The proportion of elderly people is growing steadily in many countries, and this trend is expected to continue. As a result, ageism—negative discrimination often tied to perceptions of the elderly—becomes especially harmful. Ageism prevents older generations from being fully accepted by society and, in turn, hinders their ability to adapt to today’s technological changes. In this article, we present the results of our survey mapping the extent of ageism among youth in Uzbekistan, known for its cultural tolerance in Central Asia, and in Hungary, a more individualistic society in Central Europe. To interpret the survey results accurately, we included specific questions to measure social desirability bias, enabling a realistic comparison of ageism levels between the two countries. Data was collected through a survey translated into multiple languages, with a final sample of nearly 400 respondents, each either currently pursuing or already holding a college-level diploma. Our methodological approach was twofold. First, we conducted simple chi-square tests to compare levels of negative and positive ageism between the two countries under study. Upon finding significant differences, we used multivariable OLS regression to explain the variance in types of ageism in Uzbekistan and Hungary, accounting for the possible effects of social desirability bias. Uzbek youth demonstrated higher levels of positive ageism and lower levels of negative ageism compared to Hungarian youth. This finding confirms that the cultural tolerance in Uzbek society remains strong and, in many ways, could serve as a model for Hungary. Additionally, our literature review highlights that adequate infrastructure is essential for a society to treat older adults equitably alongside other citizens.
The growing interconnectedness of the world has led to a rise in cybersecurity risks. Although it is increasingly conventional to use technology to assist business transactions, exposure to these risks must be minimised to allow business owners to do transactions in a secure manner. While a wide range of studies have been undertaken regarding the effects of cyberattacks on several industries and sectors, However, very few studies have focused on the effects of cyberattacks on the educational sector, specifically higher educational institutions (HEIs) in West Africa. Consequently, this study developed a survey and distributed it to HEIs particularly universities in West Africa to examine the data architectures they employed, the cyberattacks they encountered during the COVID-19 pandemic period, and the role of data analysis in decision-making, as well as the countermeasures employed in identifying and preventing cyberattacks. A total of one thousand, one hundred and sixty-four (1164) responses were received from ninety-three (93) HEIs and analysed. According to the study’s findings, data-informed architecture was adopted by 71.8% of HEIs, data-driven architecture by 24.1%, and data-centric architecture by 4.1%, all of which were vulnerable to cyberattacks. In addition, there are further concerns around data analysis techniques, staff training gaps, and countermeasures for cyberattacks. The study’s conclusion includes suggestions for future research topics and recommendations for repelling cyberattacks in HEIs.
Our main objective in this research is to affirm that philosophy, in its true essence and depth, has never been inherently opposed to religion. Rather, the turn toward atheism within philosophy represents isolated, personal stances, often reactionary in nature, and not rooted in genuine intellectual reflection, which the Qur’an encourages and calls people to adhere to. Our endeavor is to show that the call to atheism is foreign to reason, understood as a sound faculty or a sense linked to the pursuit of truth, as previously demonstrated by Descartes in his focus on the principles and methods of philosophical inquiry. To facilitate the achievement of these goals, we have employed several methodologies, primarily the structural method, which helps us analyze selected texts, this methodology enables the understanding of the elements within the studied positions, the relationships that link them, and the underlying implications upon which they are based. We will apply this method practically when analyzing conceptions that reject religion, uncovering the framework underpinning each conception. This approach facilitates comprehension by examining the rational foundations that support each interpretation of religion and later pave the way for its denial or transcendence. the historical method, which allows us to trace the development and dissemination of atheism, this approach is based on the premise that every sensory or intellectual phenomenon has an origin defined by time and place, evolving through transformations and additions over time. By employing this method, we can trace the development of various interpretations of religion and understand the intellectual accumulations shaped by successive historical periods, and the deconstructionist method, through which we identify the contradictions and flawed principles underlying atheistic arguments, this method allows for in-depth critique of the foundations, developmental trajectories, and final outcomes of phenomena. It also provides a means to establish new perspectives—whether by modifying the existing model, recontextualizing it, or replacing it with an entirely new framework. The importance of re-examining the relationship between philosophy and atheism stems from the profound influence of certain philosophical positions and their negative views on religion within various atheistic currents, especially contemporary ones. Contemporary atheism today poses a threat to religion as a symbolic human system, rich in a value-laden framework that upholds the essence of humanity in an era dominated by materialism and the absence of values. The central question of this research is: Can the human being truly achieve existence independently? Or can one live in this world isolated from all influential forces, including the creative and divine force?
The proposed research work encompasses implications for infrastructure particularly the cybersecurity as an essential in soft infrastructure, and policy making particularly on secure access management of infrastructure governance. In this study, we introduce a novel parameter focusing on the timestamp duration of password entry, enhancing the algorithm titled EPSBalgorithmv01 with seven parameters. The proposed parameter incorporates an analysis of the historical time spent by users entering their passwords, employing ARIMA for processing. To assess the efficacy of the updated algorithm, we developed a simulator and employed a multi-experimental approach. The evaluation utilized a test dataset comprising 617 authentic records from 111 individuals within a selected company spanning from 2017 to 2022. Our findings reveal significant advancements in EPSBalgorithmv01 compared to its predecessor namely EPSBalgorithmv00. While EPSBalgorithmv00 struggled with a recognition rate of 28.00% and a precision of 71.171, EPSBalgorithmv01 exhibited a recognition rate of 17% with a precision of 82.882%. Despite a decrease in recognition rate, EPSBalgorithmv01 demonstrates a notable improvement of approximately 14% over EPSBalgorithmv00.
Copyright © by EnPress Publisher. All rights reserved.