policy violation
Recently Published Documents


TOTAL DOCUMENTS

14
(FIVE YEARS 8)

H-INDEX

2
(FIVE YEARS 0)

2021 ◽  
Vol 184 ◽  
pp. 107706
Author(s):  
Muhammad Ibrar ◽  
Lei Wang ◽  
Gabriel-Miro Muntean ◽  
Aamir Akbar ◽  
Nadir Shah ◽  
...  

2020 ◽  
Vol 40 (2) ◽  
pp. 74-84
Author(s):  
Maureen E. Wilson ◽  
Amy S. Hirschy ◽  
John M. Braxton ◽  
Tia N. Dumas

The purpose of this study was to determine if there is evidence of a normative structure for primary role advisors and, if so, whether views of those norms vary by personal and positional characteristics. We developed the Academic Advising Behaviors Inventory (AABI) and surveyed members of NACADA: The Global Community for Academic Advising. Using principal components factor analysis, we identified four inviolable norms that primary role advisors regard as requiring severe sanctions when crossed: Policy Violation, Disrespectful Interactions, Neglectful Supervision, and Confidentiality Breach. Regression analyses revealed some significant differences in the perception of these norms by gender identity, race, and supervision. We conclude by discussing implications for practice and future research.


Author(s):  
Megan Magier ◽  
Karen A. Patte ◽  
Katelyn Battista ◽  
Adam G. Cole ◽  
Scott T. Leatherdale

Schools are increasingly concerned about student cannabis use with the recent legalization in Canada; however, little is known about how to effectively intervene when students violate school substance use policies. The purpose of this study is to assess the disciplinary approaches present in secondary schools prior to cannabis legalization and examine associations with youth cannabis use. This study used Year 6 (2017/2018) data from the COMPASS (Cannabis use, Obesity, Mental Health, Physical Activity, Alcohol use, Smoking, Sedentary behavior) study including 66,434 students in grades 9 through 12 and the 122 secondary schools they attend in British Columbia, Alberta, Ontario, and Quebec. Student questionnaires assessed youth cannabis use and school administrator surveys assessed potential use of 14 cannabis use policy violation disciplinary consequences through a (“check all that apply”) question. Regression models tested the association between school disciplinary approaches and student cannabis use with student- (grade, sex, ethnicity, tobacco use, binge drinking) and school-level covariates (province, school area household median income). For first-offence violations of school cannabis policies, the vast majority of schools selected confiscating the product (93%), informing parents (93%), alerting police (80%), and suspending students from school (85%), among their disciplinary response options. Few schools indicated requiring students to help around the school (5%), issuing a fine (7%), or assigning additional class work (8%) as potential consequences. The mean number of total first-offence consequences selected by schools was 7.23 (SD = 2.14). Overall, 92% of schools reported always using a progressive disciplinary approach in which sanctions get stronger with subsequent violations. Students were less likely to report current cannabis use if they attended schools that indicated assigning additional class work (OR 0.57, 95% CI (0.38, 0.84)) or alerting the police (OR 0.81, 95% CI (0.67, 0.98)) among their potential first-offence consequences, or reported always using the progressive discipline approach (OR 0.77, 95% CI (0.62, 0.96)) for subsequent cannabis policy violations. In conclusion, results reveal the school disciplinary context in regard to cannabis policy violations in the year immediately preceding legalization. Various consequences for cannabis policy violations were being used by schools, yet negligible association resulted between the type of first-offence consequences included in a school’s range of disciplinary approaches and student cannabis use.


2019 ◽  
Author(s):  
Mamay Syani

Cloud Computing merepresentasikan teknologi untuk menggunakan infrastruktur komputasi dengan cara yang lebih efisien, Di sisi lain, arsitektur yang rumit dan terdistribusi semacam itu menjadi target yang menarik bagi para penyusup Cyberattacks. Penelitian ini melakukan analisis dan membangun sistem keamanan jaringan infrastruktur Cloud computing pada studi kasus di sektor pendidikan. Infrastruktur dibangun berdasarkan kebutuhan pengguna yang diperoleh melalui metode wawancara. Metodologi penelitian yang digunakan yaitu metodologi NDLC yang terdiri dari 6 tahap namun dalam penelitian ini hanya memakai 5 tahapan dari metodologi NDLC. Hasil pengujian menunjukkan bahwa sistem keamanan jaringan yang dibangun sudah berhasil dan sistem Cloud yang bangun memenuhi user requirement. hasil uji terhadap kinerja sistem menunjukan bahwa pada parameter keakurasian pendeteksian bahwa sistem OSSEC dapat mendeteksi secara akurat dari serangan yang dilakukan penguji, pada parameter kecepatan pendeteksian bahwa sistem OSSEC lumayan cepat dalam mendeteksi adanya ancaman yang masuk, sedangkan pada parameter penggunaan sumber daya bahwa sistem OSSEC mengambil sedikit sekali penggunaan CPU dan RAM sehingga tidak memberatkan server, hasil observasi juga menunjukan bahwa sistem OSSEC yang dibangun berjalan dengan baik, berdasarkan dari observasi yang dilakukan oleh penulis hasil yang didapat terdapat sebanyak 620 peringatan pengintaian, 38849 peringatan authentication control, 569 peringatan attack/misue, 9018 peringatan Access Control, 0 peringatan Network Control, 230 peringatan System Monitor, dan 0 peringatan Policy Violation


Author(s):  
Deepika Prakash

It is believed that a data warehouse is for operational decision making. Recently, a proposal was made to support decision making for formulating policy enforcement rules that enforce policies. These rules are expressed in the WHEN-IF-THEN form. Guidelines are proposed to elicit two types of actions, triggering actions that cause the policy violation and the corresponding correcting actions. The decision-making problem is that of selecting the most appropriate correcting action in the event of a policy violation. This selection requires information. The elicited information is unstructured and is “early.” This work is extended by proposing a method to directly convert early information into its multi-dimensional form. For this, an early information mode is proposed. The proposed conversion process is a fully automated one. Further, the tool support is extended to accommodate the conversion process. The authors also apply the method to a health domain.


Sign in / Sign up

Export Citation Format

Share Document