2,967 research outputs found

    Examining housing experiences among International Students at the University of Tennessee, Knoxville (UTK)

    Get PDF
    As more students from across the world enrol in higher education to take advantage of the opportunities it offers, schools and universities are starting to address a problem that an increasing number of their students are experiencing, namely housing insecurity. With an increase in the number of students due to growing interest in higher education institutions, student housing has become a significant area of concern. More overseas graduate students are pursuing their degrees without regular access to their housing needs due to a lack of inexpensive and accessible housing, high tuition prices, and insufficient financial help. To better understand the distinctive lived experiences of students, this study examines the idea of precarity. It places a particular emphasis on accessibility, affordability, and discrimination, as well as how the fact that these students are international has exacerbated their experiences of housing precarity. The study will examine the difficulties that international students encounter in finding housing and shed light on these students’ experiences and how these differ based on gender, race, and class, among other factors. It will also delve further into some strategies that international students use to assist one another in their search. The study’s conclusion will include recommendations that higher education institutes can employ to ensure more inclusive housing systems

    HANDLING WORK FROM HOME SECURITY ISSUES IN SALESFORCE

    Get PDF
    Security is a vital component when it is identified with an endeavor record or our genuine materials. To protect our home or valuable things like gold, cash we use bank storage administrations or underground secret storage spaces at home. Similarly, IT enterprises put tremendous measure of capital in expanding security to its business and the archives. Associations use cryptography procedures to get their information utilizing progressed encryption calculations like SHA-256, SHA-512, RSA-1024, RSA-2048 pieces’ key encryption and Elliptic Curve Cryptography (ECC) calculations. These industry standard calculations are difficult to break. For instance, to break RSA-2048-piece encryption key, an old-style PC needs around 300 trillion years. As indicated by the continuous examination, a quantum PC can break it in 10seconds, yet such a quantum PC doesn\u27t yet exist. Despite the fact that these cryptographic calculations guarantee an awesome degree of safety, there will be dependably a space for breaking the security. Programmers will attempt new techniques to break the security. Thus, the association likewise should continue to utilize new strategies to build the level and nature of the security. Now it is time to check how the security aspect is taken care of when the IT employees are at work from home. The 2020 year has made many professionals work from home because of the Covid-19 pandemic. The Covid-19 has transformed almost all organizations to work from home, this has become standard advice, and technology plays an important role during work from home to monitor the employee works and provide security when the work is being carried away from their respective organization. Employees\u27 information security awareness will become one of the most important parts of safeguarding against nefarious information security practices during this work from home. Most of the workers like the expediency of work from home and the flexibility provided for the employees. But in this situation, workers need guarantees that their privacy is secured when using company laptops and phones. Cyber security plays an important role in maintaining a secured environment when working from home. This work focusses on managing the security break attack in the course of work from home. The focus of the study is on dealing with security breaches that occur when salespeople operate from home. The problem of security isn\u27t new. Security issues existed prior to the lockdown or pandemic, but because the staff was working from the office at the time, the system administrator was available to address them. However, how can an employee\u27s laptop and account be secured when working from home? MFH\u27s salesforce has leveraged a variety of innovative technologies to address security concerns during their tenure. Because the IT behemoth Salesforce has made it possible for all employees, including freshly hired ones, to seek WFH on a permanent basis. To address the security breach difficulties faced by employees, the organization used a number of new approaches, including tracking working hours, raising password difficulty, employing VPN (virtual private network), mandating video during meetings, continuously checking right to use control, and MFA (multi-factor authentication). Improvement of existing multi-factor authentication (MFA) is the focused topic discussed in the thesis. To add an additional step of protection to the login process Blockchain technology is proposed and to identify the employee identification a hybrid recognition model is proposed using face and fingerprint recognition. This leads to the employee going through multiple processes to authenticate his or her identity in numerous ways in order to access the business laptop. This procedure entails connecting his or her laptop to his or her mobile phone or email account. Keywords: MFA, WFH, Cyber Security, Encryption, Decryption

    Stage Dives and Shared Mics: Ethnographic Perspectives on Community and Networking in the Central Florida Punk Rock Scene

    Get PDF
    Music remains an important aspect of culture and society, proven by copious academic studies exploring how humans create, experience, and utilize it. The emergence of punk rock as a music genre and scene of interconnected individuals in the mid-to-late 1970s provides significant insight into social and political attitudes of the time. Punk rock\u27s continued existence in the present day reflects similar themes to its first incarnation besides forging new directions for the genre and the scene. In this study I examine social factors within the current Central Florida punk rock scene that contribute to its evolution and longevity. I used participant observation and semi-structured interviews to obtain ethnographic data from punk rock scene members and understand their experiences in the scene. I found two prevailing themes in the Central Florida punk scene, community and networking, which serve to unite scene members and ensure punk rock as a DIY, underground scene remains relevant at present time. Based on this, I conclude that the current punk rock scene exists as a critique to contemporary societal norms around the world as well as an example of mixed-mode complex social networking and information sharing

    Assessing security measures at hotels : a case study from Gauteng

    Get PDF
    This study is about assessing security measures in the hotel industry in Gauteng Province, South Africa. The researcher divided Gauteng into five regions (Mogale City; Tshwane; Central Johannesburg; Ekurhuleni; and Sedibeng). The researcher adopted the qualitative approach where one-on-one interviews were conducted with the participants. There were 20 hotels that were selected to participate in the study. From the 20 hotels, where only one participant from each was involved, the researcher conducted one-on-one interviews with twenty (20) Security Managers or anybody who was responsible for the security functions at senior level at the hotels. A semi-structured interview schedule with probing questions was used as a guide to obtain comprehensive information about security measures from the participants. Random sampling approach was used in the study. From the population of 70 hotels in Gauteng, where the sample of twenty (20) was derived, was the group within which the researcher was interested in for obtaining data. Since Gauteng Province is huge, the researcher only conducted research within the four metropolitan areas consisting of Johannesburg, Mogale City, Tshwane and Ekurhuleni. The aims and objectives of the research study are as follows: • Outline the nature of business that hotels are engaged in; • Investigate if there are security policies and procedures as part of effective security component; • Examine what important assets need to be protected at hotel facilities; • Uncover the risks facing assets in the hotel facilities; • Determine what incidents of loss took place in the hotel facilities; • Examine what assets are mainly targeted by perpetrators at hotels; • Uncover the profile and modus operandi of hotel perpetrators; • Examine the effectiveness of security measures and systems that are put in place at hotels; • Explore if security systems are integrated at hotels; • Determine the frequency of conducting risk assessment at hotels; • Check if pre and post-employment screening is conducted for security officers at hotels; • Find out if the guests inquire about security measures when making reservations; and • Find out how guests feel about security at the hotel facilities. The study revealed the following: • Hotels are business entities which attract different types of guests, nationally and internationally. Different services that are offered at the hotels which make hotels the main choice of destination to the guests are: accommodation for sleeping, leisure, and work commitments such as workshops or conferences. The study also revealed that most of the clientele comes from the corporate sector. • There are basic security measures in place in the hotels. These range from security policies, security procedures, physical security (for example, technological security such as Close Circuit Television (CCTV) surveillance system, adequate security lighting, security personnel (contract or in-house), alarm systems, armed response, access control systems and security fence or walls). The security measures were also appeared to be put in place in accordance with the location of the hotel. If the hotel was surrounded by other business areas, the level of security was more focused in the inner security layer. If the hotel was standing alone, the different security layers (the inner security layer, the outer and the middle security layers) were adequately protected. • Hotels are faced with different risks such as theft, prostitution, murder and assault, among others. Theft however was found to be across the board; for example, people were stealing the hoteliers’ property or the guests’ property. • Prostitution was found to be prevalent at hotels. Prominent people from political arena, corporate environment and other guests were interested in the prostitutes. Prostitutes were said to have their own modus operandi of using drugs to their prospective clients and then rob them of their money and belongings thereafter. • Most of the assets which are targeted by hotel perpetrators were found to be: guests/hotel money, hotel goods, guests’ cars, goods in guests’ cars, televisions, home music systems and mobile devices such as laptops and cell phones. • The profile and modus operandi of hotel perpetrators. • Security assessments are conducted at hotels so as to figure out what security risks are facing the hotels. • Hotels need to be protected at all times against criminality as it tarnishes their image. • Most of the guests do enquire about the safety of the hotel before making a booking. Some of the guests mainly from the corporate sector do send their security specialists to assess the level of security at the hotel prior to making a booking. As the findings on this study were based on aims and objectives, recommendations for crime combating, proactive protection and future research were identified. The recommendations will, hopefully, also improve any inadequate security measures that may have been revealed by the study.Criminology and Security ScienceM.A. (Criminal Justice

    Journey design

    Get PDF
    Experiences are gaining importance among new generations, with traveling being one of the most practiced activities. There are plenty of processes and stakeholders that influence the travel experience, many of them often frustrate passengers and affect their perception of the journey. The research process starts by understanding the business of travel and identifying the most significant needs. Inspired by historical research and following slow movement principles, this thesis looks for areas of opportunity to enhance the overall journey, providing passengers with a more enjoyable experience. Focusing the design process and product development on luggage, this study presents products with new functionality for leisure travelers, providing a more efficient user - product interaction

    A Qualitative Study on the Impact of a Short-Term Global Healthcare Immersion Experience in Bachelor of Science Nursing Students

    Get PDF
    The effects of globalization are impacting the healthcare arena. Global healthcare immersion experiences (GHIE) may be a means for nursing students to develop a global perspective. The gap in the literature relates to student perceptions in preparation, cultural interface, and post-immersion experiences. Using Jeffrey's Cultural Competence and Confidence model as the organizing framework, this qualitative descriptive study describes essential components in designing a short-term GHIE for Bachelor of Science in Nursing (BSN) students that will enhance professional development in cultural understanding and global awareness for nursing practice. The study sample (N = 9) was selected purposely from senior-level BSN students enrolled in a clinical course with a study abroad option at a Midwestern university. Inductive qualitative content analysis was utilized to determine patterns and themes in the data. Data from focus groups, informal participant interviews, field notes, and observations were analyzed. Four themes emerged in the pre-immersion phase: (a) Using personal strengths and desires to help move past barriers in preparation for global immersion experiences; (b) Garnering an understanding in completing academic and personal requirements in preparation for a global immersion experience; (c) Identifying critical faculty/organizational supports in promoting a successful global immersion experience; and (d) Moving through early stages/phases of cultural competence in preparation for global immersion experiences. Four themes also emerged in the post-immersion phase: (a) Reflections on the usefulness/benefits of pre-immersion activities and behaviors in preparing for the immersion experience; (b) Acknowledging and identifying cultural and other stressors in order to have meaningful clinical and personal experiences during a global immersion experience; (c) Moving past re-entry adjustment in seeking meaningful reflection of the personal and professional impact of the immersion experience; and (d) Restructuring organizational processes and academic programs needed in order to ensure success of future global immersion programs . Findings from the study provide insight into key elements necessary in the planning, cultural interface, and post-immersion phases of global immersion experiences for BSN students. This includes the importance of key people, educational concerns, and the availability of an international resource office. Implications of the study related to students, faculty, practice limitations, academics, and organizational concerns were presented

    An Analysis Of Sea Shipping As Global And Regional Industry

    Get PDF
    Our hectic world is one filled with constant change through motion: the movement of ideas, political thought, money, people, and cargo all coming together to create an economy of global scale and activity. Transportation is the connection between both these intangible notions and physical bodies. It is through the evolution of one of the fastest growing and most influential transportation industries that we have conquered an international shipping exchange. International trade has dominated as a leader of world economics through the traffic in ports, its ancillary coastal regulations, management of the navigable waterways, and a revolution in containerization. This ‘industry on the sea’ transports billions of dollars worth of goods across rivers and oceans each year. Ports stand as a connecting facility to process this cargo to its final destination. Ports symbolize much more than a coastal processing complex. Above and beyond functional satisfaction, these seacoast landmarks represent business, international relations, a welcoming committee, a center for trade, a fast paced work environment of deadlines and scheduling, and the most expensive, technologically advanced marinas on our coastlines. This study focuses on the value of ports from a practical and business approach, detailing the importance of operational offloading, the container transformation of the shipping industry during the 1960s and its direct relationship to employment, scheduling, overhead, and ship movement, and the technological innovations in port machinery. The overall impact of ports on the environment and governmental interest has also led to multiple Acts, government funding, and country wide initiatives to balance the delicate scale of environmental protection and economic trade. Strict Coastal Zone Management regulations, environmental directives, and efforts to appease the local aesthetic and ecological desires further tip that fragile scale. Recent national and international issues have also substantially impacted the shipping industry and add an interesting segment to my analysis. Hurricane Katrina, forming August 23, 2005, caused havoc in the southern U.S. states, particularly affecting the New Orleans coastal region and one of the largest port centers on the Atlantic coast. Current political controversy between the United States and Dubai has also left many intrigued on our fragile international relations. This study is dedicated to a deeper understanding of ports and their role in our global economy, also focusing on factors contributing to the unprecedented growth. The initiatives taken on behalf of local and federally involved leaders of the shipping world to understand and develop ports as an imperative part of global business truly demonstrate the dependency we have on ports to sustain our trade relationships

    Portraits, Preservation & Pedigrees: An Introduction to Photographic Portraiture, Photographs as a Means of Genealogical Research, and a Preservation Case Study of the Howard D. Beach Studio Collection of Glass Plate Negatives

    Get PDF
    Photography is an established art form that combines the knowledge of chemistry, light, and optics to render an image. Initially, the image is captured on a flat surface coated with emulsion and combined with an exposure to sunlight or another illuminating source. Today, images are captured by digital methods. Artistically, the photograph may reveal sceneries of landscapes, of treasured belongings and of people, as they are seen to the human eye. Photographic portraiture is the oldest style of photography next to landscape imagery, due to commercial photographers setting up studios and experimenting with photography’s many cameras, plates, and emulsions. In the late nineteenth century, the dry gelatin glass plate negative emerged to replace its predecessors, and created a booming business in photographic material manufacturers. Today, museums, archives and libraries in the United States are using current technologies and knowledge of the dry gelatin glass plate negative to preserve them for long-term accessibility and research use. Of the many research uses, genealogists use these plates to identify ancestors and build upon a family history. This thesis will provide a brief history of photography, an insight into photographic portraiture, and steps to preserve dry gelatin glass plate negatives. It will also involve a background of genealogical research with the use of photographs. Lastly, this paper will contain a case study conducted by the author of the preservation and genealogical research of the Howard D. Beach Studio Photography Collection of Glass Plate Negatives, as provided by The Buffalo History Museum in Buffalo, New York

    A QUALITATIVE INQUIRY EXPLORING HELP-SEEKING BEHAVIORS AND RESILIENCE STRATEGIES WOMEN WITH DISABILITIES UTILIZE WHEN EXPERIENCING GENDER-BASED VIOLENCE IN RURAL COMMUNITIES

    Get PDF
    Women with disabilities (WWD) are at pronounced risk of experiencing multiple forms of severe and prolonged violence, and they face barriers to accessing help. A multitude of factors associated with disability and rurality may compound the experience of violence, including geographic and social isolation, forcing WWD in rural settings to navigate extremely dangerous situations with limited avenues for accessing help and securing safety. This research explored how women with disabilities experiencing violence while living in rural communities navigate programs and policies, make decisions about seeking and securing help, and build resilience despite experiencing violence. The current study methodology empowers this marginalized population to use their own words to interpret their lived experiences and addresses an important gap in existing scholarship concerning the intersection of rurality, disability, and violence. This examination used a qualitative data collection and analysis approach, with descriptive data to summarize the sample. Thirty-three rural women with diverse disabilities and experiences of violence completed one semi-structured in-depth interview. Interview transcripts were analyzed using thematic content analysis. Women described key personal qualities and supportive networks and services, which contributed to their resilience, despite their violence-related adversity. These findings inform interventions and promote approaches to build on women’s strengths and resourcefulness. WWD also described overarching health and mental health care provider and system factors that influenced their trust and confidence in these services to support their safety. Women described ways interactions with health care during their experience of violence were a missed opportunity for identifying and responding to their abuse and connecting them with resources. Women illuminated important gaps in services and emphasized a need for training and education about disability throughout the health care system and mental health workforce. To be effective providers for WWD, clinicians and counselors need to demonstrate cultural competencies related to disability and have awareness about the forms of abuse WWD experience. WWD are open to, and even welcome, clinician screening for abuse; however, it is crucial screenings preserve women’s privacy and, if not conducted at inperson appointments, are available through an accessible tool for women to disclose independently. Finally, WWD described challenges accessing mental health care services that met their abuse-related needs. Women described overcoming their own stigma, learning about available services, finding an appropriate counselor fit, and struggling to secure resources to continue accessing mental health care. WWD identified opportunities for including individuals with disabilities more prominently in the mental health workforce. Finally, women discussed the necessity to ensure promising telemental health advancements are optimized for accessibility (using adaptive technology), to allow individuals with disabilities to have broader and more flexible access to mental health services
    • …
    corecore