170 research outputs found

    Strategies adopted by immigrant parents in language and education integration of children: The case of nigerians in Lisbon, Portugal

    Get PDF
    Available statistics show that in Europe, 1.92 million immigrants were admitted to EU member states in 2022, of which 14.6% were children. Studies have also found that the level of language and educational integration of immigrant children to a great extent tends to be influenced by the level of parents’ active involvement in such schools of their children. This study focused on exploring the strategies adopted by Nigerian immigrant parents in the language and educational integration of children in Lisbon, Portugal. Guided by the theory of social capital and ecological systems theory, qualitative data were collected using in-depth interviews with eight Nigerian immigrant parents who were purposively selected. The study found that parents adopted strategies such as constant school visitation, monitoring, buying additional educational materials and setting family rules in the language and educational integration of children. The study found that despite the existence of language support for children and parents in Portuguese schools, challenges such as lack of English proficiency among Portuguese teachers, and long waiting times in Portuguese language class registration have continued to militate against utilising the support programmes. To address these challenges and to improve language support for parents and children, the study recommends measures such as employing teachers who are proficient in Portuguese and English, Prioritising parents of school-age children in language courses and grouping Portuguese language classes according to the educational qualification of learners

    A Study of Pension System Reform in Tanzania

    Get PDF
    ν•™μœ„λ…Όλ¬Έ (석사) -- μ„œμšΈλŒ€ν•™κ΅ λŒ€ν•™μ› : ν–‰μ •λŒ€ν•™μ› κΈ€λ‘œλ²Œν–‰μ •μ „κ³΅, 2020. 8. Kim, Sangheon.This research attempts to assess stakeholders engagement in Tanzania public sector reform to examine how they are engaged in the reform processes and to what extent. The main argument towards stakeholders engagement is that stakeholders are the key part in reforming process, and failure of this can result in unstable reform implementation. Most of the public sector reforms in Tanzania claim to incorporate stakeholders in the reform process, but during execution and implementation of reform, some of the reforms fail to be well implemented and face number of limitations and criticism from different stakeholders of such particular sector of reform. By studying the recent reform process that took place in pension system in Tanzania, the study assessed the engagement of stakeholders during the reform process of the pension system. The approach of a qualitative and descriptive study was used to answer the research questions. A sample of 144 respondents consists of workers association union (83 respondents), top managers from pension funds (40 respondents) and members of parliaments (21 respondents) participated in the survey. The method used for conducting survey was online survey questionnaire, which produced also the required results for data manipulation and graphs layouts. Research study findings have shown that the recent pension system reform in Tanzania was passed and reached the implementation stage without the proper stakeholders engagement. Moreover, not only it was passed without the consent of majority stakeholders, but also the content of reform was not clear to stakeholders. Responses from the members of parliament have also shown that the reforms bill was passed without their consent, and they claimed that there was some external pressure (out of the parliament) to pass the reforms bill.λ³Έ μ—°κ΅¬λŠ” νƒ„μžλ‹ˆμ•„ 곡곡 λΆ€λ¬Έ κ°œν˜μ— λŒ€ν•œ μ΄ν•΄κ΄€κ³„μžλ“€μ˜ μ°Έμ—¬λ₯Ό ν‰κ°€ν•˜μ—¬ 그듀이 개혁 과정에 μ–΄λ–»κ²Œ μ°Έμ—¬ν•˜κ³  μžˆλŠ”μ§€ 그리고 μ–΄λŠ μ •λ„κΉŒμ§€ κ΄€μ—¬ν•˜κ³  μžˆλŠ”μ§€λ₯Ό κ²€ν† ν•˜μ˜€λ‹€. μ΄ν•΄κ΄€κ³„μžλ“€μ˜ 참여에 λŒ€ν•œ 주된 μ£Όμž₯은 λͺ¨λ“  κ°œν˜κ³Όμ •μ—μ„œ μ΄ν•΄κ΄€κ³„μžλ“€μ΄ 핡심 μš”μ†ŒλΌλŠ” 것이며, μ΄κ²ƒμ˜ μ‹€νŒ¨λŠ” λΆˆμ•ˆμ •ν•œ 개혁 μ΄ν–‰μœΌλ‘œ μ΄μ–΄μ§ˆ 수 μžˆλ‹€λŠ” 것이닀. νƒ„μžλ‹ˆμ•„μ—μ„œμ˜ λŒ€λΆ€λΆ„μ˜ κ°œν˜μ€ κ°œν˜κ³Όμ •μ—μ„œ μ΄ν•΄λ‹Ήμ‚¬μžλ“€μ„ ν¬ν•¨μ‹œν‚¬ 것을 μ£Όμž₯ν•˜μ§€λ§Œ, 개혁의 μ‹€ν–‰ κ³Όμ •μ—μ„œ 일뢀 κ°œν˜μ€ μ œλŒ€λ‘œ μ΄ν–‰λ˜μ§€ λͺ»ν•˜κ³  ν•œκ³„μ™€ λΉ„νŒμ— μ§λ©΄ν•˜κ²Œ λœλ‹€. λ³Έ μ—°κ΅¬λŠ” νƒ„μžλ‹ˆμ•„μ˜ μ—°κΈˆμ œλ„μ—μ„œ λ°œμƒν•œ 졜근의 κ°œν˜κ³Όμ •μ„ μ—°κ΅¬ν•¨μœΌλ‘œμ¨ μ—°κΈˆμ œλ„μ˜ 개혁 κ³Όμ • 쀑 μ΄ν•΄κ΄€κ³„μžλ“€μ˜ μ°Έμ—¬λ₯Ό ν‰κ°€ν•˜μ˜€μœΌλ©°, 질적 연ꡬ 및 기술적 연ꡬ 방식을 λ³Έ 연ꡬ μ§ˆλ¬Έμ— λ‹΅ν•˜λŠ”λ° μ‚¬μš©ν•˜μ˜€λ‹€. 144λͺ…μ˜ μ‘λ‹΅μžλŠ” 근둜자 ν˜‘νšŒ(83λͺ…), μ—°κΈ°κΈˆ 졜고 μ±…μž„μž(40λͺ…), κ΅­νšŒμ˜μ›(21λͺ…) λ“±μœΌλ‘œ ꡬ성됐닀. 섀문쑰사λ₯Ό μ‹€μ‹œν•˜κΈ° μœ„ν•΄ μ‚¬μš©λœ 방법은 데이터 뢄석과 κ·Έλž˜ν”„ 뢄석에 ν•„μš”ν•œ κ²°κ³Όλ₯Ό μ‚°μΆœν•˜λŠ” 온라인 쑰사방법을 μ‚¬μš©ν•˜μ˜€λ‹€. κ·Έ κ²°κ³Ό, 졜근 νƒ„μžλ‹ˆμ•„μ˜ μ—°κΈˆμ œλ„ κ°œν˜μ•ˆμ΄ ν†΅κ³Όλ˜μ—ˆκ³  μ μ ˆν•œ μ΄ν•΄κ΄€κ³„μžμ˜ μ°Έμ—¬ 없이 μ‹œν–‰ 단계에 이λ₯΄λŠ” κ²ƒμœΌλ‘œ λ‚˜νƒ€λ‚¬λ‹€. κ²Œλ‹€κ°€ λ‹€μˆ˜ μ΄ν•΄κ΄€κ³„μžμ˜ λ™μ˜ 없이 ν†΅κ³Όλ˜μ—ˆμ„ 뿐만 μ•„λ‹ˆλΌ, 개혁의 λ‚΄μš©λ„ μ΄ν•΄λ‹Ήμ‚¬μžλ“€μ—κ²Œ λͺ…ν™•ν•˜μ§€ μ•Šμ•˜λ‹€. μ˜μ›λ“€μ˜ λ°˜μ‘λ„ κ°œν˜μ•ˆμ΄ λ™μ˜ 없이 ν†΅κ³Όλœ 것을 보여주며, κ°œν˜μ•ˆμ„ ν†΅κ³Όμ‹œν‚€λΌλŠ” 외압이 μžˆμ—ˆλ‹€κ³  μ£Όμž₯ν•˜μ˜€λ‹€.Chapter One: Introduction 1 1.1. Background of the Study: 1 1.2.Statement of the Problem 2 1.3.Research objective: 3 1.4.Significance of the study 3 1.5.Research questions 4 1.6.Research hypothesis 4 Chapter Two: Literature Review 5 2.1.Scope and boundaries of the public sector 5 2.2.View of Tanzania's public sector 7 2.3. Theoretical perspective of public sector reform and change 8 2.4.Conceptual underpinning of reforms in public sector 9 2.5.Reform implementation impediments and challenges 12 2.6.Public sector reform from the late 1980s 14 Chapter Three: Research Methodology 18 3.1.Research design 18 3.2.Population and study area 18 3.3.Sample 18 3.4.Data type 19 3.5.Data collection instruments 19 3.6.Data analysis method and presentation 20 Chapter Four: Results Analysis 21 4.1.Demographics of respondents 21 4.2. Stakeholders' identification and prioritization 27 4.2.1. Responses on whether stakeholders were well informed 27 4.2.2 Results on recognition and coverage range of key stakeholders 30 4.2.3 Responses to measure communication between government and stakeholders 32 4.2.4 Responses to see if stakeholders were given sufficient time to participate 35 4.3 Inclusiveness of stakeholders in the debate of reform processes 37 4.3.1 Responses to measure acceptance of stakeholders' comments on reform 38 4.3.2 Responses on stakeholders' consent on reform implementation 40 4.3.3 Responses on occasional meetings between government and takeholders 43 4.4 Understanding the content of reform 45 4.4.1 Responses to see if the content and objectives were clear 45 4.4.2 Responses on elaboration of complex terms in reform 48 4.4.3 Responses on reforms' objective towards improving the pension system 50 4.5 Engagement of members of parliament in passing the reform bill 53 4.5.1 Passing the bill under the consent of majority in the parliament 53 4.5.2 Responses on presence of external pressure when passing the bill 54 4.5.3 Responses to see if pension system needed to be reformed 56 4.5.4 Responses on time provided to discuss the reform bill 57 Chapter Five: Conclusion and Recommendations 58 5.1. Summary of activities 58 5.2. Conclusion 58 5.3. Implications 59 5.4. Dissemination and Implementation 60 5.5. Recommendation for further studies 60 Bibliography 62 Abstract in Korean 65 Acknowledgement 67Maste

    Association between Students Performance In Diagnostic And Readiness Tests in Secondary School Biology

    Get PDF
    The purpose of the study was to find out the association between the students performance in readiness and diagnostic test scores in secondary school Biology. The design of the study was correlation and the population was all the 2256 students’ secondary school II students in biology in the 2014/2015 academic session. Simple random sampling (battling without replacement) was used to sample 420 students from 14 secondary schools in Udi Local Government area of Enugu State. The instruments for data collection were diagnostic biology achievement tests (DBAT) and readiness biology achievement tests (RBAT). Pearson β€˜r’ and t-test were used to correlate and test the research question and hypothesis at 0.05 level of confidence respectively. Based on the analyzed data, it was found out that out of the 10 schools studied, the relationship between readiness and diagnostic scores was significant in six schools, the relationship was significant in the co-educational and girls’ schools but that was not significant in the boys’ schools. Based on the findings of the study, the researcher recommended among other things that scores from readiness test could be used to make decision on students who might be unavoidably absent during the diagnostic test in Biology and vice versa

    Histology and ultrastructure of the adrenal gland of the greater cane rats (Thryonomis swinderianus, Temminck 1827)

    Get PDF
    The adrenal glands of domesticated greater cane rats (Thryonomys swinderianus), were studied using histological and ultrastructural techniques. A total of seven (7) adult male greater cane rats, aged from 10-14 months, with an average weight of 1.89 kg (range: 1.6 -2.2 kg) were used in this study. The results showed variations in the thickness of the zones of the cortex and medulla. Histological detail did not differ significantly from that of other rodents. Ultrastructural features showed typical adrenal gland zonation with capsule, cortical cells and medulla. In the cortex copious lipid droplets and myelin bodies were present. The cortical cells of the zona fasciculata contained concentric whorls of rough endoplasmic reticulum that enclosed2-3 mitochondria. Adrenaline storing (A) and noradrenaline-storing (NA) chromaffin cells along with few vesicular ganglion cells were identified in the medulla. The functional significance of the present observation is discussed.Keywords: adrenal gland, cane rats, histology, ultrastructur

    The heat capacity of solid He3 under pressure

    Get PDF

    Conducting Risk Analysis and Vulnerability Assessment in the Core Fund System Management at National Social Security Fund

    Get PDF
    The study sought to analyse security risks and assess security vulnerabilities in the NSSF Core Fund System. The study employed descriptive survey design while the study population was 314 staff working at head office of NSSF. In addition to that, purposive and sampling techniques were used to select 89 who were members of sample size. In addition to that questionnaire and interview were used to solicit data from the respondents while data were analysed using descriptive and content analysis. The study found that security risks and vulnerabilities associated with the core fund system included cyber-attacks, disclosure of sensitive data and hardware failure, others said viruses, internal security threats and internal accidental threats. In the similar case, some said system administration errors. The study also indicated that existence of information security risks had been in different period of time depending on the type of such information security risks. The study concluded that enhancing information security in the Core Fund System utilized by the National Social Security Fund (NSSF) is crucial for safeguarding the data of both the staff and customers. This can be achieved by regularly updating the records of customers and staff members to ensure their information remains reliable. The increasing reliance on computers, mobile devices, and digitalization of business operations necessitates a knowledgeable manager who understands the vulnerabilities and threats to data and information assets. Such a manager can then develop strategies to mitigate risks and protect the organization's data and assets. The study recommended that it is important for organizations to continue providing training to their staff regarding security policies and guidelines for information systems. This will help raise awareness about security risks and allow for the evaluation of vulnerabilities in the NSSF Core Fund System. As a result, it is necessary to establish standards and guidelines that promote the adoption of best practices in information security, ultimately achieving a satisfactory and sufficient level of security

    The Driving Forces for the Involvement of Higher Learning Institution’s Students in Cybercrime Acts. A Case of Selected Higher Learning Institutions in Tanzania

    Get PDF
    This study investigates the extent and driving forces of cybercrime acts among students in higher learning institutions. The research digs into common cybercrime involvement and explores potential motives driving students' engagement in such illicit activities. A mixed-methods approach was adopted, involving online surveys and interviews with 308 samples size from a population of 1500 participants from selected higher learning institutions in Tanzania. Institutions involved in this study included Collage of Business Education (CBE), Dar es Salaam Institute of Technology (DIT), Institute of Finance Management (IFM) and Tanzania Institute of Accountancy (TIA). The findings revealed that digital piracy, hacking, computer viruses, spam mailing, computer-related forgery, and cyberbullying were prevalent forms of cybercrime among the participants. Significant associations were identified between cybercrime involvement and factors such as social-economic status, technological changes, peer influence, lack of awareness of cybercrime, individual traits, and internet usage contributing to students' involvement in cybercrime. In light of these findings, the study recommends implementing comprehensive educational programs, strengthening institutional cybersecurity, promoting positive peer influence, enhancing collaboration with law enforcement, and integrating ethical training into the curriculum. These efforts will foster a safe and responsible digital environment within higher learning institutions, protecting students from cybercrime risks and promoting ethical digital citizenship

    Evaluation of Measures Taken by Telecommunication Companies in Preventing Social Engineering Attacks in Tanzania

    Get PDF
    This study aimed to evaluate the measures taken by telecommunication companies in preventing social engineering attacks in Tanzania. The study was guided by the deception theory, the researcher employed a descriptive research design and quantitative approach to conduct this study. Data was collected by using a questionnaire administered to the selected telecommunication companies in Tanzania. Furthermore, the obtained findings were as follows; most of the respondents who participated in this study are aware of social engineering and that they experienced social engineering. The study also revealed that there are common social engineering attacks experienced by the respondents such as business collaboration benefits, alleged wrong remittance of money, sim swaps, SMS phishing and fraudulent SMS from lost or stolen phones, password requisitions and links sharing. The findings of this study went further to reveal that social engineering has effects such as loss of sensitive data, financial loss, reputational damage, disruption of operations as well as legal and compliance issue. The general findings of this study show that most of the respondents said that there is a presence of security measures to prevent social engineering such as the provision of the awareness program, enabling the use of multifactor authentication, there is implementation of policies around social media usage, provision of regular software updates, regular review of security protocols, provision of well-known customer care services number. On the other hand, the study also revealed that telecommunication companies use the following ways to minimize social engineering attacks, provision of security awareness training for employees, implementing security policies and procedures, regularly reviewing and updating security protocols, detecting and responding to social engineering attacks, placing limits on the access each member has in the system, always require a username and password to be configured. On the strategies used to prevent social engineering, the finding of this study showed that telecommunication companies should ensure encrypting data, proper verification of emails or instructions sent to customers, ensure that even if hackers intercept communication they can’t access information contained within, use of SSL certificates from trusted authorities, incorporating phishing and malicious detection solutions into security stack. This study concludes that telecommunications ensure routine reviews of security standards, daily notifications for customers and other system users, and the availability of a well-known customer care services number. Due to the difficulties that information system users face, businesses have been using a variety of protection techniques to avoid social engineering, from putting up multifactor authentication for users' accounts to teaching employees how to spot suspect activity. Hence it is recommended that it is necessary to deploy mechanisms like machine learning-based ways to defend against social engineering-based assaults since cybercriminals exploit human activities to breach security as well as using the security features on messages (filter unknown senders) and calls (silence unknown callers)

    Money Neutrality Controversy In A Developing Economy

    Get PDF
    Money has always been a dominant factor in monetary policy. Money Neutrality Controversy in a developing economy is the main objective of this paper. The data were sourced from the CBN statistical bulletin, 2011. Various econometric techniques such as Phillips Perron, Johansen co integration, VAR test were used to test the stationarity of the time series variables, investigate co integration and estimation of variable on the economic growth in Nigeria. The results revealed that the GDP and money neutrality variable were stationary at I(0). There was at least two co-integrating equations and was normalized at TGE and MS. In addition, TGE has positive impact on GDP. Both MS and PRIC were found to have inverse relationship with the GDP. Finally, the MS granger caused GDP among the variables and informed short run relationship with economic growth in the developing countries. Keywords: Unit root, PP-test, TGE, Monetary, GDP, VAR, Neutralit
    • …
    corecore