda for Online MBA Program: A Case Study

Authors: Turkyh Alotibi, Ghadah Obeid Alrasheed, Afaf Saad Alshaibani, Moneerah Obeid Alrasheed

Abstract:

This study explores factors that influence MBA enrolment and investigates strategic prerequisites for developing a viable online MBA program at Alfaisal University in the Kingdom of Saudi Arabia. It compares students’ perspectives about online MBA against the face-to-face on-site MBA program. With the self-administered online survey tool, we collected data from 52 first- and second-year MBA students enrolled at Alfaisal University for the 2021 Fall Semester. The data from the survey questionnaire, distributed at the university’s College of Business, reports that approximately 60% of MBA students prefer face-to-face, in-person courses. Their preference for considering an online MBA, primarily rests on two factors, the university’s ranking (68% would enroll for an online MBA program offered by Harvard Business School) and 34.07% for the program timing (timetable). Alfaisal University’s outstanding ranking makes it viable to offer an online MBA either independently or in collaboration with other internationally reputed business schools. The paper contains useful insights to set “the strategic agenda for Online MBA program” in no accredited University but with a good reputation. The information from the case study could be useful for supporting the strategic intent to start an Online MBA program in Saudi Arabia.

Keywords: online MBA, online education demand, university management, course evaluation, blended learning

Procedia PDF Downloads 90
5999 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms

Authors: Saint C. Nguedjip

Abstract:

This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.

Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women

Procedia PDF Downloads 74
5998 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 204
5997 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria

Authors: Emmanuela Ngozi Maduka

Abstract:

In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.

Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force

Procedia PDF Downloads 107
5996 Impact of Ethiopia's Productive Safety Net Program on Household Dietary Diversity and Child Nutrition in Rural Ethiopia

Authors: Tagel Gebrehiwot, Carolina Castilla

Abstract:

Food insecurity and child malnutrition are among the most critical issues in Ethiopia. Accordingly, different reform programs have been carried to improve household food security. The Food Security Program (FSP) (among others) was introduced to combat the persistent food insecurity problem in the country. The FSP combines a safety net component called the Productive Safety Net Program (PSNP) started in 2005. The goal of PSNP is to offer multi-annual transfers, such as food, cash or a combination of both to chronically food insecure households to break the cycle of food aid. Food or cash transfers are the main elements of PSNP. The case for cash transfers builds on the Sen’s analysis of ‘entitlement to food’, where he argues that restoring access to food by improving demand is a more effective and sustainable response to food insecurity than food aid. Cash-based schemes offer a greater choice of use of the transfer and can allow a greater diversity of food choice. It has been proven that dietary diversity is positively associated with the key pillars of food security. Thus, dietary diversity is considered as a measure of household’s capacity to access a variety of food groups. Studies of dietary diversity among Ethiopian rural households are somewhat rare and there is still a dearth of evidence on the impact of PSNP on household dietary diversity. In this paper, we examine the impact of the Ethiopia’s PSNP on household dietary diversity and child nutrition using panel household surveys. We employed different methodologies for identification. We exploit the exogenous increase in kebeles’ PSNP budget to identify the effect of the change in the amount of money households received in transfers between 2012 and 2014 on the change in dietary diversity. We use three different approaches to identify this effect: two-stage least squares, reduced form IV, and generalized propensity score matching using a continuous treatment. The results indicate the increase in PSNP transfers between 2012 and 2014 had no effect on household dietary diversity. Estimates for different household dietary indicators reveal that the effect of the change in the cash transfer received by the household is statistically and economically insignificant. This finding is robust to different identification strategies and the inclusion of control variables that determine eligibility to become a PSNP beneficiary. To identify the effect of PSNP participation on children height-for-age and stunting we use a difference-in-difference approach. We use children between 2 and 5 in 2012 as a baseline because by then they have achieved long-term failure to grow. The treatment group comprises children ages 2 to 5 in 2014 in PSNP participant households. While changes in height-for-age take time, two years of additional transfers among children who were not born or under the age of 2-3 in 2012 have the potential to make a considerable impact on reducing the prevalence of stunting. The results indicate that participation in PSNP had no effect on child nutrition measured as height-for-age or probability of beings stunted, suggesting that PSNP should be designed in a more nutrition-sensitive way.

Keywords: continuous treatment, dietary diversity, impact, nutrition security

Procedia PDF Downloads 298
5995 Effect of Family-Based DOTS Support Program on Adherence to Health Behaviors among Patients with Pulmonary Tuberculosis in Bandung, Indonesia

Authors: D. I. Yani, S. Isaramalai, C. Kritpracha

Abstract:

Adherence to health behaviors is essential to achieve successful TB treatment. This study aimed to examine the effect of a family-based DOTS support program on adherence to health behaviors in patients with pulmonary TB. Sixty TB patients and their families were selected using cluster randomization of community health centers. The subjects were assigned into a control group, who received the routine care, and an experimental group, who received both routine care and care from the family-based DOTS support program. Paired t-test and the independent t-test were applied. The total score of adherence to health behaviors in the experimental group was significantly higher after receiving care from the family-based DOTS support program than the pretest score (t = -10.34, p < .001). Suggestions were made to expand the application of this program in various contexts and to extend knowledge for nursing practices and research.

Keywords: self-care deficit nursing theory, family-based DOTS program, pulmonary tuberculosis, adherence, health behaviors

Procedia PDF Downloads 432
5994 Deradicalization for Former Terrorists through Entrepreneurship Program

Authors: Jamal Wiwoho, Pujiyono, Triyanto

Abstract:

Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.

Keywords: deradicalization, terrorism, terrorists, entrepreneurship

Procedia PDF Downloads 238
5993 Voice Signal Processing and Coding in MATLAB Generating a Plasma Signal in a Tesla Coil for a Security System

Authors: Juan Jimenez, Erika Yambay, Dayana Pilco, Brayan Parra

Abstract:

This paper presents an investigation of voice signal processing and coding using MATLAB, with the objective of generating a plasma signal on a Tesla coil within a security system. The approach focuses on using advanced voice signal processing techniques to encode and modulate the audio signal, which is then amplified and applied to a Tesla coil. The result is the creation of a striking visual effect of voice-controlled plasma with specific applications in security systems. The article explores the technical aspects of voice signal processing, the generation of the plasma signal, and its relationship to security. The implications and creative potential of this technology are discussed, highlighting its relevance at the forefront of research in signal processing and visual effect generation in the field of security systems.

Keywords: voice signal processing, voice signal coding, MATLAB, plasma signal, Tesla coil, security system, visual effects, audiovisual interaction

Procedia PDF Downloads 51
5992 Functioning of Public Distribution System and Calories Intake in the State of Maharashtra

Authors: Balasaheb Bansode, L. Ladusingh

Abstract:

The public distribution system is an important component of food security. It is a massive welfare program undertaken by Government of India and implemented by state government since India being a federal state; for achieving multiple objectives like eliminating hunger, reduction in malnutrition and making food consumption affordable. This program reaches at the community level through the various agencies of the government. The paper focuses on the accessibility of PDS at household level and how the present policy framework results in exclusion and inclusion errors. It tries to explore the sanctioned food grain quantity received by differentiated ration cards according to income criterion at household level, and also it has highlighted on the type of corruption in food distribution that is generated by the PDS system. The data used is of secondary nature from NSSO 68 round conducted in 2012. Bivariate and multivariate techniques have been used to understand the working and consumption of food for this paper.

Keywords: calories intake, entitle food quantity, poverty aliviation through PDS, target error

Procedia PDF Downloads 304
5991 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 32
5990 Determinants of Household Food Security in Addis Ababa City Administration

Authors: Estibe Dagne Mekonnen

Abstract:

In recent years, the prevalence of undernourishment was 30 percent for sub-Saharan Africa, compared with 16 percent for Asia and the Pacific (Ali, 2011). In Ethiopia, almost 40 percent of the total population in the country and 57 percent of Addis Ababa population lives below the international poverty line of US$ 1.25 per day (UNICEF, 2009). This study aims to analyze the determinant of household food secrity in Addis Ababa city administration. Primary data were collected from a survey of 256 households in the selected sub-city, namely Addis Ketema, Arada, and Kolfe Keranio, in the year 2022. Both Purposive and multi-stage cluster random sampling procedures were employed to select study areas and respondents. Descriptive statistics and order logistic regression model were used to test the formulated hypotheses. The result reveals that out of the total sampled households, 25% them were food secured, 13% were mildly food insecure, 26% were moderately food insecure and 36% were severely food insecure. The study indicates that household family size, house ownership, household income, household food source, household asset possession, household awareness on inflation, household access to social protection program, household access to credit and saving and household access to training and supervision on food security have a positive and significant effect on the likelihood of household food security status. However, marital status of household head, employment sector of household head, dependency ratio and household’s nonfood expenditure has a negative and significant influence on household food security status. The study finally suggests that the government in collaboration with financial institutions and NGO should work on sustaining household food security by creating awareness, providing credit, facilitate rural-urban linkage between producer and consumer and work on urban infrastructure improvement. Moreover, the governments also work closely and monitor consumer good suppliers, if possible find a way to subsidize consumable goods to more insecure households and make them to be food secured. Last but not least, keeping this country’s peace will play a crucial role to sustain food security.

Keywords: determinants, household, food security, order logit model, Addis Ababa

Procedia PDF Downloads 23
5989 The Effort of Good Governance in Enhancing Foods Security for Sustainable National Development

Authors: Egboja Simon Oga

Abstract:

One of the most important keys to the success of a nation is to ensure steady development and national economic self-sufficiency and independence. It is therefore in this regard that this paper is designed to identify food security to be crucial to all nations’ effort toward sustainable national development. Nigeria as a case study employed various effort by the successive government towards food security. Emphasis were placed on the extent to which government has boosted food security situation on the basis of the identified limitations, conclusion was drawn, recommendation/suggestions proffered, that subsidization of the process of farm inputs like fertilizer, improved seeds and agrochemical, education of farmers on modern methods of farming through extension services, improvisation of village-based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produces are necessary.

Keywords: food, governance, development, security

Procedia PDF Downloads 296
5988 Investigation of the Opinions and Recommendations of Participants Related to Operating Room Nursing Certified Course Program

Authors: Zehra Gencel Efe, Fatma Susam Ozsayın, Satı Tas

Abstract:

Background and Aim: It is not possible to teach all the knowledge related to operating room nursing in the nursing education process. Certified courses are organized by the Ministry of Health to compensate the lack of postgraduate training and the theoretical and practical training needs of working nurses. In this study; It is aimed to investigate the participants’ opinions and recommendations attending the certified course of operating room nursing that organized in İKCU AtaturkTraining and Research Hospital. Method: Two operating room nursing courses were organized in 2016. The 1st Operating Room Nursing Certified Course Program was organized between March 07, 2016 and April 6, 2016and the 2nd Operating Room Nursing Certified Course Program was organized between 07 November 2016 - 06 December 2016 at the İKCU Ataturk Training and Research Hospital. The first program was accepted for 29 participants, the second program was accepted for 30 participants. In the collection of the data, the 'Operating Room Nursing Certified Training Program Evaluation Form', 'Operating Room Nursing Certified Training Program Theoretical Training Evaluation Form' were used. Three point Likert-type scale is used for responses in the 'Operating Room Nursing Certified Training Program Evaluation Form’ (1=verygood, 2=good, 3=poor). Data is collected in five areas related to training program, operation room practice, communication, responsibility, experiences of learning. Four point Likert-type scale is used for responses in the 'Operating Room Nursing Certified Training Program Theoretical Training Evaluation Form' (1=verysatisfied, 2=quitesatisfied, 3=satisfied, 4=dissatisfied). Data is collected in two areas include presentation and content. Data were analyzed with SPSS 16 program. Findings and Conclusion: It was found that 93,22% of participants were female in addition, 62,7% had bachelor degree. It was seen that 33,87% of the work group had 1-5 years of experience in their field. It was found that; 88% of trainees participating in the first group to the operating room nursing-certified course program stated the training program was very good, 12% of them stated the training program was good. Nobody was signed the ‘poor’ choice. 81% of the trainees who participated in the 2nd group to the operating room nursing-certified course program stated the training program was very good, 19% of them stated the training program was good. Nobody was signed the ‘poor’ choice. It was found that there was no meaningful difference between the achievement ratios of the trainees and the learning status of the trainees when compared with the t test in the groups with success level of the operating room nursing certified course program according to the learning status of the participants (p ˃ 0,05). The trainees noted that the course was satisfied with theoretical and practical steps but the support services (lunch, coffee breaks etc.) were in adequate.

Keywords: certified courses, nursing certified courses, operating room nursing, training program

Procedia PDF Downloads 193
5987 A Curricular Approach to Organizational Mentoring Programs: The Integrated Mentoring Curriculum Model

Authors: Christopher Webb

Abstract:

This work presents a new model of mentoring in an organizational environment and has important implications for both practice and research, the model frames the organizational environment as organizational curriculum, which includes the elements that affect learning within the organization. This includes the organizational structure and culture, roles within the organization, and accessibility of knowledge. The program curriculum includes the elements of the mentoring program, including materials, training, and scheduled events for the program participants. The term dyadic curriculum is coined in this work. The dyadic curriculum describes the participation, behavior, and identities of the pairs participating in mentorships. This also includes the identity work of the participants and their views of each other. Much of this curriculum is unprescribed and is unique within each dyad. It describes how participants mediate the elements of organizational and program curricula. These three curricula interact and affect each other in predictable ways. A detailed example of a mentoring program framed in this model is provided.

Keywords: curriculum, mentoring, organizational learning and development, social learning

Procedia PDF Downloads 168
5986 Foreign Language Reading Comprehenmsion and the Linguistic Intervention Program

Authors: Silvia Hvozdíková, Eva Stranovská

Abstract:

The purpose of the article is to discuss the results of the research conducted during the period of two semesters paying attention to selected factors of foreign language reading comprehension through the means of Linguistic Intervention Program. The Linguistic Intervention Program was designed for the purpose of the current research. It refers to such method of foreign language teaching which emphasized active social learning, creative drama strategies, self-directed learning. The research sample consisted of 360 respondents, foreign language learners ranging from 13 – 17 years of age. Specifically designed questionnaire and a standardized foreign language reading comprehension tests were applied to serve the purpose. The outcomes of the research recorded significant results towards significant relationship between selected elements of the Linguistic Intervention Program and the academic achievements in the factors of reading comprehension.

Keywords: foreign language learning, linguistic intervention program, reading comprehension, social learning

Procedia PDF Downloads 90
5985 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 505
5984 Policy Guidelines to Enhance the Mathematics Teachers’ Association of the Philippines (MTAP) Saturday Class Program

Authors: Roselyn Alejandro-Ymana

Abstract:

The study was an attempt to assess the MTAP Saturday Class Program along its eight components namely, modules, instructional materials, scheduling, trainer-teachers, supervisory support, administrative support, financial support and educational facilities, the results of which served as bases in developing policy guidelines to enhance the MTAP Saturday Class Program. Using a descriptive development method of research, this study involved the participation of twenty-eight (28) schools with MTAP Saturday Class Program in the Division of Dasmarinas City where twenty-eight school heads, one hundred twenty-five (125) teacher-trainer, one hundred twenty-five (125) pupil program participants, and their corresponding one hundred twenty-five (125) parents were purposively drawn to constitute the study’s respondent. A self-made validated survey questionnaire together with Pre and Post-Test Assessment Test in Mathematics for pupils participating in the program, and an unstructured interview guide was used to gather the data needed in the study. Data obtained from the instruments administered was organized and analyzed through the use of statistical tools that included the Mean, Weighted Mean, Relative Frequency, Standard Deviation, F-Test or One-Way ANOVA and the T-Test. Results of the study revealed that all the eight domains involved in the MTAP Saturday Class Program were practiced with the areas of 'trainer-teachers', 'educational facilities', and 'supervisory support' identified as the program’s strongest components while the areas of 'financial support', 'modules' and 'scheduling' as being the weakest program’s components. Moreover, the study revealed based on F-Test, that there was a significant difference in the assessment made by the respondents in each of the eight (8) domains. It was found out that the parents deviated significantly from the assessment of either the school heads or the teachers on the indicators of the program. There is much to be desired when it comes to the quality of the implementation of the MTAP Saturday Class Program. With most of the indicators of each component of the program, having received overall average ratings that were at least 0.5 point away from the ideal rating 5 for total quality, school heads, teachers, and supervisors need to work harder for total quality of the implementation of the MTAP Saturday Class Program in the division.

Keywords: mathematics achievement, MTAP program, policy guidelines, program assessment

Procedia PDF Downloads 181
5983 Tribal Food Security Assessment and Its Measurement Index: A Study of Tribes and Particularly Vulnerable Tribal Groups in Jharkhand, India

Authors: Ambika Prasad Gupta, Harshit Sosan Lakra

Abstract:

Food security is an important issue that has been widely discussed in literature. However, there is a lack of research on the specific food security challenges faced by tribal communities. Tribal food security refers to the ability of indigenous or tribal communities to consistently access and afford an adequate and nutritious supply of food. These communities often have unique cultural, social, and economic contexts that can impact their food security. The study aims to assess the food security status of all thirty-two major tribes, including Particularly Vulnerable Tribal Groups (PVTG) people living in various blocks of Jharkhand State. The methodology of this study focuses on measuring the food security index of indigenous people by developing and redefining a new Tribal Food Security Index (TFSI) as per the indigenous community-level indicators identified by the Global Food Security Index and other indicators relevant to food security. Affordability, availability, quality and safety, and natural resources were the dimensions used to calculate the overall Tribal Food Security Index. A survey was conducted for primary data collection of tribes and PVTGs at the household level in various districts of Jharkhand with a considerable tribal population. The result shows that due to the transition from rural to urban areas, there is a considerable change in TFSI and a decrease in forest dependency of tribal communities. Socioeconomic factors like occupation and household size had a significant correlation with TFSI. Tribal households living in forests have a higher food security index than tribal households residing in urban transition areas. The study also shows that alternative methodology adopted to measure specific community-level food security creates high significant impact than using commonly used indices.

Keywords: indigenous people, tribal food security, particularly vulnerable tribal groups, Jharkhand

Procedia PDF Downloads 38
5982 Security Model for RFID Systems

Authors: John Ayoade

Abstract:

Radio Frequency Identification (RFID) has gained a lot of popularity in all walks of life due to its usefulness and diverse use of the technology in almost every application. However, there have been some security concerns most especially in regards to how authentic readers and tags can confirm their authenticity before confidential data is exchanged between them. In this paper, Kerberos protocol is adopted for the mutual authentication of RFID system components in order to ensure the secure communication between those components and to realize the authenticity of the communicating components.

Keywords: RFID, security, mutual authentication, Kerberos

Procedia PDF Downloads 433
5981 Stressors Faced by Border Security Officers: The Singapore Experience

Authors: Jansen Ang, Andrew Neo, Dawn Chia

Abstract:

Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers.

Keywords: border security, Singapore, stress, operations

Procedia PDF Downloads 294
5980 Innovations in the Organization of Adaptation Program for International Students in Russia Based on Human Capital Approach

Authors: Kalinina Anastasiya, Pevnaya Mariya

Abstract:

The authors present the results of research of educational and cultural habitat of international students at Ural Federal University, revealing problem zones in the organization of adaptation program in 2014-2015 as well as innovations in adaptation program for 2015-2016. The research is based on U-curve theory of culture shock and theory of human capital. The authors provide also the first results for all stakeholders of practically implemented pilot adaptation program for foreign students which was based on the human capital approach.

Keywords: adaptation, human capital, international students, student volunteering, social community, youth politics

Procedia PDF Downloads 312