516 research outputs found

    SECONDARY SCHOOL STUDENTS’ DROPOUTS AND CRIME ESCALATION IN VIHIGA COUNTY, KENYA

    Get PDF
    Crime escalation in Africa has been associated with politics. Statistics reveal that to some extent, secondary school dropouts are a trigger to crime in Kenya. The period between 2009 and 2012 had seen the number of children aged between 15 years to 19 years in conflict with the law steadily rise in Vihiga County, Kenya. It was against that background that the current study sought to examine the relationship between secondary school dropouts and crime escalation in Vihiga County, Kenya. The objective was to discuss the criminal activities by secondary school dropouts in Vihiga County, Kenya. The Study was anchored on a conceptual framework of Labeling Theory and Conflict Theory. The target population was 5,760 whose respondents were 112 Principals, 5 District Probation Officers, 5,568 students who had dropped from school, 64 Chiefs, 1 County Commander, 5 Officers Commanding Police Divisions and 5 Divisional Criminal Investigating Officers. The sample size was 1,738. In-depth interviews with key informants were conducted to supplement information obtained from the questionnaire. Systematic random sampling and purposive sampling techniques were used to select the respondents. Data were collected through interviews with chiefs, District Probation Officers, Officers Commanding Police Stations and Divisional Criminal Investigating Officers to get information on criminal activities by dropouts. Questionnaires were administered to Principals and Drop-outs to get information on reasons for dropping out of school. The data were transcribed and analyzed using Correlational survey research design. Findings that emerged from this study indicated that secondary school dropouts committed different types of crimes like alcohol and drug abuse, stealing assault, affray, defilement, robbery with violence and murder. The current study was significant in that it was likely to remain a permanent record of study and would be used to advance knowledge by future researchers. It was also anticipated that by using the findings of the current study, Security and Education Agencies would benefit by understanding better the current nature of crime that was committed by secondary school dropouts. Article visualizations

    An Investigation into Factors Affecting the Chilled Food Industry

    Get PDF
    With the advent of Industry 4.0, many new approaches towards process monitoring, benchmarking and traceability are becoming available, and these techniques have the potential to radically transform the agri-food sector. In particular, the chilled food supply chain (CFSC) contains a number of unique challenges by virtue of it being thought of as a temperature controlled supply chain. Therefore, once the key issues affecting the CFSC have been identified, algorithms can be proposed, which would allow realistic thresholds to be established for managing these problems on the micro, meso and macro scales. Hence, a study is required into factors affecting the CFSC within the scope of Industry 4.0. The study itself has been broken down into four main topics: identifying the key issues within the CFSC; implementing a philosophy of continuous improvement within the CFSC; identifying uncertainty within the CFSC; improving and measuring the performance of the supply chain. However, as a consequence of this study two further topics were added: a discussion of some of the issues surrounding information sharing between retailers and suppliers; some of the wider issues affecting food losses and wastage (FLW) on the micro, meso and macro scales. A hybrid algorithm is developed, which incorporates the analytic hierarchical process (AHP) for qualitative issues and data envelopment analysis (DEA) for quantitative issues. The hybrid algorithm itself is a development of the internal auditing algorithm proposed by Sueyoshi et al (2009), which in turn was developed following corporate scandals such as Tyco, Enron, and WorldCom, which have led to a decline in public trust. However, the advantage of the proposed solution is that all of the key issues within the CFSC identified can be managed from a single computer terminal, whilst the risk of food contamination such as the 2013 horsemeat scandal can be avoided via improved traceability

    Sustainable exploitation : the political ecology of the Livestock Revolution

    Get PDF
    Animal agriculture emits more greenhouse gases than the global transport sector, is the single largest driver of biodiversity loss, and contributes to the crossing of almost every other planetary boundary as well. The industrial exploitation of yearly more than 70 billion land animals and a trillion aquatic animals for profit is strongly linked to social injustice like hunger and colonialism. Nevertheless, international institutions anticipate a Livestock Revolution, an upsurge in the consumption of animal source foods of around 70 percent by 2050, increasing the number of slaughtered land animals to 120 billion via sustainable intensification. Despite its immense socioeconomic and ecological impact, the Livestock Revolution remains unexplored and uncontested, both in academia and politics. This thesis scrutinizes the discourses and structures fueling the Livestock Revolution, it interrogates its inevitability and its consequences for animals, society, and the environment. Performing a sociological discourse analysis of reports on the Livestock Revolution from 1999 to 2016, the dissertation demonstrates that the Revolution is not unavoidable but rather a process promoted in view of stagnating turnovers in the Minority World. The widely shared biologistic assertion that population growth, income increase, and urbanization in the Majority World provoke an increasing consumption of animal protein conceals the discursive and structural settings of the Livestock Revolution, which, ultimately, universalize the Minority World’s meatified system of production and consumption. To condense the Revolution’s chief characteristics, the thesis proposes the concept of “sustainable exploitation”, underscoring, on the one hand, the Revolution’s promise of green growth, poverty alleviation, and environmental stewardship, and, on the other hand, its detrimental effects on farmed animals, workers, communities, and nature at large – in sum, the paradoxes of ecological modernization theory. In its uniformity, the Livestock Revolution discourse is highly successful; counterhegemonic perspectives are exceptional. It is thus crucial to dismantle the symbolic power of the Minority World’s imperial diet and to reveal that the Livestock Revolution is not a matter of fate but a question of power and capital interests

    Annual Report of the University, 2007-2008, Volumes 1-6

    Get PDF
    Project Summary and Goals Historically, affirmative action policies have evolved from initial programs aimed at providing equal educational opportunities to all students, to the legitimacy of programs that are aimed at achieving diversity in higher education. In June 2003, a U.S. Supreme Court ruling on affirmative action pushed higher education across the threshold toward creating a new paradigm for diversity in the 21 51 century. The court clearly stale that affirmative action is still viable but that our institutions must reconsider our traditional concepts for building diversity in the next few decades. This shift in historical context of diversity in our society has led to an important objective: If a diverse student body is an essential factor in a quality higher education, then it is imperative that elementary, secondary and undergraduate schools fulfill their missions to successfully educate a diverse population. In NM, the success of graduate programs depends on the state\u27s P-12 schools, the community and institutions of higher education, and their shared task of educating all students. Further, when the lens in broadened to view the entire P - 20 educational pipeline, it becomes apparent that the loss of students from elementary school to high school is enormous, constricting the number of students who go on to college. Not only are these of concern to what is happening in terms of their academic education but as well in terms of the communities that are affected to make critical decision and become and stay involved in the political and policy world that affects them. Guiding Principles Engaging Latino Communities for Education New Mexico (ENLACE NM) is a statewide collaboration of gente who represent the voices of underrepresented children and families- people who have historically not had a say in policy initiatives that directly impact them and their communities. Therefore, they, and others from our community, are at the forefront of this initiative. We have developed this collaboration based on a process that empowers these communities to find their voice in the pursuit of social justice and educational access, equity and success

    Externalities and Enterprise Software: Helping and Hindering Legal Compliance

    Get PDF
    Enterprise software helps organizations comply with laws and regulations, yet software itself creates negative externalities that can undermine rights and laws. Software developers are an important regulatory force, yet many know little about how law and software interact. This work examines developer understanding of legal concepts and examples of the software code and law relationship: payroll, Sarbanes Oxley Act, web accessibility, and data protection

    Human Trafficking Law in Malaysia as Reflected in Policies and Practices

    Get PDF
    Human Trafficking is a global phenomenon which represents an obdurate and serious problem in Malaysia, which is a destination, source and transit country for forced labour and sexual exploitation. Human trafficking is difficult to eradicate as were former slavery practices, since it manifests itself in complicated and multi-layered forms, often committed by the clandestine and sophisticated groups of perpetrators. Realising its menace, the international community has taken constructive moves to address the problem by agreeing on a comprehensive international treaty in the form of the Trafficking Protocol 2000 reflecting the 3P paradigm – to prevent, prosecute and protect. The main focus of this research is to critically analyse the Malaysian policy and the legal provision responding to human trafficking in the light of international law. It investigates the human trafficking problems, and the relevant policy, strategy as well as laws in addressing human trafficking in Malaysia based on the premise that the anti-human trafficking strategy and laws should be concurrent with the international treaty. It identifies shortcomings in the implementation in terms of fairness and effectiveness. Such shortfalls are due to various reasons including the lack of empathy, knowledge, training and resources. The problem is aggravated by the practices of corruption, hence creating obstacles in the policy and legal implementation process. While this research aims to review the policy and laws in Malaysia, it also makes some reference to the policy and laws governing human trafficking in England and Wales to identify progressive ideas for Malaysia’s adoption. This research also argues that the values of the effectiveness and fairness within the implementation of the policy and laws in Malaysia must be adhered to so as to enable the human trafficking problems to be addressed appropriately in the long run

    Guessing human-chosen secrets

    Get PDF
    Authenticating humans to computers remains a notable weak point in computer security despite decades of effort. Although the security research community has explored dozens of proposals for replacing or strengthening passwords, they appear likely to remain entrenched as the standard mechanism of human-computer authentication on the Internet for years to come. Even in the optimistic scenario of eliminating passwords from most of today's authentication protocols using trusted hardware devices or trusted servers to perform federated authentication, passwords will persist as a means of "last-mile" authentication between humans and these trusted single sign-on deputies. This dissertation studies the difficulty of guessing human-chosen secrets, introducing a sound mathematical framework modeling human choice as a skewed probability distribution. We introduce a new metric, alpha-guesswork, which can accurately models the resistance of a distribution against all possible guessing attacks. We also study the statistical challenges of estimating this metric using empirical data sets which can be modeled as a large random sample from the underlying probability distribution. This framework is then used to evaluate several representative data sets from the most important categories of human-chosen secrets to provide reliable estimates of security against guessing attacks. This includes collecting the largest-ever corpus of user-chosen passwords, with nearly 70 million, the largest list of human names ever assembled for research, the largest data sets of real answers to personal knowledge questions and the first data published about human choice of banking PINs. This data provides reliable numbers for designing security systems and highlights universal limitations of human-chosen secrets
    • …
    corecore