453,445 research outputs found

    English Competencies and Challenges for Data Science and Cyber Security Students at Al Istiqlal University

    Get PDF
    This present research aims to determine the growing needs and challenges faced by Data Science and Cyber Security students at Al Istiqlal University's Faculty of Information Technology when learning the English language. It also tries to ascertain whether gender and level of competence affected their requirements and difficulties in mastering the English language. 35 cadets who are specializing in Data Science and Cyber Security make up the sample. The researcher gave out 39 questionnaire items divided into eight domains. The results show that cadets in Data Science and Cyber Security did not undergo any guidance regarding how to utilize English in the discipline while engaging in the analysis of data or cyber security keywords. Additionally, the study demonstrates that cadets majoring in data science and cyber security did not receive any guidance on how to learn to communicate in English, and the teaching activities in the English programs they had taken did not match their notions of the standards for expert English. Moreover, English proficiency requirements for cadets enrolling in Data Science and Cyber Security courses should be taken into consideration.  Additionally, no statically meaningful differences in the demands for key competencies and barriers faced by Data Science and Cyber Security cadets are found when gender and competency traits are taken into consideration

    Security management education online

    Get PDF
    This paper describes the philosophy and pedagogy informing the design and development of Security Science online units. The Physical Security unit is used to illustrate the development of the online learning strategies and interactive activities. Learning materials developed for this course have unique attributes as they were specifically designed to provide simulations and interactivity in the learning process. Field scenarios have been developed for the activities to make the learning experiences as realistic as possible. Simulations and graphics provide these experiences, together with security site images for actual security barriers, systems and technologies. Features of units in the course include graphics, simulations, and video clips to present learning aspects of security that are not normally available to students

    Advances in negotiation theory : bargaining, coalitions, and fairness

    Get PDF
    Bargaining is ubiquitous in real life. It is a major dimension of political and business activities. It appears at the international level, when governments negotiate on matters ranging from economic issues (such as the removal of trade barriers), to global security (such as fighting against terrorism) to environmental and related issues (such as climate change control). What factors determinethe outcomes of such negotiations? What strategies can help reach an agreement? How should the parties involved divide the gains from cooperation? With whom will one make alliances? The authors address these questions by focusing on a noncooperative approach to negotiations, which is particularly relevant for the study of international negotiations. By reviewing noncooperative bargaining theory, noncooperative coalition theory, and the theory of fair division, they try to identify the connections among these different facets of the same problem in an attempt to facilitate progress toward a unified framework.Economic Theory&Research,Social Protections&Assistance,Environmental Economics&Policies,Scientific Research&Science Parks,Science Education

    Problems in increasing innovative sustainability of regional development

    Get PDF
    The article provides a comparative analysis of innovative and technological development in Russia and other countries. The paper shows that the innovation sector of the Russian Federation lags behind most developed and developing countries: Russia has almost left the market of high technologies, the main expenditures on innovations are incurred in the sectors of low and medium technology industries; the self-sufficiency in the Russian economy in a number of key types of manufacturing equipment is significantly below the threshold marks determined by national security requirements. The authors describe the differentiation of innovative development in the Russian regions. The study of Russian innovation space has revealed that there are fairly intensive processes of science decay on the periphery, which causes serious problems for the spread of innovative impulses across the country. The article elaborates the methodology for comprehensive assessment of innovative security in the region and presents the relevant calculations for the regions of the Ural Federal District (UFD). It identifies the factors of innovative sustainability that are the most critical for these regions. The authors present the forecast and built long-term forecast trajectories for the level of innovative security in UFD by using the modernized Hurst method. They define the main barriers to the innovative development of Russian regions. The article presents the methodological approaches to substantiating the priority areas for building the innovative systems of regions by taking into account the characteristics of their science and manufacturing complexes. The authors propose a methodology to formally assess the priority of establishing in the region the centers of innovative activity aimed at supporting the competitiveness of industries with different levels of technology intensity. The paper presents the results of calculations with regard to priority of establishing the centers of innovative activity aimed at supporting the development of industries with different level of technology intensity using the example of UFD, one of the leading Russian regions in terms of innovation and production capacity.The article has been supported by the Russian Humanitarian Science Foundation, Project 14-02-00331 “Innovative and technology development of the region: assessment, forecasting and ways of progressing”

    An Argument for Interdisciplinary Programs in Cybersecurity

    Get PDF
    In this commentary Dr. Giever presents a compelling argument for interdisciplinary programs in cybersecurity at the university level. He argues that we no longer have the luxury of allowing barriers to exist between those tasked with IT security and those who provide physical security. He recommends that any security program take an “all possible paths” or “balanced approach” to the protection of assets within an organization. Students in computer science, criminal justice, business, human resources, and others should work collaboratively within education programs learning these necessary skills. A team effort is needed to accomplish the myriad of tasks necessary to protect assets today. Graduates from such programs will possess the skills and abilities to work collaboratively on a comprehensive security design for their organization

    Help or hindrance ? the impact of harmonized standards on african exports

    Get PDF
    The authors test the hypothesis that product standards harmonized to de facto international standards are less trade restrictive than ones that are not. To do this, the authors construct a new database of European Union (EU) product standards. The authors identify standards that are aligned with ISO standards (as a proxy for de facto international norms). The authors use a sample-selection gravity model to examine the impact of EU standards on African textiles and clothing exports, a sector of particular development interest. The authors find robust evidence that non-harmonized standards reduce African exports of these products. EU standards which are harmonized to ISO standards are less trade restricting. Our results suggest that efforts to promote African exports of manufactures may need to be complemented by measures to reduce the cost impacts of product standards, including international harmonization. In addition, efforts to harmonize national standards with international norms, including through the World Trade Organization Technical Barriers to Trade Agreement, promise concrete benefits through trade expansion.Information Security&Privacy,Standards and Technical Regulations,Science Education,Scientific Research&Science Parks,Information and Records Management

    SensorCloud: Towards the Interdisciplinary Development of a Trustworthy Platform for Globally Interconnected Sensors and Actuators

    Get PDF
    Although Cloud Computing promises to lower IT costs and increase users' productivity in everyday life, the unattractive aspect of this new technology is that the user no longer owns all the devices which process personal data. To lower scepticism, the project SensorCloud investigates techniques to understand and compensate these adoption barriers in a scenario consisting of cloud applications that utilize sensors and actuators placed in private places. This work provides an interdisciplinary overview of the social and technical core research challenges for the trustworthy integration of sensor and actuator devices with the Cloud Computing paradigm. Most importantly, these challenges include i) ease of development, ii) security and privacy, and iii) social dimensions of a cloud-based system which integrates into private life. When these challenges are tackled in the development of future cloud systems, the attractiveness of new use cases in a sensor-enabled world will considerably be increased for users who currently do not trust the Cloud.Comment: 14 pages, 3 figures, published as technical report of the Department of Computer Science of RWTH Aachen Universit

    Linking adaptation science to action to build food secure Pacific Island communities

    Get PDF
    Climate change is a major threat to food security in Pacific Island countries, with declines in food production and increasing variability in food supplies already evident across the region. Such impacts have already led to observed consequences for human health, safety and economic prosperity. Enhancing the adaptive capacity of Pacific Island communities is one way to reduce vulnerability and is underpinned by the extent to which people can access, understand and use new knowledge to inform their decision-making processes. However, effective engagement of Pacific Island communities in climate adaption remains variable and is an ongoing and significant challenge. Here, we use a qualitative research approach to identify the impediments to engaging Pacific Island communities in the adaptations needed to safeguard food security. The main barriers include cultural differences between western science and cultural knowledge, a lack of trust among local communities and external scientists, inappropriate governance structures, and a lack of political and technical support. We identify the importance of adaptation science, local social networks, key actors (i.e., influential and trusted individuals), and relevant forms of knowledge exchange as being critical to overcoming these barriers. We also identify the importance of co-ordination with existing on-ground activities to effectively leverage, as opposed to duplicating, capacity

    WHAT ARE THE BARRIERS TO THE IMPLEMENTATION OF ELECTRONIC MEDICAL RECORDS? A REVIEW OF RECENT STUDIES

    Get PDF
    Information technology utilization in the health sector is increasingly widespread. One aspect that cannot be separated from the intervention of information technology is medical records management through electronic medical records implementation. The number of healthcare facilities that implement electronic medical records is increasing. However, it is important to understand the various barriers that may be encountered in the electronic medical records implementation so that the success rate of implementation will be higher. This study aims to identify the current state of knowledge about electronic medical records implementation barriers. A literature review was conducted using three databases, PubMed, Science Direct, and Google Scholar using "electronic medical records'' and "implementation barriers" as keywords. There were 13 articles used in this study. There are 8 categories of barriers to the implementation of electronic medical records which consist of technical concerns, initial and maintenance costs, security concerns, lack of technical support, user resistance, system interoperability capability, lack of infrastructures, and productivity concerns

    Barriers to the adoption of new safety technologies in construction: a developing country context

    Get PDF
    The adoption rate of new technologies is still relatively low in the construction industry, particularly for mitigating occupational safety and health (OSH) risks, which is traditionally a largely labor-intensive activity in developing countries, occupying ill-afforded non-productive management resources. However, understanding why this is the case is a relatively unresearched area in developing countries such as Malaysia. In aiming to help redress this situation, this study explored the major barriers involved, firstly by a detailed literature review to identify the main barriers hampering the adoption of new technologies for safety science and management in construction. Then, a questionnaire survey of Malaysian construction practitioners was used to prioritize these barriers. A factor analysis further identified six major dimensions underlying the barriers, relating to the lack of OSH regulations and legislation, technological limitations, lack of genuine organizational commitment, prohibitive costs, poor safety culture within the construction industry, and privacy and data security concerns. Taken together, the findings provide a valuable reference to assist industry practitioners and researchers regarding the critical barriers to the adoption of new technologies for construction safety management in Malaysia and other similar developing countries, and bridge the identified knowledge gap concerning the dimensionality of the barriers
    • 

    corecore