CINXE.COM
Search results for: security awareness
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: security awareness</title> <meta name="description" content="Search results for: security awareness"> <meta name="keywords" content="security awareness"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="security awareness" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="security awareness"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 5370</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: security awareness</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5370</span> Developing a Viral Artifact to Improve Employees’ Security Behavior</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stefan%20Bauer">Stefan Bauer</a>, <a href="https://publications.waset.org/abstracts/search?q=Josef%20Frysak"> Josef Frysak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security%20awareness" title="information security awareness">information security awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=delivery%20methods" title=" delivery methods"> delivery methods</a>, <a href="https://publications.waset.org/abstracts/search?q=viral%20videos" title=" viral videos"> viral videos</a>, <a href="https://publications.waset.org/abstracts/search?q=employee%20security%20behavior" title=" employee security behavior"> employee security behavior</a> </p> <a href="https://publications.waset.org/abstracts/12535/developing-a-viral-artifact-to-improve-employees-security-behavior" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12535.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">542</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5369</span> The Awareness of Computer Science Students Regarding the Security of Location Based Games</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jacques%20Barnard">Jacques Barnard</a>, <a href="https://publications.waset.org/abstracts/search?q=Magda%20Huisman"> Magda Huisman</a>, <a href="https://publications.waset.org/abstracts/search?q=Gunther%20R.%20Drevin"> Gunther R. Drevin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Rapid expansion and development in die mobile technology market has created an opportunity for users to participate in location based games. As a consequence of this fast expanding market and new technology, it is important to be aware of the implications this has on security. This paper measures the impact on the security awareness of games’ participants, as well as on that of students at university level with regards to their various stages of input in years of studying and gamer classification. This serves to provide insight into the matter as to discernible differences in the awareness of the security implications concerning these technologies. The data was accumulated via a web questionnaire that was to be completed yearly by students from respective year groups. Results signify a meaningful disparity in security awareness among students completing the varying study years and research. This awareness, however, does not always impact on gamers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gamer%20classifications" title="gamer classifications">gamer classifications</a>, <a href="https://publications.waset.org/abstracts/search?q=location%20based%20games" title=" location based games"> location based games</a>, <a href="https://publications.waset.org/abstracts/search?q=location%20based%20data" title=" location based data"> location based data</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20awareness" title=" security awareness"> security awareness</a> </p> <a href="https://publications.waset.org/abstracts/1969/the-awareness-of-computer-science-students-regarding-the-security-of-location-based-games" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1969.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5368</span> Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amal%20Hussain%20Alkhaiwani">Amal Hussain Alkhaiwani</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghadah%20Abdullah%20Almalki"> Ghadah Abdullah Almalki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20aspects" title=" human aspects"> human aspects</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20errors" title=" human errors"> human errors</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20mistakes" title=" human mistakes"> human mistakes</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20awareness" title=" security awareness"> security awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20Arabia" title=" Saudi Arabia"> Saudi Arabia</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20program" title=" security program"> security program</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20education" title=" security education"> security education</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20engineering" title=" social engineering"> social engineering</a> </p> <a href="https://publications.waset.org/abstracts/124638/saudi-human-awareness-needs-a-survey-in-how-human-causes-errors-and-mistakes-leads-to-leak-confidential-data-with-proposed-solutions-in-saudi-arabia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/124638.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5367</span> A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raya%20Al%20Khayari">Raya Al Khayari</a>, <a href="https://publications.waset.org/abstracts/search?q=Rasha%20Al%20Jassim"> Rasha Al Jassim</a>, <a href="https://publications.waset.org/abstracts/search?q=Muna%20Al%20Balushi"> Muna Al Balushi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatma%20Al%20Moqbali"> Fatma Al Moqbali</a>, <a href="https://publications.waset.org/abstracts/search?q=Said%20El%20Hajjar"> Said El Hajjar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=civil-id%20disclosure" title="civil-id disclosure">civil-id disclosure</a>, <a href="https://publications.waset.org/abstracts/search?q=awareness" title=" awareness"> awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=linear%20regression" title=" linear regression"> linear regression</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20regression" title=" multiple regression"> multiple regression</a> </p> <a href="https://publications.waset.org/abstracts/185886/a-study-of-user-awareness-and-attitudes-towards-civil-id-authentication-in-omans-electronic-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185886.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5366</span> Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Veysel%20%C3%87elik">Veysel Çelik</a>, <a href="https://publications.waset.org/abstracts/search?q=Aynur%20Aker"> Aynur Aker</a>, <a href="https://publications.waset.org/abstracts/search?q=Ebru%20G%C3%BC%C3%A7"> Ebru Güç</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20storytelling" title="digital storytelling">digital storytelling</a>, <a href="https://publications.waset.org/abstracts/search?q=self-regulation" title=" self-regulation"> self-regulation</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20data%20security" title=" digital data security"> digital data security</a>, <a href="https://publications.waset.org/abstracts/search?q=teacher%20candidates" title=" teacher candidates"> teacher candidates</a>, <a href="https://publications.waset.org/abstracts/search?q=self-efficacy" title=" self-efficacy"> self-efficacy</a> </p> <a href="https://publications.waset.org/abstracts/124959/improving-digital-data-security-awareness-among-teacher-candidates-with-digital-storytelling-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/124959.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5365</span> Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Norshima%20Humaidi">Norshima Humaidi</a>, <a href="https://publications.waset.org/abstracts/search?q=Saif%20Hussein%20Abdallah%20Alghazo"> Saif Hussein Abdallah Alghazo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=protection%20behaviour" title=" protection behaviour"> protection behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20competencies" title=" information security competencies"> information security competencies</a>, <a href="https://publications.waset.org/abstracts/search?q=countermeasure%20awareness" title=" countermeasure awareness"> countermeasure awareness</a> </p> <a href="https://publications.waset.org/abstracts/157751/enhancing-cybersecurity-protective-behaviour-role-of-information-security-competencies-and-procedural-information-security-countermeasure-awareness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157751.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5364</span> Network User Rules in Universities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michel%20Berthiaume">Michel Berthiaume</a>, <a href="https://publications.waset.org/abstracts/search?q=Daniel%20Chamberland-Tremblay"> Daniel Chamberland-Tremblay</a>, <a href="https://publications.waset.org/abstracts/search?q=Elaine%20Paiva%20Mosconi"> Elaine Paiva Mosconi</a>, <a href="https://publications.waset.org/abstracts/search?q=J%C3%A9r%C3%B4me%20Blanchet-Brisson"> Jérôme Blanchet-Brisson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer%20security" title="computer security">computer security</a>, <a href="https://publications.waset.org/abstracts/search?q=IT%20policy" title=" IT policy"> IT policy</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20awareness" title=" security awareness"> security awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20user%20rules" title=" network user rules "> network user rules </a> </p> <a href="https://publications.waset.org/abstracts/23213/network-user-rules-in-universities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23213.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">562</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5363</span> Cyber Security Situational Awareness among Students: A Case Study in Malaysia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yunos%20Zahri">Yunos Zahri</a>, <a href="https://publications.waset.org/abstracts/search?q=Ab%20Hamid%20R.%20Susanty"> Ab Hamid R. Susanty</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmad%20Mustaffa"> Ahmad Mustaffa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber%20security%20awareness" title="cyber security awareness">cyber security awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security%20education" title=" cyber security education"> cyber security education</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20students" title=" school students"> school students</a> </p> <a href="https://publications.waset.org/abstracts/62928/cyber-security-situational-awareness-among-students-a-case-study-in-malaysia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62928.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">302</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5362</span> General Awareness of Teenagers in Information Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Magdal%C3%A9na%20N%C3%A1plavov%C3%A1">Magdaléna Náplavová</a>, <a href="https://publications.waset.org/abstracts/search?q=Tom%C3%A1%C5%A1%20Lud%C3%ADk"> Tomáš Ludík</a>, <a href="https://publications.waset.org/abstracts/search?q=Petr%20Hr%C5%AFza"> Petr Hrůza</a>, <a href="https://publications.waset.org/abstracts/search?q=Franti%C5%A1ek%20Bo%C5%BEek"> František Božek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security" title="information security">information security</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20space" title=" cyber space"> cyber space</a>, <a href="https://publications.waset.org/abstracts/search?q=general%20awareness" title=" general awareness"> general awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=questionnaire" title=" questionnaire"> questionnaire</a>, <a href="https://publications.waset.org/abstracts/search?q=socio-pathological%20phenomena" title=" socio-pathological phenomena"> socio-pathological phenomena</a>, <a href="https://publications.waset.org/abstracts/search?q=educational%20system" title=" educational system"> educational system</a> </p> <a href="https://publications.waset.org/abstracts/16805/general-awareness-of-teenagers-in-information-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16805.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">390</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5361</span> Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marco%20Antonio%20Lara%20De%20la%20Calleja">Marco Antonio Lara De la Calleja</a>, <a href="https://publications.waset.org/abstracts/search?q=Mar%C3%ADa%20Catalina%20Ovando%20Chico"> María Catalina Ovando Chico</a>, <a href="https://publications.waset.org/abstracts/search?q=Eduardo%20Lopez%20Ruiz"> Eduardo Lopez Ruiz</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=community%20empowerment" title="community empowerment">community empowerment</a>, <a href="https://publications.waset.org/abstracts/search?q=food%20security" title=" food security"> food security</a>, <a href="https://publications.waset.org/abstracts/search?q=model" title=" model"> model</a>, <a href="https://publications.waset.org/abstracts/search?q=systemic%20approach" title=" systemic approach"> systemic approach</a> </p> <a href="https://publications.waset.org/abstracts/62914/food-security-model-and-the-role-of-community-empowerment-the-case-of-a-marginalized-village-in-mexico-tatoxcac-puebla" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62914.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">373</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5360</span> Enhancing Civil Aviation Safety and Security: A Comprehensive Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20Waldon">J. Waldon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The civil aviation industry plays a crucial role in global transportation, connecting people and goods across the world. Ensuring the safety and security of passengers, crew, and aircraft is of paramount importance. This paper aims to address the aspect of training and human factors, amongst others, necessary for enhancing civil aviation safety and security. In this context, we are focusing on the level of attention exhibited in the checking of luggage and travel credentials, with the aim to identify areas of improvement and avoid compromising security and safety at the Nsimalen Airport Yaoundé, Cameroon. We found that there is a lack of proper awareness among both travelers and some staff on the safety and security of goods and passengers. We suggest that improved training and handling, and sensitization in the form of legible billboards are important. Thus, we recommend refresher courses like this one for staff to keep abreast with the fast-changing security landscape in air transport as well as proper sensitization, including health-related issues. In conclusion, we established that the human factors, as well as the frequency of training and refresher courses, have a positive outlook on safety and security in air transport. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=safety" title="safety">safety</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=passengers" title=" passengers"> passengers</a>, <a href="https://publications.waset.org/abstracts/search?q=cargo" title=" cargo"> cargo</a> </p> <a href="https://publications.waset.org/abstracts/172732/enhancing-civil-aviation-safety-and-security-a-comprehensive-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172732.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5359</span> Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abeer%20Al%20Kalbani">Abeer Al Kalbani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20security" title="food security">food security</a>, <a href="https://publications.waset.org/abstracts/search?q=household%20food%20security" title=" household food security"> household food security</a>, <a href="https://publications.waset.org/abstracts/search?q=utilization" title=" utilization"> utilization</a>, <a href="https://publications.waset.org/abstracts/search?q=role%20of%20women" title=" role of women "> role of women </a> </p> <a href="https://publications.waset.org/abstracts/32249/awareness-and-perception-of-food-safety-nutrition-and-food-security-among-omani-women" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32249.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">405</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5358</span> Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Beenish%20Urooj">Beenish Urooj</a>, <a href="https://publications.waset.org/abstracts/search?q=Ubaid%20Ullah"> Ubaid Ullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Sidra%20Riasat"> Sidra Riasat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NTS" title="NTS">NTS</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20assessment" title=" risk assessment"> risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20factors" title=" threat factors"> threat factors</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=services" title=" services"> services</a> </p> <a href="https://publications.waset.org/abstracts/168005/threat-analysis-a-technical-review-on-risk-assessment-and-management-of-national-testing-service-nts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168005.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">70</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5357</span> The Role of Intellectual Security Immunisation in Reducing Extremism in the Kingdom of Saudi Arabia, 1979 – 2019</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anas%20Abdulrahman%20A.%20Almiman">Anas Abdulrahman A. Almiman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent decades, efforts to combat extremism have focused on non-physical dimensions, as various countries have attempted to raise security awareness or promote authentic and moderate Islamic education. The Kingdom of Saudi Arabia is one of the most successful and unique cases because it has focused on the immunization of Islamic intellectual security to combat extremism. This study aims to define the concept and importance of Islamic intellectual security in the Kingdom of Saudi Arabia through a descriptive-analytical study. It describes the potential role of Islamic intellectual security immunization in reducing extremism in the Kingdom of Saudi Arabia from 1979 to 2019, identifying various factors that connect Islamic intellectual security immunization to extremism reduction. One such factor is the MISK Foundation’s forums and conferences intended to raise Islamic intellectual security and reduce intellectual deviation, thus reducing extremism. It concludes that the common significant factor for Islamic intellectual deviation is direct commands and prohibitions. This study supports the efforts made by the Kingdom of Saudi Arabia to immunize Islamic intellectual security and fight extremism as a consequence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=extremism" title="extremism">extremism</a>, <a href="https://publications.waset.org/abstracts/search?q=intellectual%20security%20immunization" title=" intellectual security immunization "> intellectual security immunization </a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20Arabia" title=" Saudi Arabia"> Saudi Arabia</a>, <a href="https://publications.waset.org/abstracts/search?q=Islamic" title=" Islamic"> Islamic</a> </p> <a href="https://publications.waset.org/abstracts/130496/the-role-of-intellectual-security-immunisation-in-reducing-extremism-in-the-kingdom-of-saudi-arabia-1979-2019" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130496.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">197</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5356</span> A Pattern Practise for Awareness Educations on Information Security: Information Security Project</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fati%CC%87h%20Apaydin">Fati̇h Apaydin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Education technology is an area which constantly changes and creates innovations. As an inevitable part of the changing circumstances, the societies who have a tendency to the improvements keep up with these innovations by using the methods and strategies which have been designed for education technology. At this point, education technology has taken the responsibility to help the individuals improve themselves and teach the effective teaching methods by filling the airs in theoretical information, information security and the practice. The technology which comes to the core of our lives by raising the importance of it day by day and it enforced its position in computer- based environments. As a result, ‘being ready for technological innovations, improvement on computer-based talent, information, ability and attitude’ doctrines have to be given. However, it is today quite hard to deal with the security and reinforcement of this information. The information which is got illegally gives harm to society from every aspect, especially education. This study includes how and to what extent to use these innovative appliances such as computers and the factor of information security of these appliances in computer-based education. As the use of computer is constantly becoming prevalent in our country, both education and computer will never become out of date, so how computer-based education affects our lives and the study of information security for this type of education are important topics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer" title="computer">computer</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a> </p> <a href="https://publications.waset.org/abstracts/35678/a-pattern-practise-for-awareness-educations-on-information-security-information-security-project" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/35678.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">594</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5355</span> Adult Education for Transformation and Security Challenges in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asmau%20Zarma%20Gogaram">Asmau Zarma Gogaram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adult%20education" title="adult education">adult education</a>, <a href="https://publications.waset.org/abstracts/search?q=transformation%20and%20security%20challenges" title=" transformation and security challenges"> transformation and security challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=education%20and%20human%20development" title=" education and human development"> education and human development</a> </p> <a href="https://publications.waset.org/abstracts/23218/adult-education-for-transformation-and-security-challenges-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23218.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">523</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5354</span> Nuclear Safety and Security in France in the 1970s: A Turning Point for the Media</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jandot%20Aur%C3%A9lia">Jandot Aurélia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In France, in the main media, the concern about nuclear safety and security has not really appeared before the beginning of the 1970s. The gradual changes in its perception are studied here through the arguments given in the main French news magazines, linked with several parameters. As this represents a considerable amount of copies and thus of information, are selected here the main articles as well as the main “mental images” aiming to persuade the readers and which have led the public awareness to evolve. Indeed, in the 1970s, in France, these evolutions were not made in one day. Indeed, over the period, many articles were still in favor of nuclear power plants and promoted the technological advances that were made in this field. They had to be taken into account. But, gradually, grew up arguments and mental images discrediting the perception of nuclear technology. Among these were the environmental impacts of this industry, as the question of pollution progressively appeared. So, between 1970 and 1979, the language has changed, as the perceptible objectives of the communication, allowing to discern the deepest intentions of the editorial staffs of the French news magazines. This is all these changes that are emphasized here, over a period when the safety and security concern linked to the nuclear technology, to there a field for specialists, has become progressively a social issue seemingly open to all. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=environmental%20impacts" title="environmental impacts">environmental impacts</a>, <a href="https://publications.waset.org/abstracts/search?q=media%20discourse" title=" media discourse"> media discourse</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20security" title=" nuclear security"> nuclear security</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20awareness" title=" public awareness"> public awareness</a> </p> <a href="https://publications.waset.org/abstracts/46666/nuclear-safety-and-security-in-france-in-the-1970s-a-turning-point-for-the-media" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/46666.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">283</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5353</span> Legal Issues of Food Security in Republic of Kazakhstan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20T.%20Aigarinova">G. T. Aigarinova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article considers the legal issues of food security as a major component of national security of the republic. The problem of food security is the top priority of the economic policy strategy of any state, the effectiveness of this solution influences social, political, and ethnic stability in society. Food security and nutrition is everyone’s business. Food security exists when all people, at all times, have physical, social and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life. By analyzing the existing legislation in the area of food security, the author identifies weaknesses and gaps, suggesting ways to improve it. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=food%20security" title="food security">food security</a>, <a href="https://publications.waset.org/abstracts/search?q=national%20security" title=" national security"> national security</a>, <a href="https://publications.waset.org/abstracts/search?q=agriculture" title=" agriculture"> agriculture</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20resources" title=" public resources"> public resources</a>, <a href="https://publications.waset.org/abstracts/search?q=economic%20security" title=" economic security"> economic security</a> </p> <a href="https://publications.waset.org/abstracts/4863/legal-issues-of-food-security-in-republic-of-kazakhstan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/4863.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">425</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5352</span> Security of Internet of Things: Challenges, Requirements and Future Directions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amjad%20F.%20Alharbi">Amjad F. Alharbi</a>, <a href="https://publications.waset.org/abstracts/search?q=Bashayer%20A.%20Alotaibi"> Bashayer A. Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Fahd%20S.%20Alotaibi"> Fahd S. Alotaibi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things%20%28IoT%29" title="Internet of Things (IoT)">Internet of Things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20challenges" title=" IoT security challenges"> IoT security challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20requirements" title=" IoT security requirements"> IoT security requirements</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20security%20architecture" title=" IoT security architecture"> IoT security architecture</a> </p> <a href="https://publications.waset.org/abstracts/71488/security-of-internet-of-things-challenges-requirements-and-future-directions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">375</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5351</span> Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sadiq%20Nasir">Sadiq Nasir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness" title=" cybersecurity awareness"> cybersecurity awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20factor%20in%20security" title=" human factor in security"> human factor in security</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20security" title=" human security"> human security</a> </p> <a href="https://publications.waset.org/abstracts/162192/understanding-the-human-element-in-cybersecurity-a-literature-review-and-recommendations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162192.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">87</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5350</span> Study on the OTP Authentication Method and Security for User Mobility in the Cloud</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jong-Won%20Lee">Jong-Won Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud" title="cloud">cloud</a>, <a href="https://publications.waset.org/abstracts/search?q=OTP" title=" OTP"> OTP</a>, <a href="https://publications.waset.org/abstracts/search?q=mobility" title=" mobility"> mobility</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a> </p> <a href="https://publications.waset.org/abstracts/16655/study-on-the-otp-authentication-method-and-security-for-user-mobility-in-the-cloud" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16655.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">351</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5349</span> The Value of Job Security across Various Welfare Policies</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eithan%20Hourie">Eithan Hourie</a>, <a href="https://publications.waset.org/abstracts/search?q=Miki%20Malul"> Miki Malul</a>, <a href="https://publications.waset.org/abstracts/search?q=Raphael%20Bar-El"> Raphael Bar-El</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To investigate the relationship between various welfare policies and the value of job security, we conducted a study with 201 people regarding their assessments of the value of job security with respect to three elements: income stability, assurance of continuity of employment, and security in the job. The experiment simulated different welfare policy scenarios, such as the amount and duration of unemployment benefits, workfare, and basic income. The participants evaluated the value of job security in various situations. We found that the value of job security is approximately 22% of the starting salary, which is distributed as follows: 13% reflects income security, 8.7% reflects job security, and about 0.3% is for being able to keep their current employment in the future. To the best of our knowledge, this article is one of the pioneers in trying to quantify the value of job security in different market scenarios and at varying levels of welfare policy. Our conclusions may help decision-makers when deciding on a welfare policy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=job%20security%20value" title="job security value">job security value</a>, <a href="https://publications.waset.org/abstracts/search?q=employment%20protection%20legislation" title=" employment protection legislation"> employment protection legislation</a>, <a href="https://publications.waset.org/abstracts/search?q=status%20quo%20bias" title=" status quo bias"> status quo bias</a>, <a href="https://publications.waset.org/abstracts/search?q=expanding%20welfare%20policy" title=" expanding welfare policy"> expanding welfare policy</a> </p> <a href="https://publications.waset.org/abstracts/161025/the-value-of-job-security-across-various-welfare-policies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161025.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5348</span> Network Security Attacks and Defences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ranbir%20Singh">Ranbir Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Deepinder%20Kaur"> Deepinder Kaur</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20security" title="network security">network security</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=denial" title=" denial"> denial</a>, <a href="https://publications.waset.org/abstracts/search?q=authenticating" title=" authenticating"> authenticating</a> </p> <a href="https://publications.waset.org/abstracts/53007/network-security-attacks-and-defences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53007.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5347</span> Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haydar%20Teymourlouei">Haydar Teymourlouei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-attacks" title="cyber-attacks">cyber-attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20user" title=" home user"> home user</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/25329/quick-reference-cyber-attacks-awareness-and-prevention-method-for-home-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5346</span> Awareness of Child Rights as a Determinant of Effective Student Personnel Services in Public Secondary Schools in Southwestern Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ademola%20Ibukunolu%20Atanda">Ademola Ibukunolu Atanda</a>, <a href="https://publications.waset.org/abstracts/search?q=Gbenga%20Nathaniel%20Adeola"> Gbenga Nathaniel Adeola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study examined awareness of child rights as a determinant of effective student personnel services in public secondary schools in Southwestern Nigeria. It was survey research. The sample comprised 433 teachers, 137 school administrators, and 968 students who were drawn by simple random sampling techniques. The respondents were given copies of questionnaires tagged “school administrator/teacher’s awareness of child’s rights and student personnel services elements inventory.” Key Informant Interview (KII) was also employed. The data were analysed using frequency count, percentages, weighted average, grand mean, standard deviation, and Pearson Product Moment Correlation, while KII was qualitatively analysed. The findings of the study revealed that public secondary school administrator awareness of child rights was at a moderate level, but the awareness of child rights was low among the teachers. The study equally revealed that student personnel services are moderately provided in public secondary schools in Southwestern Nigeria, but security remains a major challenge. It was also found that there was a significant relationship between awareness of child rights and effective student personnel services. It was therefore recommended, based on the findings, that attention should be given to heightening awareness of child rights among public secondary school administrators and teachers for effective student personnel services. Copies of the Child Right Act 2003 should also be made available in all public secondary schools in Southwestern Nigeria, as the study revealed that the documents were not available. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=student%20personnel" title="student personnel">student personnel</a>, <a href="https://publications.waset.org/abstracts/search?q=child%20right" title=" child right"> child right</a>, <a href="https://publications.waset.org/abstracts/search?q=administrator%20awareness" title=" administrator awareness"> administrator awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=practice%20of%20child%20right" title=" practice of child right"> practice of child right</a> </p> <a href="https://publications.waset.org/abstracts/161453/awareness-of-child-rights-as-a-determinant-of-effective-student-personnel-services-in-public-secondary-schools-in-southwestern-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161453.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">147</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5345</span> Cybersecurity Awareness Among Applied Sciences Student Population</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sanja%20Bracun">Sanja Bracun</a>, <a href="https://publications.waset.org/abstracts/search?q=Nikolina%20Kasunic"> Nikolina Kasunic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After graduation, the student population of applied sciences will become the population of employees on IT experts’ positions or "just" business users of certain IT technologies for which the level of awareness of existing cybersecurity risks is extremely important. This research results define the current cybersecurity awareness level of students at Zagreb University of Applied Sciences (TVZ), what can be useful not only for teaching staff to form a curriculum related to cybersecurity more accurately but also to employers to know what to expect from their future employees regarding cybersecurity awareness level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=student%20population%20cybersecurity%20awareness" title="student population cybersecurity awareness">student population cybersecurity awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness" title=" cybersecurity awareness"> cybersecurity awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=applied%20sciences%20students" title=" applied sciences students"> applied sciences students</a> </p> <a href="https://publications.waset.org/abstracts/150938/cybersecurity-awareness-among-applied-sciences-student-population" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150938.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">254</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5344</span> Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mirad%20B%C3%B6hm">Mirad Böhm</a>, <a href="https://publications.waset.org/abstracts/search?q=Diede%20De%20Kok"> Diede De Kok</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NGO-military%20cooperation" title="NGO-military cooperation">NGO-military cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=organisational%20culture" title=" organisational culture"> organisational culture</a>, <a href="https://publications.waset.org/abstracts/search?q=safety%20and%20security%20awareness" title=" safety and security awareness"> safety and security awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=safety%20culture%20ladder" title=" safety culture ladder"> safety culture ladder</a> </p> <a href="https://publications.waset.org/abstracts/33046/climbing-up-to-safety-and-security-the-facilitation-of-an-ngo-awareness-culture" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33046.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5343</span> Climate Change Awareness at the Micro Level: Case Study of Grande Riviere, Trinidad</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sherry%20Ann%20Ganase">Sherry Ann Ganase</a>, <a href="https://publications.waset.org/abstracts/search?q=Sandra%20Sookram"> Sandra Sookram</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates the level of awareness to climate change and major factors that influence such awareness in Grande Riviere, Trinidad. Through the development of an Awareness Index and application of a Structural Equation Model to survey data, the findings suggest an Awareness index value of 0.459 in Grande Riviere. These results suggest that households have climate smart attitudes and behaviors but climate knowledge is lacking. This is supported by the structural equation model which shows a negative relationship between awareness and causes of climate change. The study concludes by highlighting the need for immediate action on increasing knowledge. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=awareness" title="awareness">awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=climate%20change" title=" climate change"> climate change</a>, <a href="https://publications.waset.org/abstracts/search?q=climate%20education" title=" climate education"> climate education</a>, <a href="https://publications.waset.org/abstracts/search?q=index%20structural%20equation%20model" title=" index structural equation model "> index structural equation model </a> </p> <a href="https://publications.waset.org/abstracts/20602/climate-change-awareness-at-the-micro-level-case-study-of-grande-riviere-trinidad" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20602.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">466</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5342</span> The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ari%20S.%20Prabowo">Ari S. Prabowo</a>, <a href="https://publications.waset.org/abstracts/search?q=Nia%20Febriyanti"> Nia Febriyanti</a>, <a href="https://publications.waset.org/abstracts/search?q=Haryono%20B.%20Santosa"> Haryono B. Santosa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=laboratory" title="laboratory">laboratory</a>, <a href="https://publications.waset.org/abstracts/search?q=physical%20protection%20system" title=" physical protection system"> physical protection system</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20culture" title=" security culture"> security culture</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20function" title=" security function"> security function</a> </p> <a href="https://publications.waset.org/abstracts/102746/the-benefits-of-security-culture-for-improving-physical-protection-systems-at-detection-and-radiation-measurement-laboratory" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/102746.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">5341</span> Blockchain Solutions for IoT Challenges: Overview</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Ali%20Fatoorchi">Amir Ali Fatoorchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Regardless of the advantage of LoT devices, they have limitations like storage, compute, and security problems. In recent years, a lot of Blockchain-based research in IoT published and presented. In this paper, we present the Security issues of LoT. IoT has three levels of security issues: Low-level, Intermediate-level, and High-level. We survey and compare blockchain-based solutions for high-level security issues and show how the underlying technology of bitcoin and Ethereum could solve IoT problems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Blockchain" title="Blockchain">Blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20security" title=" data security"> data security</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a> </p> <a href="https://publications.waset.org/abstracts/142808/blockchain-solutions-for-iot-challenges-overview" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142808.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=178">178</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=179">179</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=security%20awareness&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>