Search results

1 – 10 of 987

Abstract

Details

Children and the Climate Migration Crisis: A Casebook for Global Climate Action in Practice and Policy
Type: Book
ISBN: 978-1-80455-910-9

Book part
Publication date: 14 December 2023

Syed Amir Shah and tavis d. jules

After the electoral victory in 2018, the newly formed Pakistan Tehreek-e-Insaf (PTI) government presented its National Education Policy Framework, chalking out its priorities of…

Abstract

After the electoral victory in 2018, the newly formed Pakistan Tehreek-e-Insaf (PTI) government presented its National Education Policy Framework, chalking out its priorities of bringing more than 22 million out-of-school children to schools, improving educational quality, and introducing a uniform education system in the country. However, the government’s grand ambitions, transpired quickly, only to produce a draft of a new unified curriculum in 2020. This chapter investigates the newly formulated Single National Curriculum (SNC) in Pakistan by using the lens of Critical Cultural Political Economy of Education (CCPEE). To understand the endogenous and exogenous factors shaping the SNC, the chapter argues that securitization and neoliberalization are the significant factors informing the development and the production of the new curriculum.

Details

Annual Review of Comparative and International Education 2022
Type: Book
ISBN: 978-1-83797-484-9

Keywords

Content available
Book part
Publication date: 19 March 2024

Rose Cardarelli and Harley Pomper

Abstract

Details

Children and the Climate Migration Crisis: A Casebook for Global Climate Action in Practice and Policy
Type: Book
ISBN: 978-1-80455-910-9

Article
Publication date: 1 June 2023

Rodgen Marginado Jabor

The purpose of this study is to explore the understanding and observance of the program “This School is a Zone of Peace” (SZOP) in schools where conflict and violence are not…

Abstract

Purpose

The purpose of this study is to explore the understanding and observance of the program “This School is a Zone of Peace” (SZOP) in schools where conflict and violence are not prevalent.

Design/methodology/approach

This paper followed a qualitative research tradition – narrative inquiry. Eight teachers and a school head participated in the study. Data were gathered through nonparticipant observation, photography and focus group discussion with photo elicitation.

Findings

The participants elucidated the declaration, “This School is a Zone of Peace,” as a message of assurance to the community that the school is a home for learners that is welcoming and violence free. Furthermore, learners in a school that is a zone of peace are honed holistically with the participation, cooperation and togetherness of the school community members. Teachers at the forefront viewed themselves as mentors, implementers and models. Teachers contended that peacebuilding practices in schools could be sustained through regular implementation, encouraging others to get involved and have commitment.

Originality/value

A handful of articles have illustrated the essence of the School as Zone of Peace program, which pointed out to create a culture of peace in schools; however, it leaned toward the negative conception of peace – the absence of conflict and violence. This study bared additional insights and fresh perspectives of the SZOP initiative observed in schools with different contexts and experiences that may be helpful to policymakers for the enhancement of the adapted program with the goal of peacebuilding to making schools highly functional.

Details

Journal of Aggression, Conflict and Peace Research, vol. 16 no. 2
Type: Research Article
ISSN: 1759-6599

Keywords

Abstract

Details

Children and the Climate Migration Crisis: A Casebook for Global Climate Action in Practice and Policy
Type: Book
ISBN: 978-1-80455-910-9

Article
Publication date: 9 April 2024

Ahmed Shehata and Metwaly Eldakar

Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education…

Abstract

Purpose

Social engineering is crucial in today’s digital landscape. As technology advances, malicious individuals exploit human judgment and trust. This study explores how age, education and occupation affect individuals’ awareness, skills and perceptions of social engineering.

Design/methodology/approach

A quantitative research approach was used to survey a diverse demographic of Egyptian society. The survey was conducted in February 2023, and the participants were sourced from various Egyptian social media pages covering different topics. The collected data was analyzed using descriptive and inferential statistics, including independent samples t-test and ANOVA, to compare awareness and skills across different groups.

Findings

The study revealed that younger individuals and those with higher education tend to research social engineering more frequently. Males display a higher level of awareness but score lower in terms of social and psychological consequences as well as types of attacks when compared to females. The type of attack cannot be predicted based on age. Higher education is linked to greater awareness and ability to defend against attacks. Different occupations have varying levels of awareness, skills, and psychosocial consequences. The study emphasizes the importance of increasing awareness, education and implementing cybersecurity measures.

Originality/value

This study’s originality lies in its focus on diverse Egyptian demographics, innovative recruitment via social media, comprehensive exploration of variables, statistical rigor, practical insights for cybersecurity education and diversity in educational and occupational backgrounds.

Details

Library Hi Tech, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 12 December 2022

Zeynep Yeşim İlerisoy and Berru İzel Gökgöz

This study aims to focus on security measures for protecting transportation buildings from vehicle bomb attacks. It discusses ways to mitigate the effects of vehicle bomb…

197

Abstract

Purpose

This study aims to focus on security measures for protecting transportation buildings from vehicle bomb attacks. It discusses ways to mitigate the effects of vehicle bomb terrorist attacks through architectural design decisions on transportation buildings.

Design/methodology/approach

The main research topic is the evaluation of architectural design decisions for vehicle bomb attacks at transportation buildings with the multi-criteria decision-making method. First, it was investigated which characteristics the impact of the explosion on the structures depended on. The measures for vehicle bomb attacks regarding the relationship between the urban scale and the building were determined by four main criteria and 17 sub-criteria. Due to the complex and ambiguous nature of architectural design, these criteria were evaluated by the analytic hierarchy processes. After the criteria weights were obtained, the alternative sample buildings, including the train stations and airports, were evaluated with the Technique for Order Preference by Similarity to an Ideal Solution method.

Findings

The site security design was determined as the most effective component for vehicle bomb attacks among the main criteria. The most important sub-criterion was the perimeter firewall. In the evaluations of the alternatives, it was determined that airports performed better against vehicle bomb attacks in terms of architectural design requirements than train stations.

Originality/value

This research contributes to the literature for the countries where explosions occur intensively by determining the importance of architectural design parameters for the transportation buildings and surroundings against vehicle bomb attacks. This study provides an evaluation model based on transportation buildings considering the relationship between the urban scale and the building itself.

Details

Open House International, vol. 48 no. 3
Type: Research Article
ISSN: 0168-2601

Keywords

Article
Publication date: 17 August 2021

Abir Al-Harrasi, Abdul Khalique Shaikh and Ali Al-Badi

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and…

1138

Abstract

Purpose

One of the most important Information Security (IS) concerns nowadays is data theft or data leakage. To mitigate this type of risk, organisations use a solid infrastructure and deploy multiple layers of security protection technology and protocols such as firewalls, VPNs and IPsec VPN. However, these technologies do not guarantee data protection, and especially from insiders. Insider threat is a critical risk that can cause harm to the organisation through data theft. The main purpose of this study was to investigate and identify the threats related to data theft caused by insiders in organisations and explore the efforts made by them to control data leakage.

Design/methodology/approach

The study proposed a conceptual model to protect organisations’ data by preventing data theft by malicious insiders. The researchers conducted a comprehensive literature review to achieve the objectives of this study. The collection of the data for this study is based on earlier studies conducted by several researchers from January 2011 to December 2020. All the selected literature is from journal articles, conference articles and conference proceedings using various databases.

Findings

The study revealed three main findings: first, the main risks inherent in data theft are financial fraud, intellectual property theft, and sabotage of IT infrastructure. Second, there are still some organisations that are not considering data theft by insiders as being a severe risk that should be well controlled. Lastly, the main factors motivating the insiders to perform data leakage activities are financial gain, lack of fairness and justice in the workplace, the psychology or characteristics of the insiders, new technologies, lack of education and awareness and lack of management tools for understanding insider threats.

Originality/value

The study provides a holistic view of data theft by insiders, focusing on the problem from an organisational point of view. Organisations can therefore take into consideration our recommendations to reduce the risks of data leakage by their employees.

Details

International Journal of Organizational Analysis, vol. 31 no. 3
Type: Research Article
ISSN: 1934-8835

Keywords

Article
Publication date: 26 May 2023

Derrick Boakye, David Sarpong, Dirk Meissner and George Ofosu

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary…

Abstract

Purpose

Cyber-attacks that generate technical disruptions in organisational operations and damage the reputation of organisations have become all too common in the contemporary organisation. This paper explores the reputation repair strategies undertaken by organisations in the event of becoming victims of cyber-attacks.

Design/methodology/approach

For developing the authors’ contribution in the context of the Internet service providers' industry, the authors draw on a qualitative case study of TalkTalk, a British telecommunications company providing business to business (B2B) and business to customer (B2C) Internet services, which was a victim of a “significant and sustained” cyber-attack in October 2015. Data for the enquiry is sourced from publicly available archival documents such as newspaper articles, press releases, podcasts and parliamentary hearings on the TalkTalk cyber-attack.

Findings

The findings suggest a dynamic interplay of technical and rhetorical responses in dealing with cyber-attacks. This plays out in the form of marshalling communication and mortification techniques, bolstering image and riding on leader reputation, which serially combine to strategically orchestrate reputational repair and stigma erasure in the event of a cyber-attack.

Originality/value

Analysing a prototypical case of an organisation in dire straits following a cyber-attack, the paper provides a systematic characterisation of the setting-in-motion of strategic responses to manage, revamp and ameliorate damaged reputation during cyber-attacks, which tend to negatively shape the evaluative perceptions of the organisation's salient audience.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Book part
Publication date: 24 October 2023

Michael D. Bartone

A war still rages in the United States. This is a war with many different battles – one such battle being against queer teachers and students, as well as teachers and…

Abstract

A war still rages in the United States. This is a war with many different battles – one such battle being against queer teachers and students, as well as teachers and administrators who support queer youth and teachers in their schools. While this battle may look new in the social media landscape that is 2022 (TikTok and YouTube videos and anyone with the slightest thought, even if based on someone else's, a regurgitated idea and old tropes, is posting to social media as if they are saying something new and profound, yet is old tried and filled with hate), it is almost the same old battle where queer and LGBTQ2+ are used interchangeably. Queer folks are the ones being sacrificed to save the nation from spiraling into the abyss of debauchery and chaos of a lost moral compass (Gogarty, 2022; Lorenz, 2022; Montpetit, 2022). If this is the case, and queer people are battling for humanity and existence in schools, understanding teacher burnout from a queer perspective poses incredible challenges. Why would one want to be a teacher, especially a queer person, if we are so often the brunt of the attacks in this war to control society?

Details

Drawn to the Flame
Type: Book
ISBN: 978-1-80382-415-4

Keywords

1 – 10 of 987